Michael Hitchens

Orcid: 0000-0001-6320-9184

According to our database1, Michael Hitchens authored at least 116 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A trust-aware openflow switching framework for software defined networks (SDN).
Comput. Networks, December, 2023

Trans* and gender diverse players: Avatars and gender-alignment.
Entertain. Comput., August, 2023

A Blockchain-Based Interoperable Architecture for IoT with Selective Disclosure of Information.
Proceedings of the 28th IEEE Pacific Rim International Symposium on Dependable Computing, 2023

2022
Toward a Trust Aware Network Slice-Based Service Provision in Virtualized Infrastructures.
IEEE Trans. Netw. Serv. Manag., 2022

SDPM: A Secure Smart Device Provisioning and Monitoring Service Architecture for Smart Network Infrastructure.
IEEE Internet Things J., 2022

VeriBlock: A Blockchain-Based Verifiable Trust Management Architecture with Provable Interactions.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

How to increase ethical awareness in cybersecurity decision-making.
Proceedings of the Australasian Conference on Information Systems, 2022

2021
A Graph-Based Fault-Tolerant Approach to Modeling QoS for IoT-Based Surveillance Applications.
IEEE Internet Things J., 2021

A blockchain-based trust management framework with verifiable interactions.
Comput. Networks, 2021

QoS-Aware Energy Management and Node Scheduling Schemes for Sensor Network-Based Surveillance Applications.
IEEE Access, 2021

Controlling Resource Allocation using Blockchain-Based Delegation.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
On the Design of a Flexible Delegation Model for the Internet of Things Using Blockchain.
IEEE Trans. Ind. Informatics, 2020

Security Requirements for the Internet of Things: A Systematic Approach.
Sensors, 2020

On the Integration of Blockchain to the Internet of Things for Enabling Access Right Delegation.
IEEE Internet Things J., 2020

Towards a Trust Aware Network Slice based End to End Services for Virtualised Infrastructures.
CoRR, 2020

Design for Empowerment: Empowering Sri Lankan Farmers through Mobile-based Information System.
Commun. Assoc. Inf. Syst., 2020

Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure.
Proceedings of the NOMS 2020, 2020

2019
A Policy-Based Security Architecture for Software-Defined Networks.
IEEE Trans. Inf. Forensics Secur., 2019

Policy-based access control for constrained healthcare resources in the context of the Internet of Things.
J. Netw. Comput. Appl., 2019

Design and implementation of a secure and flexible access-right delegation for resource constrained environments.
Future Gener. Comput. Syst., 2019

Towards the Design of a Trust Management Framework for the Internet of Things.
Proceedings of the 13th International Conference on Sensing Technology, 2019

Towards a method for creating personas with knowledge and cognitive process for user centered design of a learning application.
Proceedings of the 12th International Workshop on Cooperative and Human Aspects of Software Engineering, 2019

Teaching user centered conceptual design using cross-cultural personas and peer reviews for a large cohort of students.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering Education and Training, 2019

2018
A gamification design for the classroom.
Interact. Technol. Smart Educ., 2018

Fine-Grained Access Control for Smart Healthcare Systems in the Internet of Things.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2018

Policy-Based Access Control for Constrained Healthcare Resources.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

Incremental Acquisition of Values to Deal with Cybersecurity Ethical Dilemmas.
Proceedings of the Knowledge Management and Acquisition for Intelligent Systems, 2018

Modeling Identity for the Internet of Things: Survey, Classification and Trends.
Proceedings of the 12th International Conference on Sensing Technology, 2018

Player retention in league of legends: a study using survival analysis.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
An empirical investigation of the influence of persona with personality traits on conceptual design.
J. Syst. Softw., 2017

On Design of A Fine-Grained Access Control Architecture for Securing IoT-Enabled Smart Healthcare Systems.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Towards a Secure Access Control Architecture for the Internet of Things.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

On the design of security mechanisms for the Internet of Things.
Proceedings of the Eleventh International Conference on Sensing Technology, 2017

eSport vs irlSport.
Proceedings of the Advances in Computer Entertainment Technology, 2017

2016
The relationship between character identification and flow state within video games.
Comput. Hum. Behav., 2016

Predicting player churn in destiny: A Hidden Markov models approach to predicting player departure in a major online game.
Proceedings of the IEEE Conference on Computational Intelligence and Games, 2016

2015
Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage.
IEEE Trans. Inf. Forensics Secur., 2015

Generic constructions for role-based encryption.
Int. J. Inf. Sec., 2015

Provenance Based Classification Access Policy System Based on Encrypted Search for Cloud Data Storage.
Proceedings of the Information Security - 18th International Conference, 2015

Effectiveness of Persona with Personality Traits on Conceptual Design.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Cross-Domain Attribute Conversion for Authentication and Authorization.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Antivirus security: naked during updates.
Softw. Pract. Exp., 2014

Secure administration of cryptographic role-based access control for large-scale cloud storage systems.
J. Comput. Syst. Sci., 2014

Reality and Terror, the First-Person Shooter in Current Day Settings.
Games Cult., 2014

Cultivation Planning Application to Enhance Decision Making among Sri Lankan Farmers.
Proceedings of the Knowledge Management and Acquisition for Smart Systems and Services, 2014

Towards Quantifying Player's Involvement in 3D Games Based-on Player Types.
Proceedings of the 2014 Conference on Interactive Entertainment, 2014

2013
Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2013

Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control.
Proceedings of the SECRYPT 2013, 2013

Evaluating the Impact of the Human-Agent Teamwork Communication Model (HAT-CoM) on the Development of a Shared Mental Model.
Proceedings of the PRIMA 2013: Principles and Practice of Multi-Agent Systems, 2013

Form over function: the use of Lovecraftian elements in World of Warcraft.
Proceedings of the 9th Australasian Conference on Interactive Entertainment, 2013

A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013

2012
A flexible cryptographic approach for secure data storage in the cloud using role-based access control.
Int. J. Cloud Comput., 2012

Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems.
Proceedings of the 11th IEEE International Conference on Trust, 2012

An investigation of player to player character identification via personal pronouns.
Proceedings of the 8th Australasian Conference on Interactive Entertainment, 2012

A novel agent based control scheme for RTS games.
Proceedings of the 8th Australasian Conference on Interactive Entertainment, 2012

An investigation of Vladimir Propp's 31 functions and 8 broad character types and how they apply to the analysis of video games.
Proceedings of the 8th Australasian Conference on Interactive Entertainment, 2012

2011
A Survey of First-person Shooters and their Avatars.
Game Stud., 2011

Enforcing Role-Based Access Control for Secure Data Storage in the Cloud.
Comput. J., 2011

2010
Analysis of Property Based Attestation in Trusted Platforms.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Game Time: Modeling and Analyzing Time in Multiplayer and Massively Multiplayer Games.
Games Cult., 2009

Property Based Attestation and Trusted Computing: Analysis and Challenges.
Proceedings of the Third International Conference on Network and System Security, 2009

Critical Issues in Trust Management for Mobile Ad-Hoc Networks.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009

Towards Data-Driven Drama Management: Issues in Data Collection and Annotation.
Proceedings of the 2009 DiGRA International Conference: Breaking New Ground: Innovation in Games, 2009

Role-Playing Games: The State of Knowledge [Panel Abstracts].
Proceedings of the 2009 DiGRA International Conference: Breaking New Ground: Innovation in Games, 2009

Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

ALOPA: Authorization Logic for Property Attestation in Trusted Platforms.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009

The Personal Experience of Narratives in Role-Playing Games.
Proceedings of the Intelligent Narrative Technologies II, 2009

Modeling the Story Facilitation of Game Masters in Multi-Player Role-Playing Games.
Proceedings of the Intelligent Narrative Technologies II, 2009

2008
Character play: the use of game characters in multi-player role-playing games across platforms.
Comput. Entertain., 2008

Managing emergent character-based narrative.
Proceedings of the 2nd International Conference on INtelligent TEchnologies for interactive enterTAINment, 2008

Verbal Communication of Story Facilitators in Multi-player Role-Playing Games.
Proceedings of the Interactive Storytelling, 2008

Motivations for play in computer role-playing games.
Proceedings of the 2008 Conference on Future Play: Research, Play, Share, 2008

On the Applicability of Trusted Computing in Distributed Authorization Using Web Services.
Proceedings of the Data and Applications Security XXII, 2008

2007
Group play: determining factors on the gaming experience in multiplayer role-playing games.
Comput. Entertain., 2007

Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

Cross-format analysis of the gaming experience in multi-player role-playing games.
Proceedings of the 2007 DiGRA International Conference: Situated Play, 2007

Player-Character Dynamics in Multi-Player Role Playing Games.
Proceedings of the 2007 DiGRA International Conference: Situated Play, 2007

Trust management for trusted computing platforms in web services.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007

2006
Live Action Role-Playing Games: Control, Communication, Storytelling, and MMORPG Similarities.
Games Cult., 2006

Communication in Multi-player Role Playing Games - The Effect of Medium.
Proceedings of the Technologies for Interactive Digital Storytelling and Entertainment, 2006

Ghost Worlds - Time and Consequence in MMORPGs.
Proceedings of the Technologies for Interactive Digital Storytelling and Entertainment, 2006

2005
Authorization Service for Web Services and its Application in a Health Care Domain.
Int. J. Web Serv. Res., 2005

Architectural Framework for Web Services Authorization.
Proceedings of the Web Services and Model-Driven Enterprise Information Services, 2005

Secure Identity Management for Pseudo-Anonymous Service Access.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture.
Proceedings of The 2005 International Symposium on Web Services and Applications, 2005

Trust and authorization in the grid: a recommendation model.
Proceedings of the International Conference on Pervasive Services 2005, 2005

Automated Physical Storage Provision Using a Peer-to-Peer Distributed File System.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

A Trust based Access Control Framework for P2P File-Sharing Systems.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

2004
Security for cluster based ad hoc networks.
Comput. Commun., 2004

Authorization Service for Web Services and its Implementation.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

Securing the Ad-Hoc On-demand Distance Vector Protocol.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
A secure multicast support framework for Mobile IP.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Secure Authorisation for Web Services.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

2002
Secure Multicast Support for Mobile IP with Hierarchical Registration Approach.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

Security Policy Management in Distributed Systems.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

Policy Administration Domains.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Role-Based Access Control and the Access Control Matrix.
ACM SIGOPS Oper. Syst. Rev., 2001

Tower: A Language for Role Based Access Control.
Proceedings of the Policies for Distributed Systems and Networks, 2001

Secure Distributed Location Management Scheme for Mobile Hosts.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

A Distributed Location Management Scheme for Mobile Hosts.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001

RBAC for XML Document Stores.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Design and specification of role based access control policies.
IEE Proc. Softw., 2000

Elements of a Language for Role-Based Access Control.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1999
On the design of secure ATM networks.
Comput. Commun., 1999

Secure Multicast Extensions for Mobile Networks.
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999

Issues in the Design of a Language for Role Based Access Control.
Proceedings of the Information and Communication Security, Second International Conference, 1999

An Analysis of Access Control Models.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1997
A New Process Migration Algorithm.
ACM SIGOPS Oper. Syst. Rev., 1997

The Design of a Flexible Class Library Management System.
Proceedings of the TOOLS 1997: 24th International Conference on Technology of Object-Oriented Languages and Systems, 1997

Security services and public key infrastructure for ATM networks.
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997

Subtyping and Protection in Persistent Programming Languages.
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997

Security Issues in Asynchronous Transfer Mode.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

1994
A Three-level Object-Based Model.
Proceedings of the IEEE Computer Society 1994 International Conference on Computer Languages, 1994

1993
Linguistic Support for Persistent Modules and Capabilities.
Proceedings of the Database Programming Languages (DBPL-4), Proceedings of the Fourth International Workshop on Database Programming Languages - Object Models and Languages, Manhattan, New York City, USA, 30 August, 1993


  Loading...