Seguir
John Lyle
John Lyle
Department of Computer Science, University of Oxford
Dirección de correo verificada de cs.ox.ac.uk - Página principal
Título
Citado por
Citado por
Año
Trusted computing and provenance: Better together
J Lyle, A Martin
TaPP’10: 2nd Workshop on the Theory and Practice of Provenance, 2010
842010
Challenges for provenance in cloud computing
IM Abbadi, J Lyle
3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP’11 …, 2011
642011
Here's Johnny: A Methodology for Developing Attacker Personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
562011
The webinos project
C Fuhrhop, J Lyle, S Faily
Proceedings of the 21st international conference on World Wide Web, 259-262, 2012
422012
On the challenges of building a web-based ubiquitous application platform
H Desruelle, J Lyle, S Isenberg, F Gielen
Proceedings of the 2012 ACM conference on ubiquitous computing, 733-736, 2012
342012
Guidelines for integrating personas into software engineering tools
S Faily, J Lyle
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013
322013
Cross-platform access control for mobile web applications
J Lyle, S Monteleone, S Faily, D Patti, F Ricciato
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
312012
Trustworthy Services Through Attestation
J Lyle
31*2011
Requirements sensemaking using concept maps
S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore
Human-Centered Software Engineering: 4th International Conference, HCSE 2012 …, 2012
272012
Usability and security by design: a case study in research and development
S Faily, J Lyle, I Fléchais, A Simpson
Internet Society, 2015
242015
Managing application whitelists in trusted distributed systems
JH Huh, J Lyle, C Namiluko, A Martin
Future Generation Computer Systems 27 (2), 211-226, 2011
23*2011
Provenance as a security control
A Martin, J Lyle, C Namilkuo
Proceedings of the 4th USENIX conference on Theory and Practice of …, 2012
222012
Trustable remote verification of web services
J Lyle
International Conference on Trusted Computing, 153-168, 2009
222009
On the Design and Development of webinos: A Distributed Mobile Application Middleware
J Lyle, S Faily, I Fléchais, A Paul, A Göker, H Myrhaug, H Desruelle, ...
Distributed Applications and Interoperable Systems: 12th IFIP WG 6.1 …, 2012
172012
Model-driven architectural risk analysis using architectural and contextualised attack patterns
S Faily, J Lyle, C Namiluko, A Atzeni, C Cameroni
Proceedings of the Workshop on Model-Driven Security, 1-6, 2012
142012
Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project
T Su, J Lyle, A Atzeni, S Faily, H Virji, C Ntanos, C Botsikas
Hardware and Software: Verification and Testing: 9th International Haifa …, 2013
122013
Personal PKI for the Smart Device Era
J Lyle, A Paverd, J King-Lacroix, A Atzeni, H Virji, I Flechais, S Faily
Public Key Infrastructures, Services and Applications: 9th European Workshop …, 2013
102013
Trustworthy log reconciliation for distributed virtual organisations
JH Huh, J Lyle
TRUST, Lecture Notes in Computer Science, Springer, 169-182, 2009
92009
Multi-device application middleware: leveraging the ubiquity of the Web with webinos
H Desruelle, S Isenberg, J Lyle, F Gielen
The Journal of Supercomputing 66, 4-20, 2013
72013
Engineering attestable services
J Lyle, A Martin
Trust and Trustworthy Computing: Third International Conference, TRUST 2010 …, 2010
72010
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20