Παρακολούθηση
John Lyle
John Lyle
Department of Computer Science, University of Oxford
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα cs.ox.ac.uk - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Trusted computing and provenance: Better together
J Lyle, A Martin
TaPP’10: 2nd Workshop on the Theory and Practice of Provenance, 2010
762010
Challenges for provenance in cloud computing
IM Abbadi, J Lyle
3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP’11 …, 2011
562011
Here's Johnny: A Methodology for Developing Attacker Personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
452011
The webinos project
C Fuhrhop, J Lyle, S Faily
Proceedings of the 21st international conference on World Wide Web, 259-262, 2012
412012
On the challenges of building a web-based ubiquitous application platform
H Desruelle, J Lyle, S Isenberg, F Gielen
Proceedings of the 2012 ACM conference on ubiquitous computing, 733-736, 2012
312012
Cross-platform access control for mobile web applications
J Lyle, S Monteleone, S Faily, D Patti, F Ricciato
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
272012
Trustworthy Services Through Attestation
J Lyle
26*2011
Guidelines for integrating personas into software engineering tools
S Faily, J Lyle
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013
242013
On the feasibility of remote attestation for web services
J Lyle, A Martin
2009 International Conference on Computational Science and Engineering 3 …, 2009
222009
Trustable remote verification of web services
J Lyle
International Conference on Trusted Computing, 153-168, 2009
222009
Provenance as a security control
A Martin, J Lyle, C Namilkuo
Proceedings of the 4th USENIX conference on Theory and Practice of …, 2012
212012
Requirements sensemaking using concept maps
S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore
International conference on human-centred software engineering, 217-232, 2012
202012
Usability and security by design: a case study in research and development
S Faily, J Lyle, I Fléchais, A Simpson
162015
On the Design and Development of webinos: A Distributed Mobile Application Middleware
J Lyle, S Faily, I Fléchais, A Paul, A Göker, H Myrhaug, H Desruelle, ...
IFIP International Conference on Distributed Applications and Interoperable …, 2012
152012
Managing application whitelists in trusted distributed systems
JH Huh, J Lyle, C Namiluko, A Martin
Future Generation Computer Systems 27 (2), 211-226, 2011
14*2011
Model-driven architectural risk analysis using architectural and contextualised attack patterns
S Faily, J Lyle, C Namiluko, A Atzeni, C Cameroni
Proceedings of the Workshop on Model-Driven Security, 1-6, 2012
122012
Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project
T Su, J Lyle, A Atzeni, S Faily, H Virji, C Ntanos, C Botsikas
Haifa Verification Conference, 145-150, 2013
102013
Trustworthy log reconciliation for distributed virtual organisations
JH Huh, J Lyle
TRUST, Lecture Notes in Computer Science, Springer, 169-182, 2009
82009
Personal PKI for the Smart Device Era
J Lyle, A Paverd, J King-Lacroix, A Atzeni, H Virji, I Flechais, S Faily
European Public Key Infrastructure Workshop, 69-84, 2012
72012
Extending the web to support personal network services
J Lyle, C Nilsson, A Isberg, S Faily
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 711-716, 2013
62013
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20