John C. Mace

According to our database1, John C. Mace authored at least 13 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
User Privacy Concerns in Commercial Smart Buildings.
J. Comput. Secur., 2022

2020
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach.
Proceedings of the 19th IEEE International Conference on Trust, 2020

User Privacy Concerns and Preferences in Smart Buildings.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2020

Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations.
Proceedings of the 16th European Dependable Computing Conference, 2020

2017
ADaCS: A Tool for Analysing Data Collection Strategies.
Proceedings of the Computer Performance Engineering - 14th European Workshop, 2017

2016
WRAD: Tool Support for Workflow Resiliency Analysis and Design.
Proceedings of the Software Engineering for Resilient Systems - 8th International Workshop, 2016

2015
Resiliency Variance in Workflows with Choice.
Proceedings of the Software Engineering for Resilient Systems - 7th International Workshop, 2015

Impact of Policy Design on Workflow Resiliency Computation Time.
Proceedings of the Quantitative Evaluation of Systems, 12th International Conference, 2015

Modelling user availability in workflow resiliency analysis.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

2014
Quantitative Workflow Resiliency.
Proceedings of the Computer Security - ESORICS 2014, 2014

2011
The case for dynamic security solutions in public cloud workflow deployments.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

2010
Ontology Editing Tool for Information Security and Human Factors Experts.
Proceedings of the KMIS 2010, 2010

A collaborative ontology development tool for information security managers.
Proceedings of the 4th ACM Symposium on Computer Human Interaction for Management of Information Technology, 2010


  Loading...