Cornelius Namiluko : Publications
-
[1]
Towards Enhancing Web Application Security Using Trusted Execution
Cornelius Namiluko‚ Andrew J Paverd and Tulio De Souza
In Workshop on Web Applications and Secure Hardware − WASH'13. 2013.
Details about Towards Enhancing Web Application Security Using Trusted Execution | BibTeX data for Towards Enhancing Web Application Security Using Trusted Execution | Download (pdf) of Towards Enhancing Web Application Security Using Trusted Execution
-
[2]
Model−driven architectural risk analysis using architectural and contextualised attack patterns
Shamal Faily‚ John Lyle‚ Cornelius Namiluko‚ Andrea Atzeni and Cesare Cameroni
In Proceedings of the Workshop on Model−Driven Security. Pages 3:1–3:6. ACM. 2012.
Details about Model−driven architectural risk analysis using architectural and contextualised attack patterns | BibTeX data for Model−driven architectural risk analysis using architectural and contextualised attack patterns | Download (pdf) of Model−driven architectural risk analysis using architectural and contextualised attack patterns
-
[3]
Provenance as a Security Control
Andrew Martin‚ John Lyle and Cornelius Namiluko
In Proceedings of TaPP'12: the 4th USENIX Workshop on the Theory and Practice of Provenance. USENIX. 2012.
Details about Provenance as a Security Control | BibTeX data for Provenance as a Security Control | Link to Provenance as a Security Control
-
[4]
Provenance−Based Model for Verifying Trust−Properties
Cornelius Namiluko and Andrew Martin
In Stefan Katzenbeisser‚ Edgar Weippl‚ L. Camp‚ Melanie Volkamer‚ Mike Reiter and Xinwen Zhang, editors, TRUST AND TRUSTWORTHY COMPUTING. Vol. 7344/2012 of Lecture Notes in Computer Science. Pages 255−272. Springer Berlin / Heidelberg. 2012.
Details about Provenance−Based Model for Verifying Trust−Properties | BibTeX data for Provenance−Based Model for Verifying Trust−Properties | DOI (10.1007/978-3-642-30921-2_15) | Link to Provenance−Based Model for Verifying Trust−Properties
-
[5]
Insiders Analysis in Cloud Computing Focusing on Home Healthcare System
Imad M. Abbadi‚ Cornelius Namiluko and Andrew Martin
In The 6th International Conference for Internet Technology and Secured Transactions (ICITST−2011). Pages 350–357. IEEE. December, 2011.
Details about Insiders Analysis in Cloud Computing Focusing on Home Healthcare System | BibTeX data for Insiders Analysis in Cloud Computing Focusing on Home Healthcare System
-
[6]
Dynamics of Trust in Clouds — Challenges and Research Agenda
Imad M. Abbadi and Cornelius Namiluko
In The 6th International Conference for Internet Technology and Secured Transactions (ICITST−2011). Pages 110–115. IEEE. December, 2011.
Details about Dynamics of Trust in Clouds — Challenges and Research Agenda | BibTeX data for Dynamics of Trust in Clouds — Challenges and Research Agenda
-
[7]
Verifying Trustworthiness of Virtual Appliances in Collaborative Environments
Cornelius Namiluko‚ Jun Ho Huh and Andrew Martin
2011.
Details about Verifying Trustworthiness of Virtual Appliances in Collaborative Environments | BibTeX data for Verifying Trustworthiness of Virtual Appliances in Collaborative Environments
-
[8]
Managing application whitelists in trusted distributed systems
Jun Ho Huh‚ John Lyle‚ Cornelius Namiluko and Andrew Martin
In Future Generation Computer Systems. Vol. In Press‚ Accepted Manuscript. 2010.
Details about Managing application whitelists in trusted distributed systems | BibTeX data for Managing application whitelists in trusted distributed systems | DOI (DOI: 10.1016/j.future.2010.08.014) | Link to Managing application whitelists in trusted distributed systems
-
[9]
Abstract Model of a Trusted Platform
Cornelius Namiluko and Andrew Martin
2010.
Details about Abstract Model of a Trusted Platform | BibTeX data for Abstract Model of a Trusted Platform
-
[10]
Towards Architectural Trust Properties: Establishing Architectural Elements and Dependencies
Cornelius Namiluko
2009.
Details about Towards Architectural Trust Properties: Establishing Architectural Elements and Dependencies | BibTeX data for Towards Architectural Trust Properties: Establishing Architectural Elements and Dependencies | Download (pdf) of Towards Architectural Trust Properties: Establishing Architectural Elements and Dependencies
-
[11]
Application Whitelists in Virtual Organisations
Cornelius Namiluko‚ Jun Ho Huh‚ John Lyle and Andrew Martin
2009.
Details about Application Whitelists in Virtual Organisations | BibTeX data for Application Whitelists in Virtual Organisations | Download (pdf) of Application Whitelists in Virtual Organisations
-
[12]
Trusted Infrastructure for the Campus Grid
Cornelius Namiluko
Master's Thesis 2008.
Details about Trusted Infrastructure for the Campus Grid | BibTeX data for Trusted Infrastructure for the Campus Grid | Download (pdf) of Trusted Infrastructure for the Campus Grid