John Lyle

According to our database1, John Lyle authored at least 24 papers between 2009 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2014
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework.
Proceedings of the BCS-HCI 2014 Proceedings of the 28th International BCS Human Computer Interaction Conference, 2014

Evaluating the Implications of Attack and Security Patterns with Premortems.
Proceedings of the Cyberpatterns, 2014

2013
Multi-device application middleware: leveraging the ubiquity of the Web with webinos.
The Journal of Supercomputing, 2013

Extending the web to support personal network services.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project.
Proceedings of the Hardware and Software: Verification and Testing, 2013

Guidelines for integrating personas into software engineering tools.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2013

2012
The webinos project.
Proceedings of the 21st World Wide Web Conference, 2012

Provenance as a Security Control.
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012

Cross-Platform Access Control for Mobile Web Applications.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012

Model-driven architectural risk analysis using architectural and contextualised attack patterns.
Proceedings of the Model-Driven Security Workshop, 2012

On the challenges of building a web-based ubiquitous application platform.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

Requirements Sensemaking Using Concept Maps.
Proceedings of the Human-Centered Software Engineering - 4th International Conference, 2012

Personal PKI for the Smart Device Era.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

On the Design and Development of webinos: A Distributed Mobile Application Middleware.
Proceedings of the Distributed Applications and Interoperable Systems, 2012

2011
Trustworthy services through attestation.
PhD thesis, 2011

Managing application whitelists in trusted distributed systems.
Future Generation Comp. Syst., 2011

Challenges for Provenance in Cloud Computing.
Proceedings of the 3rd Workshop on the Theory and Practice of Provenance, 2011

Achieving attestation with less effort: an indirect and configurable approach to integrity reporting.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

Here's Johnny: A Methodology for Developing Attacker Personas.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Engineering Attestable Services.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Trusted Computing and Provenance: Better Together.
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010

2009
Trustable Remote Verification of Web Services.
Proceedings of the Trusted Computing, 2009

Trustworthy Log Reconciliation for Distributed Virtual Organisations.
Proceedings of the Trusted Computing, 2009

On the Feasibility of Remote Attestation for Web Services.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009


  Loading...