Andrew Simpson : Publications
Click here to download all publications in a single bibtex file
@inproceedings{Woods_et_al_2022, title = "Characterising 0-Day Exploit Brokers", author = "Matthias Dellago and Daniel Woods and Andrew Simpson", year = "2022", booktitle = "Proceedings of WEIS 2022", }
@inproceedings{Malliouris_and_Simpson_2020, title = "Non-obvious Costs of Cyber Security Breaches: Changes in Systematic Risk", author = "Dennis Malliouris and Andrew Simpson", year = "2020", booktitle = "WEIS 2020", }
@inproceedings{Walshe_and_Simpson_2020, title = "An Empirical Study of Bug Bounty Programs", author = "Thomas Walshe and Andrew Simpson", year = "2020", booktitle = "Proceedings of the 2nd IEEE Workshop on Intelligent Bug Fixing (IBF 2020)", }
@inproceedings{Quinlan_et_al_2019, title = "Connected Vehicles: A Privacy Analysis", author = "Mark Quinlan and Jun Zhao and Andrew Simpson", year = "2019", booktitle = "Proceedings of the 8th International Symposium on Security and Privacy on Internet of Things (SPIoT 2018)", url = "https://ora.ox.ac.uk/objects/uuid:32cf180a-bdab-482f-8e24-62f43484d6c5/download_file?file_format=pdf&safe_filename=main.pdf&type_of_work=Conference+item", }
@inproceedings{Simpson_2019, title = "Teaching Introductory Formal Methods and Discrete Mathematics to Software Engineers: Reflections on a modelling-focussed approach", author = "Andrew Simpson", year = "2019", booktitle = "Proceedings of FMTea 2019", }
@inproceedings{Liu_and_Simpson_2019, title = "On the trade-off between privacy and utility in mobile services: A qualitative study", author = "Yang Liu and Andrew Simpson", year = "2019", booktitle = "Proceedings of the 1st Workshop on Security, Privacy, Organizations, and Systems Engineering (SPOSE 2019)", }
@inproceedings{Zibak_and_Simpson_2019_ARES, title = "Cyber Threat Information Sharing: Perceived Benefits and Barriers", author = "Adam Zibak and Andrew Simpson", year = "2019", booktitle = "Proceedings of CyberTim 2019", }
@inproceedings{Zibak_and_Simpson_2019, title = "Towards Better Understanding of Cyber Security Information Sharing", author = "A. Zibak and A. C. Simpson", year = "2019", booktitle = "CyberSA 2019", }
@inproceedings{Malliouris_and_Simpson_2019, title = "The stock market impact of information security investments: The case of security standards", author = "D. Malliouris and A. C. Simpson", year = "2019", booktitle = "WEIS 2019", }
@inproceedings{Woods_et_al_2019, title = "The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices", author = "D. Woods and T. Moore and A. C. Simpson", year = "2019", booktitle = "WEIS 2019", }
@article{Alshammari_and_Simpson_2018b, title = "A model-based approach to support privacy compliance", author = "Majed Alshammari and Andrew Simpson", year = "2018", journal = "Information and Computer Security", }
@inproceedings{Alshammari_and_Simpson_2018e, title = "Privacy Architectural Strategies: An Approach for Achieving Various Levels of Privacy Protection", author = "Majed Alshammari and Andrew Simpson", year = "2018", booktitle = "Proceedings of the 2018 Workshop on Privacy in the Electronic Society", }
@inproceedings{Woods_and_Simpson_2018c, title = "Cyber-warranties as a quality signal for information security products", author = "Daniel Woods and Andrew Simpson", year = "2018", booktitle = "Proceedings of GameSec 2018", }
@inproceedings{Alshammari_and_Simpson_DPM2018, title = "Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Analysis", author = "Majed Alshammari and Andrew Simpson", year = "2018", booktitle = "Proceedings of the 13th DPM International Workshop on Data Privacy Management (DPM 2018)", }
@inproceedings{Ceross_and_Simpson_2018, title = "Rethinking the Proposition of Privacy Engineering", author = "Aaron Ceross and Andrew Simpson", year = "2018", booktitle = "Proceedings of NSPW 2018", }
@inproceedings{Alshammari_and_Simpson_2018_TrustBus, title = "Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment", author = "Alshammari, M. and Simpson, A.~C.", year = "2018", booktitle = "Proceedings of TrustBus 2018", }
@inproceedings{Woods_and_Simpson_2018_Glasgow, title = "Towards Integrating Insurance Data into Information Security Investment Decision Making", author = "Daniel Woods and Andrew Simpson", year = "2018", booktitle = "Proceedings of the 2018 International Workshop on Cyber Insurance and Risk Controls", }
@inproceedings{Zibak_and_Simpson_2018, title = "Can We Evaluate the Impact of Cyber Security Information Sharing?", author = "Adam Zibak and Andrew Simpson", year = "2018", booktitle = "Proceedings of Cyber SA 2018", }
@inproceedings{Woods_and_Simpson_WEIS2018, title = "Monte Carlo methods to investigate how aggregated cyber insurance claims data impacts security investments", author = "Daniel Woods and Andrew Simpson", year = "2018", booktitle = "Proceedings of the 17th Annual Workshop on the Economics of Information Security (WEIS 2018)", }
@techreport{RR-18-01, title = "Towards an effective PIA-based Risk Analysis: An Approach for Analysing Potential Privacy Risks", author = "Majed Alshammari and Andrew Simpson", year = "2018", address = "Oxford, UK", institution = "Department of Computer Science", number = "RR-18-01", pages = "20", }
@article{Long_et_al_2017, title = "{LEFT} --- a web-based tool for the remote measurement and estimation of ecological value across global landscape", author = "Long P.~R. and Benz D. and Macias-Fauria, M. and Seddon A.~W.~R. and Holland P.~W.~A. and Martin A.~C. and Hagemann, R. and Frost, T.~K. and Simpson, A.~C. and Power, D.~J. and Slaymaker, M.~A. and Willis, K.~J.", year = "2017", journal = "Methods in Ecology and Evolution", }
@article{Osborn_and_Simpson_2017b, title = "Risk and the Small-Scale Cyber Security Decision Making Dialogue --- a UK Case Study", author = "Emma Osborn and Andrew Simpson", year = "2017", howpublished = "Accepted for publication in The Computer Journal", }
@article{Woods_and_Simpson_2017, title = "Policy measures and cyber insurance: A framework", author = "Daniel Woods and Andrew Simpson", year = "2017", journal = "Journal of Cyber Policy", }
@article{Liu_and_Simpson_2017_TCJ, title = "AdSelector: A privacy-preserving advertisement selection mechanism for mobile devices", author = "Liu, Y. and Simpson, A.~C.", year = "2017", journal = "The Computer Journal, Volume 60, Issue 8, Pages 1251–1270", }
@inproceedings{dos_Santos_et_al_2017, title = "A Formal Model to Facilitate Security Testing in Modern Automotive Systems", author = "dos Santos, E. and Schoop, D. and Simpson, A.~C.", year = "2017", booktitle = "Proceedings of {FM}\&{MDD} 2017", }
@inproceedings{Alshammari_and_Simpson_SECPRE2017, title = "A UML Profile for Privacy-Aware Data Lifecycle Models", author = "Majed Alshammari and Andrew Simpson", year = "2017", booktitle = "Proceedings of the 1st SECPRE workshop", }
@inproceedings{Alshammari_and_Simpson_SPBP, title = "Personal Data Management: An Abstract Personal Data Lifecycle Model", author = "Majed Alshammari and Andrew Simpson", year = "2017", booktitle = "Proceedings of the SPBP'17 workshop", }
@inproceedings{Ceross_and_Simpson_2017, title = "The use of data protection regulatory actions as a data source for privacy economics", author = "Aaron Ceross and Andrew Simpson", year = "2017", booktitle = "Proceedings of TELERISE 2017", }
@inproceedings{Ankele_and_Simpson_2017, title = "On the Performance of a Trustworthy Remote Entity in Comparison to Secure Multi-Party Computation", author = "Robin Ankele and Andrew Simpson", year = "2017", booktitle = "Proceedings of the 3rd IEEE International Workshop on Cloud Security and Forensics ({WCSF 2017})", }
@inproceedings{Alshammari_and_Simpson_APF2017, title = "Towards a Principled Approach for Engineering Privacy by Design", author = "Majed Alshammari and Andrew Simpson", year = "2017", booktitle = "Proceedings of the 2017 ENISA Annual Privacy Forum (APF 2017)", }
@techreport{CS-RR-17-02, title = "Personal Data Management for Privacy Engineering: An Abstract Personal Data Lifecycle Model", author = "Majed Alshammari and Andrew Simpson", year = "2017", address = "Oxford UK", institution = "Department of Computer Science", number = "CS-RR-17-02", pages = "10", }
@misc{Osborn_and_Simpson_2017, title = "On Small-Scale IT Users' System Architectures and Cyber Security: A UK Case Study", author = "Emma Osborn and Andrew Simpson", year = "2017", }
@article{Heitzenrater_and_Simpson_JoCS, title = "Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures", author = "Chad Heitzenrater and Andrew Simpson", year = "2016", journal = "Journal of Cyber Security", doi = "10.1093/cybsec/tyw008", }
@article{Liu_and_Simpson_2016, title = "Privacy-preserving targeted mobile advertising: Requirements, design, and a prototype implementation", author = "Liu, Y. and Simpson, A.~C.", year = "2016", journal = "Software: Practice and Experience", number = "12", pages = "1657-1684", volume = "46", }
@article{Osborn_and_Simpson_2016, title = "On safety and security requirements in emerging ubiquitous computing models", author = "Emma Osborn and Andrew Simpson", year = "2016", journal = "Accepted for publication in The Computer Journal", }
@article{Jacobs_Simpson_SoSym_2015, title = "On The Formal Interpretation and Behavioural Consistency Checking of {SysML} Blocks", author = "J. Jacobs and A. C. Simpson", year = "2016", issn = "1619-1366", journal = "International Journal on Software and Systems Modeling", }
@conference{kucuk2016, title = "Exploring the use of Intel SGX for Secure Many-Party Applications", author = "Küçük, K.A. and Paverd, A. and Martin, A. and N. Asokan, and Simpson, A. and Ankele, R.", year = "2016", address = "New York, NY, USA", booktitle = "Proceedings of the 1st Workshop on System Software for Trusted Execution (SysTEX '16)", isbn = "978-1-4503-4670-2", location = "Trento, Italy", note = "The theoretical construct of a Trusted Third Party (TTP) has the potential to solve many security and privacy challenges. In particular, a TTP is an ideal way to achieve secure multiparty computation---a privacy-enhancing technique in which mutually distrusting participants jointly compute a function over their private inputs without revealing these inputs. Although there exist cryptographic protocols to achieve this, their performance often limits them to the two-party case, or to a small number of participants. However, many real-world applications involve thousands or tens of thousands of participants. Examples of this type of many-party application include privacy-preserving energy metering, location-based services, and mobile network roaming. Challenging the notion that a trustworthy TTP does not exist, recent research has shown how trusted hardware and remote attestation can be used to establish a sufficient level of assurance in a real system such that it can serve as a trustworthy remote entity (TRE). We explore the use of Intel SGX, the most recent and arguably most promising trusted hardware technology, as the basis for a TRE for many-party applications. Using privacy-preserving energy metering as a case study, we design and implement a prototype TRE using SGX, and compare its performance to a previous system based on the Trusted Platform Module (TPM). Our results show that even without specialized optimizations, SGX provides comparable performance to the optimized TPM system, and therefore has significant potential for large-scale many-party applications.", publisher = "ACM", url = "https://dl.acm.org/doi/abs/10.1145/3007788.3007793", doi = "10.1145/3007788.3007793", }
@inproceedings{dos_Santos_et_al_2016, title = "Formal Models for Automotive Systems and Vehicular Networks: Benefits and Challenges", author = "dos Santos, E. and Schoop, D. and Simpson, A.~C.", year = "2016", booktitle = "Proceedings of VNC 2016", }
@inproceedings{Heitzenrater_and_Simpson_2016_SecDev, title = "Software Security Investment: The Right Amount of a Good Thing", author = "Chad Heitzenrater and Andrew Simpson", year = "2016", booktitle = "Proceedings of the 1st IEEE Cybersecurity Development Conference ({SecDev 2016})", }
@inproceedings{Liu_and_Simpson_2016_DPM, title = "Privacy-Preserving Targeted Mobile Advertising: Formal Models and Analysis", author = "Liu, Y. and Simpson, A.~C.", year = "2016", booktitle = "Proceedings of the 11th International Workshop on Data Privacy Management ({DPM 2016})", }
@inproceedings{Heitzenrater_and_Simpson_NSPW2016, title = "A Case for the Economics of Secure Software Development", author = "Chad Heitzenrater and Andrew Simpson", year = "2016", booktitle = "Proceedings of NSPW 2016", }
@inproceedings{Heitzenrater_and_Simpson_2016c, title = "Misuse, Abuse, and Reuse: Economic utility functions for characterising security requirements", author = "Heitzenrater, C. and Simpson, A.~C.", year = "2016", booktitle = "Proceedings of The Second International Workshop on Agile Secure Software Development ({ASSD 2016})", }
@inproceedings{Heizenrater_and_Simpson_2016b, title = "Motivating Security Engineering with Economics: A Utility Function Approach", author = "Heitzenrater, C. and King-Lacroix, J. and Simpson, A.~C.", year = "2016", booktitle = "Proceedings of The 1st IEEE International Workshop on Cyber Resiliency Economics ({CRE 2016})", }
@inproceedings{Ankele_et_al_2016, title = "Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications", author = "Ankele, R. and Küçük, K.A. and Martin, A.P. and Simpson, A.C. and Paverd, A.", year = "2016", booktitle = "Proceedings of the 13th IEEE International Conference on Advanced and Trusted Computing (ATC 2016)", note = "The significant improvements in technology that have been seen in recent years have resulted in a shift in the computing paradigm: from isolated computational tasks to distributed tasks executed in multi-party settings. Secure Multi-Party Computation (MPC) allows for multiple parties to jointly compute a function on their private inputs. Unfortunately, traditional MPC algorithms are inefficient in the presence of a large number of participants. Moreover, in the traditional setting, MPC is only concerned with privacy of the input values. However, there is often a need to preserve the privacy of individuals on the basis of the output of the computation. Techniques proposed by the Trusted Computing community have shown promise in the context of new secure, efficient large-scale applications. In this paper, we define, analyse several use cases related to large-scale applications of the MPC paradigm. From these use cases, we derive requirements, criteria to evaluate certain MPC protocols used for large-scale applications. Furthermore, we propose the utilisation of a Trustworthy Remote Entity, privacy-preserving algorithms to achieve confidentiality, privacy in such settings.", url = "https://ieeexplore.ieee.org/document/7816873", doi = "10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0077", }
@inproceedings{Heitzenrater_and_Simpson_2016, title = "The Days Before Zero Day: Investment Models for Secure Software Engineering", author = "Chad Heitzenrater and Rainier Bohme and Andrew Simpson", year = "2016", booktitle = "Proceedings of WEIS 2016", }
@inproceedings{Abe_and_Simpson_2016, title = "Formal Models for Privacy", author = "Alan Abe and Andrew Simpson", year = "2016", booktitle = "Proceedings of the 9th International Workshop on Privacy and Anonymity in the Information Society (PAIS 2016)", }
@techreport{RR-16-06, title = "Whither the privacy breach case studies?", author = "Andrew Simpson", year = "2016", address = "Oxford, UK", institution = "Department of Computer Science", number = "RR-16-06", pages = "12", }
@techreport{CS-RR-16-05, title = "Towards a Principled Approach for Engineering Privacy by Design", author = "Majed Alshammari and Andrew Simpson", year = "2016", address = "Oxford, UK", institution = "Department of Computer Science", number = "RR-16-05", pages = "50", }
@inproceedings{Osborn_and_Simpson_2015, title = "Small-Scale Cyber Security", author = "Emma Osborn and Andrew Simpson", year = "2015", booktitle = "Proceedings of IEEE CSCloud 2015", }
@inproceedings{Heitzenrater_and_Simpson_2015a, title = "When the Winning Move is Not to Play: Games of Deterrence in Cyber Security", author = "C. Heitzenrater and A. C. Simpson", year = "2015", booktitle = "Proceedings of the 6th Conference on Decision and Game Theory for Security (GameSec 2015)", }
@inproceedings{Heitzenrater_and_Simpson_2015, title = "Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures", author = "Chad Heitzenrater and Andrew Simpson", year = "2015", booktitle = "Proceedings of WEIS 2015", howpublished = "To appear", }
@inproceedings{Simpson_et_al_2015, title = "Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security", author = "Simpson, A.~C. and Martin, A.~P. and Cremers, C. and Flechais, I. and Martinovic, I. and Rasmussen, K.~B.", year = "2015", booktitle = "Proceedings of ICSE 2015", }
@inproceedings{Faily_et_al_2015, title = "Usability and Security by Design: A Case Study in Research and Development", author = "Faily, S. and Lyle, J. and Flechais, I. and Simpson, A.~C.", year = "2015", booktitle = "Proceedings of the 2015 {NDSS} Workshop on Usable Security ({USEC 2015})", publisher = "Internet Society", }
@inproceedings{Jacobs_Simpson_FTSCS_2014, title = "A Formal Model of {SysML} Blocks using {CSP} for Assured Systems Engineering", author = "Jacobs, J. and Simpson, A.~C.", year = "2015", booktitle = "Proceedings of the 3rd International Workshop on Formal Techniques for Safety-Critical Systems ({FTSCS 2014})", isbn = "??", issn = "1865-0929", pages = "??-??", series = "Communications in Computer and Information Science", volume = "??", }
@article{Wu_and_Simpson_2014, title = "Formal Relational Database Design: An Exercise in Extending the Formal Template Language", author = "Wu, N. and Simpson, A.~C.", year = "2014", journal = "Formal Aspects of Computing", number = "6", pages = "1231--1269", volume = "26", }
@inproceedings{Jacobs_Simpson_SBCARS2014, title = "On the Formal Interpretation of {SysML} Blocks using a Safety Critical Case Study", author = "J. Jacobs and A. C. Simpson", year = "2014", booktitle = "Proceedings of the 8th Brazilian Symposium on Software Components, Architectures and Reuse ({SBCARS} 2014)", isbn = "978-1-4799-7860-1", pages = "95-104", publisher = "IEEE", }
@inproceedings{Jacobs_Simpson_SaFoMe2014, title = "On a Process Algebraic Representation of Sequence Diagrams", author = "J. Jacobs and A. C. Simpson", year = "2014", booktitle = "Proceedings of the 1st International Workshop on Safety and Formal Methods ({SaFoMe} 2014)", isbn = "978-3-319-15201-1", pages = "71--85", publisher = "Springer", series = "Lecture Notes in Computer Science", volume = "8938", }
@inproceedings{Simpson_Jacobs_FTSCS2013, title = "On the Cloud-enabled Refinement Checking of Railway Signalling Interlockings", author = "Simpson, A.~C. and Jacobs, J.", year = "2014", booktitle = "Proceedings of the 2nd International Workshop on Formal Techniques for Safety-Critical Systems ({FTSCS 2013})", isbn = "978-3-319-05415-5", issn = "1865-0929", pages = "195--211", series = "Communications in Computer and Information Science", volume = "419", }
@article{Jacobs_Simpson_ICSEM2013, title = "A Process Algebraic Approach to Decomposition of Communicating {SysML} Blocks", author = "Jacobs, J. and Simpson, A.~C.", year = "2013", journal = "International Journal of Modeling and Optimization", number = "2", pages = "153--157", volume = "3", }
@inproceedings{Jacobs_Simpson_ICFEM2013, title = "Towards a Process Algebra Framework for Supporting Behavioural Consistency and Requirements Traceability in {SysML}", author = "Jacobs, J. and Simpson, A.~C.", year = "2013", booktitle = "Proceedings of the 15th International Conference on Formal Engineering Methods ({ICFEM 2013})", isbn = "978-3-642-41202-8", issn = "0302-9743", pages = "265--280", publisher = "Springer", series = "Lecture Notes in Computer Science", volume = "8144", }
@article{Slaymaker12, title = "On an infrastructure to support sharing and aggregating pre- and post-publication systems biology research data", author = "Mark Slaymaker and James Osborne and Andrew Simpson and David Gavaghan", year = "2012", journal = "Systems and Synthetic Biology", number = "1--2", pages = "35--49", volume = "6", doi = "10.1007/s11693-012-9095-x", }
@inproceedings{Cooper_et_al_2012, title = "Virtual experiments for reusable models", author = "Jonathan Cooper and Gary Mirams and Mark Slaymaker and Andrew Simpson and Jon Olav Vik and Dagmar Waltemath", year = "2012", booktitle = "Proceedings of VPH 2012", }
@article{Simpson_2011, title = "On privacy and public data: A study of data.gov.uk", author = "Simpson, A.~C.", year = "2011", journal = "Journal of Privacy \& Confidentiality", number = "1", pages = "51--65", volume = "3", }
@inproceedings{Power_et_al_2011, title = "Conformance checking of dynamic access control policies", author = "Power, D.~J. and Slaymaker, M.~A. and Simpson, A.~C.", year = "2011", booktitle = "Proceedings of the 13th International Conference on Formal Methods and Software Engineering ({ICFEM 2011})", pages = "227--242", publisher = "Springer", series = "Lecture Notes in Computer Science", volume = "6255", }
@inproceedings{ESSOS11, title = "Automatic conformance checking of role-based access control policies via Alloy", author = "David Power and Mark Slaymaker and Andrew Simpson", year = "2011", booktitle = "Proceedings of Engineering Secure Software and Systems (ESSoS 2011)", pages = "15--28", publisher = "Springer-Verlag Lecture Notes in Computer Science, volume 6542", }
@article{Simpson_et_al_2010b, title = "{GIMI}: The past, the present, and the future", author = "Simpson, A.~C. and Power, D.~J. and Russell, D. and Slaymaker, M.~A. and Bailey, V. and Tromans, C.~E. and Brady, J.~M. and Tarassenko, L.", year = "2010", journal = "Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences", pages = "3891--3905", volume = "368", }
@inproceedings{Simpson_et_al_2010b, title = "On the secure sharing and aggregation of data to support Systems Biology research", author = "Andrew Simpson and Mark Slaymaker and David Gavaghan", year = "2010", booktitle = "Proceedings of the 7th International Conference on Data Integration in the Life Sciences (DILS 2010)", pages = "58--73", publisher = "Springer-Verlag Lecture Notes in Computer Science, volume 6254", }
@inproceedings{Power-2010, title = "On the modelling and analysis of Amazon Web Services access policies", author = "David Power and Mark Slaymaker and Andrew Simpson", year = "2010", booktitle = "Proceedings of Abstract State Machines, Alloy, B and Z (ABZ 2010)", pages = "394", publisher = "Springer-Verlag Lecture Notes in Computer Science, volume 5977", }
@inproceedings{Slaymaker-2010, title = "Formalising and validating RBAC-to-XACML translation using lightweight formal methods", author = "Mark Slaymaker and David Power and Andrew Simpson", year = "2010", booktitle = "Proceedings of Abstract State Machines, Alloy, B and Z (ABZ 2010)", pages = "349--362", publisher = "Springer-Verlag Lecture Notes in Computer Science, volume 5977", }
@inproceedings{Wu_and_Simpson_2010, title = "Towards Formally Templated Relational Database Representations in {Z}", author = "Wu, N. and Simpson, A.~C.", year = "2010", booktitle = "Proceedings of the 2nd International Conference on Abstract State Machines, Alloy, B and Z ({ABZ} 2010)", pages = "363--376", publisher = "Springer", series = "Lecture Notes in Computer Science", volume = "5977", }
@techreport{RR-09-15, title = "On the modelling and analysis of {Amazon Web Services} access policies", author = "David Power and Mark Slaymaker and Andrew Simpson", year = "2009", institution = "Oxford University Computing Laboratory", month = "November", number = "RR-09-15", pages = "21", }
@article{Power_et_al_2008, title = "On formalising and normalising role-based access control systems", author = "D. J. Power, M. A. Slaymaker, and A. C. Simpson", year = "2009", journal = "The Computer Journal", number = "3", pages = "305-325", volume = "52", doi = "doi:10.1093/comjnl/bxn016", }
@inproceedings{Simpson_et_al_2009b, title = "{GIMI}: the past, the present, and the future", author = "Simpson, A.~C. and Power, D.~J. and Russell, D. and Slaymaker, M.~A. and Bailey, V. and Tromans, C. and Brady, J.~M. and Tarassenko, L.", year = "2009", booktitle = "Proceedings of the 2009 UK e-Science All Hands Meeting", }
@inproceedings{Power_et_al_2009, title = "On the construction and verification of self-modifying access control policies", author = "Power, D.~J. and Slaymaker, M.~A. and Simpson, A.~C.", year = "2009", booktitle = "Proceedings of the 6th {VLDB} Workshop on Secure Data Management ({SDM 2009})", pages = "107--121", publisher = "Springer", series = "Lecture Notes in Computer Science", volume = "5776", }
@inproceedings{Simpson_et_al_2009, title = "On the utilisation of a service-oriented infrastructure to support radiologist training", author = "Simpson, A.~C. and Slaymaker, M.~A. and Yap, M. and Gale, A.~G. and Power, D.~J. and Russell, D.", year = "2009", booktitle = "Proceedings of the 22nd {IEEE} Symposium on Computer-Based Medical Systems (CBMS 2009)", pages = "1--4", publisher = "IEEE Computer Society Press", }
@inproceedings{Russell_et_al_2009, title = "On the secure sharing of legacy data", author = "Russell, D. and Power, D.~J. and Slaymaker, M.~A. and Kouadri Mostefaoui, G.~K. and Ma, X. and Simpson, A.~C.", year = "2009", booktitle = "Proceedings of the 6th International Conference on IT: Next Generation (ITNG 2009)", pages = "1676--1679", publisher = "IEEE", }
@article{Simpson_et_al_2008c, title = "A healthcare-driven framework for facilitating the secure sharing of data across organisational boundaries", author = "Simpson, A.~C. and Power, D.~J. and Russell, D. and Slaymaker, M.~A. and Kouadri-Mostefaoui, G. and Ma, X. and Wilson, G.", year = "2008", journal = "Studies in Health Technology and Informatics", pages = "3--12", volume = "138", }
@inproceedings{Kouadri_Mostefaoui_and_Simpson_2008, title = "On Quality Assurance of Web Services in Agile Projects: An Experience Report", author = "Kouadri Mostefaoui, G. and Simpson, A.~C.", year = "2008", booktitle = "Proceedings of the 3rd ACM Workshop on Software Engineering for Pervasive Services ({SEPS 2008})", pages = "21--26", publisher = "ACM", }
@inproceedings{Tromans et al, 2008, title = "The Application of a Service-Oriented Infrastructure to Support Medical Research in Mammography", author = "Tromans, C. and Brady, J.~M. and Power, D.~J. and Slaymaker, M.~A. and Russell, D. and Simpson, A.~C.", year = "2008", booktitle = "Proceedings of MICCAI-Grid 2008", pages = "43--52", }
@inproceedings{Slaymaker_et_al_2008, title = "On the facilitation of fine-grained access to distributed healthcare data", author = "M. A. Slaymaker, D. J. Power, D. Russell and A. C. Simpson", year = "2008", booktitle = "Proceedings of Secure Data Management 2008", }
@inproceedings{Simpson_2008, title = "On the need for user-defined fine-grained access control policies for social networking applications", author = "Simpson, A.~C.", year = "2008", booktitle = "Proceedings of the 2008 workshop on Security in Opportunistic and SOCial networks (SOSOC 2008)", pages = "Article number 1", publisher = "ACM", }
@inproceedings{Simpson_et_al_2008b, title = "A healthcare-driven framework for facilitating the secure sharing of data across organisational boundaries", author = "Simpson, A.~C. and Power, D.~J. and Russell, D. and Slaymaker, M.~A. and Kouadri-Mostefaoui, G. and Ma, X. and Wilson, G.", year = "2008", booktitle = "Proceedings of HealthGrid 2008", }
@inproceedings{Fong_and_Simpson_2008, title = "On formal descriptions of synchronization requirements in multimedia systems", author = "Fong, A.~C.~M. and Simpson, A.~C.", year = "2008", booktitle = "Proceedings of the 5th International Conference on IT: Next Generation (ITNG 2009)", pages = "1255-1256", publisher = "IEEE", }
@inproceedings{Slaymaker_et_al_2008, title = "Accessing and aggregating legacy data sources for healthcare research, delivery and training", author = "M. A. Slaymaker and D. J. Power and D. Russell and G. Wilson and A. C. Simpson", year = "2008", booktitle = "Proceedings of SAC 2008", }
@incollection{Induruwa-Fernando_and_Simpson_2008, title = "Towards a formal framework for workflow interoperability", author = "Induruwa Fernando, S.~D. and Simpson, A.~C.", year = "2008", booktitle = "Proceedings of WS-FM (Web Services and Formal Methods) 2008", pages = "158--174", publisher = "Springer", series = "Lecture Notes in Computer Science", volume = "5387", }
@incollection{Simpson_et_al_2008, title = "The development, testing, and deployment of a web services infrastructure for distributed healthcare delivery, research, and training", author = "Simpson, A.~C. and Power, D.~J. and Russell, D. and Slaymaker, M.~A. and Kouadri Mostefaoui, G. and Wilson, G. and Ma, X.", year = "2008", booktitle = "Managing Web Services Quality: Measuring Outcomes and Effectiveness", editor = "Khan, K.", pages = "1--22", publisher = "Idea Group", }
@article{Lloyd_et_al_2007a, title = "Integrative Biology: The challenges of developing a collaborative research environment for heart and cancer modelling", author = "Lloyd, S. and Gavaghan, D.~J. and Simpson, A.~C. and Mascord, M. Sieunarine, C. and Williams, G. and Pitt-Francis, J. and Boyd, D.~R.~S. and Mac Randal, D. and Sastry, L. and Nagella, S. Weeks, K. and Fowler, R. and Hanlon, D. and Handley, J. and de Fabritis, G.", year = "2007", journal = "Future Generation Computer Systems", month = "March", number = "3", pages = "457--465", volume = "23", }
@article{Simpson_et_al_2007, title = "On the development of secure service-oriented architectures to support medical research", author = "Simpson, A.~C. and Power, D.~J. and Slaymaker, M.~A. and Russell, D. and Katzarova, M.", year = "2007", journal = "International Journal of Healthcare Information Systems and Informatics", number = "2", pages = "75--89", volume = "2", }
@inproceedings{Kouadri_Mostefaoui_and_Simpson_2007, title = "Practical Experiences of Testing Web Services", author = "Kouadri Mostefaoui, G. and Simpson, A.~C.", year = "2007", booktitle = "Proceedings of the 5th International Workshop on SOA and Web Services Best Practices", }
@inproceedings{Creager_and_Simpson_2007, title = "Empirical analysis and optimization of an {NP}-hard problem using {CSP} and {FDR}", author = "Creager, D.~A. and Simpson, A.~C.", year = "2007", booktitle = "Proceedings of the 2007 Brazilian Symposium on Formal Methods (SBMF 2007)", }
@inproceedings{Momtahan_et_al_2007, title = "Switched lightpaths for e-health applications: Issues and challenges", author = "Momtahan, L. and Lloyd, S. and Simpson, A.~C.", year = "2007", booktitle = "Proceedings of the 20th {IEEE} Symposium on Computer-Based Medical Systems (CBMS 2007)", pages = "459--464", publisher = "IEEE Computer Society Press", }
@inproceedings{Momtahan_and_Simpson_2007, title = "Exploitation of switched lightpaths for e-health: Constraints and challenges", author = "Momtahan, L. and Simpson, A.~C.", year = "2007", booktitle = "Lighting the blue touchpaper for UK e-Science: Closing conference of {ESLEA} project", publisher = "Proceedings of Science", }
@inproceedings{Lloyd_et_al_2007b, title = "Developing collaborative technology for neuro-science", author = "S. Lloyd and A. C. Simpson and D. J. Power and J. Geddes and A. Khanban and J. Palmer", year = "2007", booktitle = "Proceedings of CollaborateCom 2007", }
@inproceedings{Induruwa_et_al_2007, title = "Towards build-time interoperability of workflow definition languages", author = "Induruwa-Fernando, S.~D. and Creager, D.~A. and Simpson, A.~C.", year = "2007", booktitle = "Proceedings of the 9th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNSAC 2007)", pages = "525--532", publisher = "IEEE", }
@article{Fong_and_Simpson_2006, title = "Using {CSP} to model the synchronization process of variable length codes", author = "Fong, A.~C.~M. and Simpson, A.~C.", year = "2006", journal = "IEEE Proc. Communications", month = "April", number = "2", pages = "195--200", volume = "153", }
@article{Ure_et_al_2006, title = "Designing for e-health: recurring scenarios in developing grid-based medical imaging systems", author = "Ure, J. and Geddes, J. and Mackay, C. and Lloyd, S. and Simpson, A.~C. and Power, D.~J. and Russell, D. and Jirotka, M. and Katzarova, M. and Rossor, M. and Fox, N. and Fletcher, J. and Hill, D. and McLeish, K. and Chen, Y. and Hajnal, J.~V. and Lawrie, S. and Job, D. and McIntosh, A. and Wardlaw, J. and Sandercock, P. and Palmer, J. and Perry, D. and Procter, R. and Hartswood, M. and Slack, R. and Voss, A. and Ho, K. and Bath, P. and Clarke, W. and Watson, G.", year = "2006", journal = "Studies in Health Technology and Informatics", pages = "336--347", volume = "120", }
@article{Power_et_al_2006, title = "Securing web services for deployment in health grids", author = "Power, D.~J. and Politou, E.~A. and Slaymaker, M.~A. and Simpson, A.~C.", year = "2006", journal = "Future Generation Computer Systems", number = "5", pages = "547--570", volume = "22", }
@article{Pitt-Francis_et_al_2006, title = "Multimodal imaging techniques for the extraction of detailed geometrical and physiological information for use in multi-scale models of colorectal cancer and treatment of individual patients", author = "Pitt-Francis, J. and Chen, D. and Slaymaker, M.~A. and Simpson, A.~C. and Brady, J.~M. and van Leeuwen, I. and Reddington, F. and Quirke, P. and Gavaghan, D.~J.", year = "2006", journal = "Computational \& Mathematical Methods in Medicine", number = "2\&3", pages = "177--188", volume = "7", }
@article{Jirotka_et_al_2006, title = "Collaboration and trust in healthcare innovation: the eDiaMoND case study", author = "Jirotka, M. and Procter, M. and Hartswood, R. and Slack, C. and Simpson, A.~C. and Coopmans, C. and Hinds, C. and Voss, A.", year = "2006", journal = "Computer Supported Cooperative Work", pages = "369--398", volume = "14", }
@inproceedings{Momtahan_and_Simpson_2006, title = "Switched lightpaths for e-health applications: a feasibility study", author = "L.~Momtahan and A.~C.~Simpson", year = "2006", booktitle = "Proceedings of the 19th {IEEE} Symposium on Computer Based Medical Systems (CBMS 2006)", pages = "469--472", publisher = "{IEEE} Computer Society Press", }
@inproceedings{Slaymaker_et_al_2006, title = "A prototype infrastructure for the secure aggregation of imaging and pathology data for colorectal cancer care", author = "M. A. Slaymaker and A. C. Simpson and J. M. Brady and D. J. Gavaghan and F. Reddington and P. Quirke", year = "2006", booktitle = "Proceedings of the {IEEE} Symposium on Computer Based Medical Systems", publisher = "{IEEE} Computer Society Press", }
@inproceedings{Simpson_et_al_2006, title = "On tracker attacks in health grids", author = "A.~C.~Simpson and D.~J.~Power and M.~A.~Slaymaker", year = "2006", booktitle = "Proceedings of the Annual ACM Symposium on Applied Computing (SAC '06)", pages = "209--216", publisher = "ACM Press", }
@inproceedings{Simpson_2006, title = "Logic, damned logic, and statistics", author = "Simpson, A.~C.", year = "2006", booktitle = "Proceedings of Teaching Formal Methods 2006", }
@inproceedings{Lloyd_and_Simpson_2006, title = "The utilisation of clinical data in research health grids: {eDiaMoND} as a case study", author = "Lloyd, S. and Simpson, A.~C.", year = "2006", booktitle = "Proceedings of {HealthCare} 2006", }
@inproceedings{Katzarova_and_Simpson_2006, title = "Delegation in a distributed healthcare context: a survey of current approaches", author = "M.~Katzarova and A.~C.~Simpson", year = "2006", booktitle = "Proceedings of the 9th Information Security Conference 2006", pages = "517--529", publisher = "Springer", series = "Lecture Notes in Computer Science", volume = "4176", }
@inproceedings{Geddes_et_al_2006, title = "The challenges of developing a collaborative data and compute grid for Neurosciences", author = "J. Geddes and C. Mackay and S. Lloyd and A. C. Simpson and D. J. Power and D. Russell and M. Katzarova and M. Rossor and N. Fox and J. Fletcher and D. Hill and K. McLeish and J. V. Hajnal and S. Lawrie and D. Job and A. McIntosh and J. Wardlaw and P. Sandercocka and J. Palmer and D. Perry and R. Procter and J. Ure and P. Bath and G. Watson", year = "2006", booktitle = "Proceedings of the 19th IEEE Symposium on Computer Based Medical Systems (CBMS 2006)", pages = "81--86", publisher = "{IEEE} Computer Society Press", }
@inproceedings{Creager_and_Simpson_2006b, title = "A fully generic, graph-based approach to data transformation discovery", author = "D.~A. Creager and A.~C.~Simpson", year = "2006", booktitle = "Proceedings of {GMC} ({Graph Computation Models}) 2006", }
@inproceedings{Creager_and_Simpson_2006a, title = "Towards a fully generic theory of data", author = "Creager, D.~A. and Simpson, A.~C.", year = "2006", booktitle = "Proceedings of the 8th International Conference on Formal Engineering Methods ({ICFEM} 2006)", pages = "304--323", publisher = "Springer", series = "Lecture Notes in Computer Science", volume = "4260", }
@article{Gavaghan_et_al_2005, title = "Towards a Grid Infrastructure to support integrative approaches to biological research", author = "Gavaghan, D.~J. and Simpson, A.~C. and Lloyd, S. and Mac Randal, D.~F. and Boyd, D.~R.~S.", year = "2005", journal = "Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences", month = "August", number = "1883", pages = "1829--1841", volume = "363", }
@inproceedings{Simpson_et_al_2005b, title = "Towards fine-grained access control in health grids", author = "Simpson, A.~C. and Power, D.~J. and Slaymaker, M.~A. and Politou, E.~A.", year = "2005", booktitle = "Proceedings of the Ottawa Workshop on New Challenges in Access Control", month = "April", }
@inproceedings{Power_et_al_2005b, title = "Protecting Sensitive Patient Data via Query Modification", author = "Power, D.~J. and Slaymaker, M.~A. and Politou, E.~A. and Simpson, A.~C.", year = "2005", booktitle = "Proceedings of the 20th ACM Symposium on Applied Computing", month = "March", pages = "224-230", }
@article{Lloyd_et_al_2005b, title = "Integrative Biology: exploiting e-Science to combat fatal diseases", author = "Lloyd, S. and Simpson, A.~C. and Sastry, L. and Gavaghan, D.~J. and Boyd, D.~R.S.", year = "2005", journal = "{ERCIM} News", month = "January", volume = "60", }
@article{Slaymaker_et_al_2005, title = "Security Aspects of Grid-enabled Digital Mammography", author = "Slaymaker, M.~A. and Politou, E.~A. and Power, D.~J. and Lloyd, S. and Simpson, A.~C.", year = "2005", journal = "Methods of Information in Medicine", number = "2", pages = "207--210", volume = "44", }
@article{Power_et_al_2005a, title = "Towards secure Grid-enabled healthcare", author = "Power, D.~J. and Politou, E.~A. and Slaymaker, M.~A. and Simpson, A.~C.", year = "2005", journal = "Software: Practice and Experience", number = "9", pages = "857--871", volume = "35", }
@article{Lloyd_et_al_2005a, title = "Digital mammography: a world without film?", author = "Lloyd, S. and Jirotka, M. and Simpson, A.~C. and Highnam, R.~P. and Gavaghan, D.~J. and Watson, D. and Brady, J.~M.", year = "2005", journal = "Methods of Information in Medicine", number = "2", pages = "168--169", volume = "44", }
@inproceedings{Lloyd_and_Simpson_2005, title = "Project management in multi-disciplinary collaborative research", author = "Lloyd, S. and Simpson, A.~C.", year = "2005", booktitle = "Proceedings of {IPCC} (International Professional Communication Conference) 2005, Limerick", pages = "602--611", }
@inproceedings{Simpson_et_al_2005a, title = "{GIMI}: Generic Infrastructure for Medical Informatics", author = "Simpson, A.~C. and Power, D.~J. and Slaymaker, M.~A. and Politou, E.~A.", year = "2005", booktitle = "Proceedings of the 18th {IEEE} Symposium on Computer-Based Medical Systems (CBMS 2005)", pages = "564--566", publisher = "IEEE Computer Society Press", }
@inproceedings{Power_et_al_2005c, title = "On deducibility and anonymisation in medical databases", author = "Power, D.~J. and Slaymaker, M.~A. and Simpson, A.~C.", year = "2005", booktitle = "Proceedings of Secure Data Management 2005", editor = "Jonker, W. and Petkovic, M.", pages = "170--184", publisher = "Springer", series = "Lecture Notes in Computer Science", volume = "3674", }
@inproceedings{Power_et_al_2005f, title = "A secure wrapper for {OGSA-DAI}", author = "Power, D.~J. and Slaymaker, M.~A. and Politou, E.~A. and Simpson, A.~C.", year = "2005", booktitle = "Proceedings of the European Grid Conference, 2005", pages = "485--494", publisher = "Springer", series = "Lecture Notes in Computer Science", volume = "3470", }
@inproceedings{Power_et_al_2005e, title = "On {XACML}, role-based access control, and health grids", author = "Power, D.~J. and Slaymaker, M.~A. and Politou, E.~A. and Simpson, A.~C.", year = "2005", booktitle = "Proceedings of the 2005 UK e-Science All Hands Meeting", }
@inproceedings{Momtahan_and_Simpson_2005, title = "Exploitation of switched lightpaths for e-health", author = "Momtahan, L. and Simpson, A.~C.", year = "2005", booktitle = "Proceedings of the 2005 UK e-Science All Hands Meeting", }
@inproceedings{Mac_Randal_et_al_2005, title = "The Integrative Biology Infrastructure", author = "Mac Randal, D. and Sastry, L. and Hanlon, D. and Gavaghan, D.~J. and Lloyd, S. and Simpson, A.~C.", year = "2005", booktitle = "Proceedings of the 2005 UK e-Science All Hands Meeting", }
@inproceedings{Kinti_et_al_2005, title = "Managing collaborative expertise: issues and challenges", author = "Kinti, I. and Lloyd, S. and Simpson, A.~C. and Hayward, G.", year = "2005", booktitle = "Proceedings of {OKLC} 2005, Boston, MA", }
@inproceedings{Geddes_et_al_2005b, title = "{NeuroGrid}: collaborative neuroscience via grid computing", author = "Geddes, J. and Lloyd, S. and Simpson, A.~C. and Rossor, M. and Fox, N. and Hill, D. and Hajnal, J. and Lawrie, S. and McIntosh, A. and Johnstone, E. and Wardlaw, J. and Perry, D. and Procter, R. and Bath, P. and Bullimore, E.", year = "2005", booktitle = "Proceedings of the 2005 UK e-Science All Hands Meeting", }
@inproceedings{Geddes_et_al_2005a, title = "{NeuroGrid}: using grid technology to advance neuroscience", author = "Geddes, J. and Lloyd, S. and Simpson, A.~C. and Rossor, M. and Fox, N. and Hill, D. and Hajnal, J.~V. and Lawrie, S. and McIntosh, A. and Johnstone, E. and Wardlaw, J. and Perry, D. and Procter, R. and Bath, P. and Bullimore, E.", year = "2005", booktitle = "Proceedings of the 18th {IEEE} Symposium on Computer-Based Medical Systems", pages = "570--573", publisher = "IEEE Computer Society Press", }
@inproceedings{Dovey_et_al_2005, title = "{VRE} for the {Integrative Biology} research consortium", author = "Dovey, M.~J. and Mascord, M. and Gavaghan, D.~J. and Lloyd, S. and Simpson, A.~C. and Williams, G. and Mac Randal, D.", year = "2005", booktitle = "Proceedings of the 2005 UK e-Science All Hands Meeting", }
@inproceedings{Slaymaker_et_al_2004c, title = "A vision for secure grid-enabled healthcare", author = "Slaymaker, M.~A. and Power, D.~J and Politou, E.~A. and Simpson, A.~C.", year = "2004", booktitle = "Workshop on Grid Security Practice and Experience", month = "June", publisher = "Technical Report YCS-2004-380, University of York", }
@inproceedings{Stainforth_et_al_2004, title = "Security principles for public-resource modeling research", author = "Stainforth, D.~A. and Martin, A.~P. and Simpson, A.~C. and Christensen, C.~A. and Kettleborough, J. and Aina, T. and Allen, M.~R.", year = "2004", booktitle = "Proceedings of the {IEEE} International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE-2004)", pages = "319--324", }
@inproceedings{Slaymaker_et_al_2004b, title = "{eDiaMoND}: risk analysis", author = "Slaymaker, M.~A. and Politou, E.~A. and Power, D.~J. and Lloyd, S. and Simpson, A.~C.", year = "2004", booktitle = "Proceedings of HealthGrid 2004, Claremont, France", }
@inproceedings{Slaymaker_et_al_2004a, title = "Security aspects of grid-based digital mammography", author = "Slaymaker, M.~A. and Politou, E.~A. and Power, D.~J. and Lloyd, S. and Simpson, A.~C.", year = "2004", booktitle = "Proceedings of HealthGrid 2004, Claremont, France", }
@inproceedings{Slaymaker_et_al_2004d, title = "e-health security issues: the {eDiaMoND} perspective", author = "Slaymaker, M.~A. and Politou, E.~A. and Power, D.~J. and Lloyd, S.", year = "2004", booktitle = "Proceedings of the 2004 UK e-Science All Hands Meeting", }
@inproceedings{Power_et_al_2004, title = "An Approach to the Storage of {DICOM} files for {Grid}-Enabled Medical Imaging Databases", author = "Power, D.~J. and Politou, E.~A. and Slaymaker, M.~A. and Harris, S. and Simpson, A.~C.", year = "2004", booktitle = "Proceedings of the 19th ACM Symposium on Applied Computing", pages = "272--279", }
@inproceedings{Lloyd_et_al_2004b, title = "{eDiaMoND}: challenges for the e-scientist in the e-health domain", author = "Lloyd, S. and Simpson, A.~C. and Gavaghan, D.~J. and Brady, J.~M.", year = "2004", booktitle = "Proceedings of the 2004 UK e-Science All Hands Meeting", }
@inproceedings{Lloyd_et_al_2004a, title = "Digital mammography: a world without film?", author = "Lloyd, S. and Jirotka, M. and Simpson, A.~C. and Highnam, R.~P. and Gavaghan, D.~J. and Watson, D. and Brady, J.~M.", year = "2004", booktitle = "Proceedings of HealthGrid 2004, Claremont, France", }
@inproceedings{Gavaghan_et_al_2004, title = "{Integrative Biology}: exploiting {e-Science} to combat fatal diseases", author = "Gavaghan, D.J. and Lloyd, S. and Boyd, D.~R.~S. and Jeffreys, P.~W. and Simpson, A.~C. and Mac Randal, D.~F. and Sastry, L. and Kleese van Dam, K.", year = "2004", booktitle = "Proceedings of the 2004 UK e-Science All Hands Meeting", }
@inproceedings{Davies_et_al_2004, title = "Teaching Formal Methods in Context", author = "Davies, J.~W. and Simpson, A.~C. and Martin, A.~P.", year = "2004", booktitle = "Proceedings of CoLogNet / Formal Methods Europe Symposium on Teaching Formal Methods 2004", editor = "Dean, C.~N. and Boute, R.~F.", pages = "186--202", publisher = "Springer", series = "Lecture Notes in Computer Science", volume = "3294", }
@inproceedings{Brady_et_al_2004, title = "{eDiaMoND}: the {UK}'s national digital mammography database", author = "Brady, J.~M. and Gilbert, F. and Lloyd, S. and Jirotka, M. and Gavaghan, D.~J. and Simpson, A.~C. and Highnam, R.~P. and Bowles, T. and Schottlander, D. and McCabe, D. and Watson, D. and Collins, B. and Williams, J. and Knox, A. and Oevers, M. and Taylor, P.", year = "2004", booktitle = "Proceedings of {IWDM} 2004", }
@inproceedings{Martin_and_Simpson_2003, title = "Generalizing the {Z} Schema Calculus: Database Schemas and Beyond", author = "Martin, A.~P. and Simpson, A.~C.", year = "2003", booktitle = "Proceedings of the 10th Asia-Pacific Software Engineering Conference ({APSEC 2003})", pages = "28--37", publisher = "IEEE", }
@inproceedings{Simpson_et_al_2003, title = "On the supervision and assessment of part-time postgraduate software engineering projects", author = "Simpson, A~C. and Martin, A.~P. and Gibbons, J. and Davies, J.~W. and McKeever, S.~W.", year = "2003", booktitle = "Proceedings of the 25th International Conference on Software Engineering (ICSE), Portland, Oregon, 3--10 May, 2003", pages = "628--633", publisher = "{IEEE} Computer Society Press", }
@inproceedings{Simpson_and_Martin_2003, title = "Supplementing the understanding of {Z}: a formal approach to database design", author = "Simpson, A.~C. and Martin, A.~P.", year = "2003", booktitle = "Proceedings of the BCS Teaching Formal Methods workshop", publisher = "BCS", }
@inproceedings{Power_et_al_2003, title = "An approach to the storage of {DICOM} files for grid-enabled medical imaging databases", author = "Power, D.~J. and Politou, E.~A. and Slaymaker, M.~A. and Harris, S. and Simpson, A.~C.", year = "2003", booktitle = "Proceedings of the 2003 UK e-Science All Hands Meeting", }
@inproceedings{Brady_et_al_2003b, title = "Grid computing for digital mammography", author = "Brady, J.~M. and Gavaghan, D.~J. and Highnam, R.~P. and Knox, A. and Lloyd, S. and Simpson, A.~C. and Watson, D.", year = "2003", booktitle = "Proceedings of the 2003 UK e-Science All Hands Meeting", }
@incollection{Brady_et_al_2003a, title = "{eDiaMoND}: A Grid-enabled federated database of annotated mammograms", author = "Brady, J.~M. and Gavaghan, D.~J. and Simpson, A.~C. and Mulet-Parada, M. and Highnam, R.~P.", year = "2003", booktitle = "Grid Computing: Making the Global Infrastructure a Reality", editor = "Berman, F. and Fox, G.~C. and Hey, A.~J.~G.", pages = "923--943", publisher = "Wiley Series", }
@book{Simpson_2002, title = "Discrete Mathematics by Example", author = "Simpson, A.~C.", year = "2002", publisher = "McGraw-Hill", }
@inproceedings{Stainforth_et_al_2002a, title = "Climate\emph{prediction}.net: design principles for public resource modelling research", author = "Stainforth, D. and Kettleborough, J. and Martin, A.~P. and Simpson, A.~C. and Gillis, R. and Akkas, A. and Gault, R. and Collins, M. and Gavaghan, D.~J. and Allen, M.", year = "2002", booktitle = "Proc. 14th IASTED conference on parallel and distributed computing systems.", }
@inproceedings{Stainforth_et_al_2002b, title = "climate\emph{prediction}.com: security and design planning", author = "Stainforth, D. and Kettleborough, J.~A. and Martin, A.~P. and Simpson, A.~C. and Martin, A.~P. and Gillis, R. and Akkas, A. and Gault, R. and Collins, M. and Gavaghan, D.~J. and Allen, M.", year = "2002", booktitle = "Proceedings of the 2002 UK e-Science All Hands Meeting", }
@inproceedings{Brady_et_al_2002, title = "{eDiamond}: Digital Mammography", author = "Brady, J.~M. and Gavaghan, D.~J. and Highnam, R.~P. and Mulet-Parada, M. and Simpson, A.~C.", year = "2002", booktitle = "Proceedings of the 2002 UK e-Science All Hands Conference", }
@inproceedings{Simpson_et_al_1999, title = "{BSP} in {CSP}: Easy as {ABC}", author = "Simpson, A.~C. and Hill, J.~M.~D. and Donaldson, S.~R.", year = "1999", booktitle = "Proceedings of Fourth International Workshop on Formal Methods for Parallel Programming: Theory and Applications, San Juan, Puerto Rico, April 1999", pages = "1299--1313", publisher = "Springer", series = "Lecture Notes in Computer Science", }
@techreport{Simpson_1999, title = "Towards the mechanical verification of moving block signalling systems", author = "Simpson, A.~C.", year = "1999", institution = "School of Computing and Mathematical Sciences, Oxford Brookes University", number = "CMS-TR-99-06", }
@inproceedings{Simpson_1998, title = "Model Checking for Interlocking Safety", author = "Simpson, A.~C.", year = "1998", booktitle = "Proceedings of the 2nd {FMERail} Seminar, 15--16 October 1998, London, United Kingdom", }
@inproceedings{Simpson_et_al_1998b, title = "Security management via {Z} and {CSP}", author = "Simpson, A.~C. and Davies, J.~W. and Woodcock, J.~C.~P.", year = "1998", booktitle = "Proceedings of Formal Methods Pacific '98, Canberra, Australia, 29 September -- 2 October, 1998", pages = "334--351", publisher = "Springer Series in Discrete Mathematics and Theoretical Computer Science", }
@incollection{Simpson_et_al_1998a, title = "Safety through Security", author = "Simpson, A.~C. and Woodcock, J.~C.~P. and Davies, J.~W.", year = "1998", booktitle = "Proceedings of the 9th International Workshop on Software Specification and Design", pages = "18--24", publisher = "{IEEE} Computer Society Press", }
@incollection{Simpson_et_al_1997, title = "The Mechanical Verification of {S}olid {S}tate {I}nterlocking Geographic Data", author = "Simpson, A.~C. and Woodcock, J.~C.~P. and Davies, J.~W.", year = "1997", booktitle = "Proceedings of Formal Methods Pacific, Wellington, New Zealand, 9--11 July", editor = "Groves, L. and Reeves, S.", pages = "223--242", publisher = "Springer", }
@inproceedings{Burn-Thornton_et_al_1996b, title = "A Novel Data Mining Tool for {ATM} Networks", author = "Burn-Thornton, K.~E. and Cattrall, D.~M. and Simpson, A.~C.", year = "1996", booktitle = "Proceedings of IEE conference on Data Mining", }
@inproceedings{Burn-Thornton_et_al_1996a, title = "Polymorphic Functions for Data Mining in an {ATM} Network", author = "Burn-Thornton, K.~E. and Cattrall, D.~M. and Simpson, A.~C.", year = "1996", booktitle = "Proceedings of the 4th IFIP conference on ATM Networks", }
@misc{Simpson_1996, title = "Safety through Security", author = "Simpson, A.~C.", year = "1996", howpublished = "DPhil thesis, Oxford University Computing Laboratory", }
@inproceedings{Simpson_1995a, title = "Railway Signalling as a case study in Safety through Determinism", author = "Simpson, A.~C.", year = "1995", booktitle = "Proceedings of Aspect 1995", publisher = "Institution of Railway Signal Engineers", }
@incollection{Simpson_1995b, title = "The Application of Formal Methods to the Development of an {A}{T}{P} ({A}utomatic {T}rain {P}rotection) System", author = "Simpson, A.~C.", year = "1995", booktitle = "Proceedings of the 1995 IEE Colloquium on Communication Networks in Transportation", publisher = "IEE", }
@incollection{Simpson_1994, title = "A Formal Specification of an {A}utomatic {T}rain {P}rotection System", author = "Simpson, A.~C.", year = "1994", booktitle = "Proceedings of the 2nd International Symposium of Formal Methods Europe ({FME 1994})", editor = "Naftalin, M. and Denvir, T. and Bertran, M.", pages = "602--617", publisher = "Springer", series = "Lecture Notes in Computer Science", volume = "873", }