Author of the publication

The Evolution of a Security Control.

, and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 67-84. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Specification and Implementation of ``Commercial'' Security Requirements Including Dynamic Segregation of Duties.. ACM Conference on Computer and Communications Security, page 125-134. ACM, (1997)Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems.. IFIPTM, volume 401 of IFIP Advances in Information and Communication Technology, page 193-207. Springer, (2013)Authorisation Subterfuge by Delegation in Decentralised Networks., and . Security Protocols Workshop, volume 4631 of Lecture Notes in Computer Science, page 97-102. Springer, (2005)Virtual environment for the navigation of ideas and concepts in education (V.E.N.I.C.E).. AVI, page 428. ACM Press, (2010)A Bloom Filter Based Model for Decentralized Authorization., and . Int. J. Intell. Syst., 28 (6): 565-582 (2013)Towards a Framework for Autonomic Security Protocols., and . Security Protocols Workshop, volume 3364 of Lecture Notes in Computer Science, page 49-54. Springer, (2003)External Consistency and the Verification of Security Protocols (Transcript of Discussion).. Security Protocols Workshop, volume 1550 of Lecture Notes in Computer Science, page 28-35. Springer, (1998)Are handheld viruses a significant threat?, and . Commun. ACM, 44 (1): 105-107 (2001)A collaborative approach to autonomic security protocols., and . NSPW, page 13-21. ACM, (2004)Conduit cascades and secure synchronization.. NSPW, page 141-150. ACM, (2000)