Models and technologies for secure data sharing
Our research considers the theoretical and practical issues surrounding secure, assured data sharing in data-driven environments.
Past Members
Selected Publications
-
On formalising and normalising role−based access control systems
D. J. Power M. A. Slaymaker and A. C. Simpson
In The Computer Journal. Vol. 52. No. 3. Pages 305−325. 2009.
Details about On formalising and normalising role−based access control systems | BibTeX data for On formalising and normalising role−based access control systems | DOI (doi:10.1093/comjnl/bxn016)
-
Formalising and validating RBAC−to−XACML translation using lightweight formal methods
Mark Slaymaker‚ David Power and Andrew Simpson
In Proceedings of Abstract State Machines‚ Alloy‚ B and Z (ABZ 2010). Pages 349–362. Springer−Verlag Lecture Notes in Computer Science‚ volume 5977. 2010.
Details about Formalising and validating RBAC−to−XACML translation using lightweight formal methods | BibTeX data for Formalising and validating RBAC−to−XACML translation using lightweight formal methods
-
GIMI: The past‚ the present‚ and the future
A. C. Simpson‚ D. J. Power‚ D. Russell‚ M. A. Slaymaker‚ V. Bailey‚ C. E. Tromans‚ J. M. Brady and L. Tarassenko
In Philosophical Transactions of the Royal Society A: Mathematical‚ Physical and Engineering Sciences. Vol. 368. Pages 3891–3905. 2010.
Details about GIMI: The past‚ the present‚ and the future | BibTeX data for GIMI: The past‚ the present‚ and the future