Andrew Simpson : Publications
Books
-
[1]
Discrete Mathematics by Example
A. C. Simpson
McGraw−Hill. 2002.
Details about Discrete Mathematics by Example | BibTeX data for Discrete Mathematics by Example
Book chapters
-
[1]
Towards a formal framework for workflow interoperability
S. D. Induruwa Fernando and A. C. Simpson
In Proceedings of WS−FM (Web Services and Formal Methods) 2008. Vol. 5387 of Lecture Notes in Computer Science. Pages 158–174. Springer. 2008.
Details about Towards a formal framework for workflow interoperability | BibTeX data for Towards a formal framework for workflow interoperability
-
[2]
The development‚ testing‚ and deployment of a web services infrastructure for distributed healthcare delivery‚ research‚ and training
A. C. Simpson‚ D. J. Power‚ D. Russell‚ M. A. Slaymaker‚ G. Kouadri Mostefaoui‚ G. Wilson and X. Ma
In K. Khan, editor, Managing Web Services Quality: Measuring Outcomes and Effectiveness. Pages 1–22. Idea Group. 2008.
Details about The development‚ testing‚ and deployment of a web services infrastructure for distributed healthcare delivery‚ research‚ and training | BibTeX data for The development‚ testing‚ and deployment of a web services infrastructure for distributed healthcare delivery‚ research‚ and training
-
[3]
eDiaMoND: A Grid−enabled federated database of annotated mammograms
J. M. Brady‚ D. J. Gavaghan‚ A. C. Simpson‚ M. Mulet−Parada and R. P. Highnam
In F. Berman‚ G. C. Fox and A. J. G. Hey, editors, Grid Computing: Making the Global Infrastructure a Reality. Pages 923–943. Wiley Series. 2003.
Details about eDiaMoND: A Grid−enabled federated database of annotated mammograms | BibTeX data for eDiaMoND: A Grid−enabled federated database of annotated mammograms
-
[4]
Safety through Security
A. C. Simpson‚ J. C. P. Woodcock and J. W. Davies
In Proceedings of the 9th International Workshop on Software Specification and Design. Pages 18–24. IEEE Computer Society Press. 1998.
Details about Safety through Security | BibTeX data for Safety through Security
-
[5]
The Mechanical Verification of Solid State Interlocking Geographic Data
A. C. Simpson‚ J. C. P. Woodcock and J. W. Davies
In L. Groves and S. Reeves, editors, Proceedings of Formal Methods Pacific‚ Wellington‚ New Zealand‚ 9–11 July. Pages 223–242. Springer. 1997.
Details about The Mechanical Verification of Solid State Interlocking Geographic Data | BibTeX data for The Mechanical Verification of Solid State Interlocking Geographic Data
-
[6]
The Application of Formal Methods to the Development of an ATP (Automatic Train Protection) System
A. C. Simpson
In Proceedings of the 1995 IEE Colloquium on Communication Networks in Transportation. IEE. 1995.
Details about The Application of Formal Methods to the Development of an ATP (Automatic Train Protection) System | BibTeX data for The Application of Formal Methods to the Development of an ATP (Automatic Train Protection) System
-
[7]
A Formal Specification of an Automatic Train Protection System
A. C. Simpson
In M. Naftalin‚ T. Denvir and M. Bertran, editors, Proceedings of the 2nd International Symposium of Formal Methods Europe (FME 1994). Vol. 873 of Lecture Notes in Computer Science. Pages 602–617. Springer. 1994.
Details about A Formal Specification of an Automatic Train Protection System | BibTeX data for A Formal Specification of an Automatic Train Protection System
Journal papers
-
[1]
A model−based approach to support privacy compliance
Majed Alshammari and Andrew Simpson
In Information and Computer Security. 2018.
Details about A model−based approach to support privacy compliance | BibTeX data for A model−based approach to support privacy compliance
-
[2]
LEFT — a web−based tool for the remote measurement and estimation of ecological value across global landscape
Long P. R.‚ Benz D.‚ M. Macias−Fauria‚ Seddon A. W. R.‚ Holland P. W. A.‚ Martin A. C.‚ R. Hagemann‚ T. K. Frost‚ A. C. Simpson‚ D. J. Power‚ M. A. Slaymaker and K. J. Willis
In Methods in Ecology and Evolution. 2017.
Details about LEFT — a web−based tool for the remote measurement and estimation of ecological value across global landscape | BibTeX data for LEFT — a web−based tool for the remote measurement and estimation of ecological value across global landscape
-
[3]
Risk and the Small−Scale Cyber Security Decision Making Dialogue — a UK Case Study
Emma Osborn and Andrew Simpson
2017.
Details about Risk and the Small−Scale Cyber Security Decision Making Dialogue — a UK Case Study | BibTeX data for Risk and the Small−Scale Cyber Security Decision Making Dialogue — a UK Case Study
-
[4]
Policy measures and cyber insurance: A framework
Daniel Woods and Andrew Simpson
In Journal of Cyber Policy. 2017.
Details about Policy measures and cyber insurance: A framework | BibTeX data for Policy measures and cyber insurance: A framework
-
[5]
AdSelector: A privacy−preserving advertisement selection mechanism for mobile devices
Y. Liu and A. C. Simpson
In The Computer Journal‚ Volume 60‚ Issue 8‚ Pages 1251–1270. 2017.
Details about AdSelector: A privacy−preserving advertisement selection mechanism for mobile devices | BibTeX data for AdSelector: A privacy−preserving advertisement selection mechanism for mobile devices
-
[6]
Policy‚ Statistics‚ and Questions: Reflections on UK Cyber Security Disclosures
Chad Heitzenrater and Andrew Simpson
In Journal of Cyber Security. 2016.
Details about Policy‚ Statistics‚ and Questions: Reflections on UK Cyber Security Disclosures | BibTeX data for Policy‚ Statistics‚ and Questions: Reflections on UK Cyber Security Disclosures | DOI (10.1093/cybsec/tyw008)
-
[7]
Privacy−preserving targeted mobile advertising: Requirements‚ design‚ and a prototype implementation
Y. Liu and A. C. Simpson
In Software: Practice and Experience. Vol. 46. No. 12. Pages 1657−1684. 2016.
Details about Privacy−preserving targeted mobile advertising: Requirements‚ design‚ and a prototype implementation | BibTeX data for Privacy−preserving targeted mobile advertising: Requirements‚ design‚ and a prototype implementation
-
[8]
On safety and security requirements in emerging ubiquitous computing models
Emma Osborn and Andrew Simpson
In Accepted for publication in The Computer Journal. 2016.
Details about On safety and security requirements in emerging ubiquitous computing models | BibTeX data for On safety and security requirements in emerging ubiquitous computing models
-
[9]
On The Formal Interpretation and Behavioural Consistency Checking of SysML Blocks
J. Jacobs and A. C. Simpson
In International Journal on Software and Systems Modeling. 2016.
Details about On The Formal Interpretation and Behavioural Consistency Checking of SysML Blocks | BibTeX data for On The Formal Interpretation and Behavioural Consistency Checking of SysML Blocks
-
[10]
Formal Relational Database Design: An Exercise in Extending the Formal Template Language
N. Wu and A. C. Simpson
In Formal Aspects of Computing. Vol. 26. No. 6. Pages 1231–1269. 2014.
Details about Formal Relational Database Design: An Exercise in Extending the Formal Template Language | BibTeX data for Formal Relational Database Design: An Exercise in Extending the Formal Template Language
-
[11]
A Process Algebraic Approach to Decomposition of Communicating SysML Blocks
J. Jacobs and A. C. Simpson
In International Journal of Modeling and Optimization. Vol. 3. No. 2. Pages 153–157. 2013.
Details about A Process Algebraic Approach to Decomposition of Communicating SysML Blocks | BibTeX data for A Process Algebraic Approach to Decomposition of Communicating SysML Blocks | Download (pdf) of A Process Algebraic Approach to Decomposition of Communicating SysML Blocks
-
[12]
On an infrastructure to support sharing and aggregating pre− and post−publication systems biology research data
Mark Slaymaker‚ James Osborne‚ Andrew Simpson and David Gavaghan
In Systems and Synthetic Biology. Vol. 6. No. 1–2. Pages 35–49. 2012.
Details about On an infrastructure to support sharing and aggregating pre− and post−publication systems biology research data | BibTeX data for On an infrastructure to support sharing and aggregating pre− and post−publication systems biology research data | DOI (10.1007/s11693-012-9095-x)
-
[13]
On privacy and public data: A study of data.gov.uk
A. C. Simpson
In Journal of Privacy & Confidentiality. Vol. 3. No. 1. Pages 51–65. 2011.
Details about On privacy and public data: A study of data.gov.uk | BibTeX data for On privacy and public data: A study of data.gov.uk
-
[14]
GIMI: The past‚ the present‚ and the future
A. C. Simpson‚ D. J. Power‚ D. Russell‚ M. A. Slaymaker‚ V. Bailey‚ C. E. Tromans‚ J. M. Brady and L. Tarassenko
In Philosophical Transactions of the Royal Society A: Mathematical‚ Physical and Engineering Sciences. Vol. 368. Pages 3891–3905. 2010.
Details about GIMI: The past‚ the present‚ and the future | BibTeX data for GIMI: The past‚ the present‚ and the future
-
[15]
On formalising and normalising role−based access control systems
D. J. Power M. A. Slaymaker and A. C. Simpson
In The Computer Journal. Vol. 52. No. 3. Pages 305−325. 2009.
Details about On formalising and normalising role−based access control systems | BibTeX data for On formalising and normalising role−based access control systems | DOI (doi:10.1093/comjnl/bxn016)
-
[16]
A healthcare−driven framework for facilitating the secure sharing of data across organisational boundaries
A. C. Simpson‚ D. J. Power‚ D. Russell‚ M. A. Slaymaker‚ G. Kouadri−Mostefaoui‚ X. Ma and G. Wilson
In Studies in Health Technology and Informatics. Vol. 138. Pages 3–12. 2008.
Details about A healthcare−driven framework for facilitating the secure sharing of data across organisational boundaries | BibTeX data for A healthcare−driven framework for facilitating the secure sharing of data across organisational boundaries
-
[17]
On the development of secure service−oriented architectures to support medical research
A. C. Simpson‚ D. J. Power‚ M. A. Slaymaker‚ D. Russell and M. Katzarova
In International Journal of Healthcare Information Systems and Informatics. Vol. 2. No. 2. Pages 75–89. 2007.
Details about On the development of secure service−oriented architectures to support medical research | BibTeX data for On the development of secure service−oriented architectures to support medical research
-
[18]
Integrative Biology: The challenges of developing a collaborative research environment for heart and cancer modelling
S. Lloyd‚ D. J. Gavaghan‚ A. C. Simpson‚ C. Mascord M. Sieunarine‚ G. Williams‚ J. Pitt−Francis‚ D. R. S. Boyd‚ D. Mac Randal‚ L. Sastry‚ K. Nagella S. Weeks‚ R. Fowler‚ D. Hanlon‚ J. Handley and G. de Fabritis
In Future Generation Computer Systems. Vol. 23. No. 3. Pages 457–465. March, 2007.
Details about Integrative Biology: The challenges of developing a collaborative research environment for heart and cancer modelling | BibTeX data for Integrative Biology: The challenges of developing a collaborative research environment for heart and cancer modelling
-
[19]
Designing for e−health: recurring scenarios in developing grid−based medical imaging systems
J. Ure‚ J. Geddes‚ C. Mackay‚ S. Lloyd‚ A. C. Simpson‚ D. J. Power‚ D. Russell‚ M. Jirotka‚ M. Katzarova‚ M. Rossor‚ N. Fox‚ J. Fletcher‚ D. Hill‚ K. McLeish‚ Y. Chen‚ J. V. Hajnal‚ S. Lawrie‚ D. Job‚ A. McIntosh‚ J. Wardlaw‚ P. Sandercock‚ J. Palmer‚ D. Perry‚ R. Procter‚ M. Hartswood‚ R. Slack‚ A. Voss‚ K. Ho‚ P. Bath‚ W. Clarke and G. Watson
In Studies in Health Technology and Informatics. Vol. 120. Pages 336–347. 2006.
Details about Designing for e−health: recurring scenarios in developing grid−based medical imaging systems | BibTeX data for Designing for e−health: recurring scenarios in developing grid−based medical imaging systems
-
[20]
Securing web services for deployment in health grids
D. J. Power‚ E. A. Politou‚ M. A. Slaymaker and A. C. Simpson
In Future Generation Computer Systems. Vol. 22. No. 5. Pages 547–570. 2006.
Details about Securing web services for deployment in health grids | BibTeX data for Securing web services for deployment in health grids
-
[21]
Multimodal imaging techniques for the extraction of detailed geometrical and physiological information for use in multi−scale models of colorectal cancer and treatment of individual patients
J. Pitt−Francis‚ D. Chen‚ M. A. Slaymaker‚ A. C. Simpson‚ J. M. Brady‚ I. van Leeuwen‚ F. Reddington‚ P. Quirke and D. J. Gavaghan
In Computational & Mathematical Methods in Medicine. Vol. 7. No. &23. Pages 177–188. 2006.
Details about Multimodal imaging techniques for the extraction of detailed geometrical and physiological information for use in multi−scale models of colorectal cancer and treatment of individual patients | BibTeX data for Multimodal imaging techniques for the extraction of detailed geometrical and physiological information for use in multi−scale models of colorectal cancer and treatment of individual patients
-
[22]
Collaboration and trust in healthcare innovation: the eDiaMoND case study
M. Jirotka‚ M. Procter‚ R. Hartswood‚ C. Slack‚ A. C. Simpson‚ C. Coopmans‚ C. Hinds and A. Voss
In Computer Supported Cooperative Work. Vol. 14. Pages 369–398. 2006.
Details about Collaboration and trust in healthcare innovation: the eDiaMoND case study | BibTeX data for Collaboration and trust in healthcare innovation: the eDiaMoND case study
-
[23]
Using CSP to model the synchronization process of variable length codes
A. C. M. Fong and A. C. Simpson
In IEEE Proc. Communications. Vol. 153. No. 2. Pages 195–200. April, 2006.
Details about Using CSP to model the synchronization process of variable length codes | BibTeX data for Using CSP to model the synchronization process of variable length codes
-
[24]
Security Aspects of Grid−enabled Digital Mammography
M. A. Slaymaker‚ E. A. Politou‚ D. J. Power‚ S. Lloyd and A. C. Simpson
In Methods of Information in Medicine. Vol. 44. No. 2. Pages 207–210. 2005.
Details about Security Aspects of Grid−enabled Digital Mammography | BibTeX data for Security Aspects of Grid−enabled Digital Mammography
-
[25]
Towards secure Grid−enabled healthcare
D. J. Power‚ E. A. Politou‚ M. A. Slaymaker and A. C. Simpson
In Software: Practice and Experience. Vol. 35. No. 9. Pages 857–871. 2005.
Details about Towards secure Grid−enabled healthcare | BibTeX data for Towards secure Grid−enabled healthcare
-
[26]
Integrative Biology: exploiting e−Science to combat fatal diseases
S. Lloyd‚ A. C. Simpson‚ L. Sastry‚ D. J. Gavaghan and D. R.S. Boyd
In ERCIM News. Vol. 60. January, 2005.
Details about Integrative Biology: exploiting e−Science to combat fatal diseases | BibTeX data for Integrative Biology: exploiting e−Science to combat fatal diseases
-
[27]
Digital mammography: a world without film?
S. Lloyd‚ M. Jirotka‚ A. C. Simpson‚ R. P. Highnam‚ D. J. Gavaghan‚ D. Watson and J. M. Brady
In Methods of Information in Medicine. Vol. 44. No. 2. Pages 168–169. 2005.
Details about Digital mammography: a world without film? | BibTeX data for Digital mammography: a world without film?
-
[28]
Towards a Grid Infrastructure to support integrative approaches to biological research
D. J. Gavaghan‚ A. C. Simpson‚ S. Lloyd‚ D. F. Mac Randal and D. R. S. Boyd
In Philosophical Transactions of the Royal Society A: Mathematical‚ Physical and Engineering Sciences. Vol. 363. No. 1883. Pages 1829–1841. August, 2005.
Details about Towards a Grid Infrastructure to support integrative approaches to biological research | BibTeX data for Towards a Grid Infrastructure to support integrative approaches to biological research
Conference papers
-
[1]
Characterising 0−Day Exploit Brokers
Matthias Dellago‚ Daniel Woods and Andrew Simpson
In Proceedings of WEIS 2022. 2022.
Details about Characterising 0−Day Exploit Brokers | BibTeX data for Characterising 0−Day Exploit Brokers
-
[2]
Non−obvious Costs of Cyber Security Breaches: Changes in Systematic Risk
Dennis Malliouris and Andrew Simpson
In WEIS 2020. 2020.
Details about Non−obvious Costs of Cyber Security Breaches: Changes in Systematic Risk | BibTeX data for Non−obvious Costs of Cyber Security Breaches: Changes in Systematic Risk
-
[3]
An Empirical Study of Bug Bounty Programs
Thomas Walshe and Andrew Simpson
In Proceedings of the 2nd IEEE Workshop on Intelligent Bug Fixing (IBF 2020). 2020.
Details about An Empirical Study of Bug Bounty Programs | BibTeX data for An Empirical Study of Bug Bounty Programs
-
[4]
Connected Vehicles: A Privacy Analysis
Mark Quinlan‚ Jun Zhao and Andrew Simpson
In Proceedings of the 8th International Symposium on Security and Privacy on Internet of Things (SPIoT 2018). 2019.
Details about Connected Vehicles: A Privacy Analysis | BibTeX data for Connected Vehicles: A Privacy Analysis | Link to Connected Vehicles: A Privacy Analysis
-
[5]
Teaching Introductory Formal Methods and Discrete Mathematics to Software Engineers: Reflections on a modelling−focussed approach
Andrew Simpson
In Proceedings of FMTea 2019. 2019.
Details about Teaching Introductory Formal Methods and Discrete Mathematics to Software Engineers: Reflections on a modelling−focussed approach | BibTeX data for Teaching Introductory Formal Methods and Discrete Mathematics to Software Engineers: Reflections on a modelling−focussed approach
-
[6]
On the trade−off between privacy and utility in mobile services: A qualitative study
Yang Liu and Andrew Simpson
In Proceedings of the 1st Workshop on Security‚ Privacy‚ Organizations‚ and Systems Engineering (SPOSE 2019). 2019.
Details about On the trade−off between privacy and utility in mobile services: A qualitative study | BibTeX data for On the trade−off between privacy and utility in mobile services: A qualitative study
-
[7]
Cyber Threat Information Sharing: Perceived Benefits and Barriers
Adam Zibak and Andrew Simpson
In Proceedings of CyberTim 2019. 2019.
Details about Cyber Threat Information Sharing: Perceived Benefits and Barriers | BibTeX data for Cyber Threat Information Sharing: Perceived Benefits and Barriers
-
[8]
Towards Better Understanding of Cyber Security Information Sharing
A. Zibak and A. C. Simpson
In CyberSA 2019. 2019.
Details about Towards Better Understanding of Cyber Security Information Sharing | BibTeX data for Towards Better Understanding of Cyber Security Information Sharing
-
[9]
The stock market impact of information security investments: The case of security standards
D. Malliouris and A. C. Simpson
In WEIS 2019. 2019.
Details about The stock market impact of information security investments: The case of security standards | BibTeX data for The stock market impact of information security investments: The case of security standards
-
[10]
The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices
D. Woods‚ T. Moore and A. C. Simpson
In WEIS 2019. 2019.
Details about The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices | BibTeX data for The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices
-
[11]
Privacy Architectural Strategies: An Approach for Achieving Various Levels of Privacy Protection
Majed Alshammari and Andrew Simpson
In Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 2018.
Details about Privacy Architectural Strategies: An Approach for Achieving Various Levels of Privacy Protection | BibTeX data for Privacy Architectural Strategies: An Approach for Achieving Various Levels of Privacy Protection
-
[12]
Cyber−warranties as a quality signal for information security products
Daniel Woods and Andrew Simpson
In Proceedings of GameSec 2018. 2018.
Details about Cyber−warranties as a quality signal for information security products | BibTeX data for Cyber−warranties as a quality signal for information security products
-
[13]
Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Analysis
Majed Alshammari and Andrew Simpson
In Proceedings of the 13th DPM International Workshop on Data Privacy Management (DPM 2018). 2018.
Details about Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Analysis | BibTeX data for Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Analysis
-
[14]
Rethinking the Proposition of Privacy Engineering
Aaron Ceross and Andrew Simpson
In Proceedings of NSPW 2018. 2018.
Details about Rethinking the Proposition of Privacy Engineering | BibTeX data for Rethinking the Proposition of Privacy Engineering
-
[15]
Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment
M. Alshammari and A. C. Simpson
In Proceedings of TrustBus 2018. 2018.
Details about Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment | BibTeX data for Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment
-
[16]
Towards Integrating Insurance Data into Information Security Investment Decision Making
Daniel Woods and Andrew Simpson
In Proceedings of the 2018 International Workshop on Cyber Insurance and Risk Controls. 2018.
Details about Towards Integrating Insurance Data into Information Security Investment Decision Making | BibTeX data for Towards Integrating Insurance Data into Information Security Investment Decision Making
-
[17]
Can We Evaluate the Impact of Cyber Security Information Sharing?
Adam Zibak and Andrew Simpson
In Proceedings of Cyber SA 2018. 2018.
Details about Can We Evaluate the Impact of Cyber Security Information Sharing? | BibTeX data for Can We Evaluate the Impact of Cyber Security Information Sharing?
-
[18]
Monte Carlo methods to investigate how aggregated cyber insurance claims data impacts security investments
Daniel Woods and Andrew Simpson
In Proceedings of the 17th Annual Workshop on the Economics of Information Security (WEIS 2018). 2018.
Details about Monte Carlo methods to investigate how aggregated cyber insurance claims data impacts security investments | BibTeX data for Monte Carlo methods to investigate how aggregated cyber insurance claims data impacts security investments
-
[19]
A Formal Model to Facilitate Security Testing in Modern Automotive Systems
E. dos Santos‚ D. Schoop and A. C. Simpson
In Proceedings of FM&&MDD 2017. 2017.
Details about A Formal Model to Facilitate Security Testing in Modern Automotive Systems | BibTeX data for A Formal Model to Facilitate Security Testing in Modern Automotive Systems
-
[20]
A UML Profile for Privacy−Aware Data Lifecycle Models
Majed Alshammari and Andrew Simpson
In Proceedings of the 1st SECPRE workshop. 2017.
Details about A UML Profile for Privacy−Aware Data Lifecycle Models | BibTeX data for A UML Profile for Privacy−Aware Data Lifecycle Models
-
[21]
Personal Data Management: An Abstract Personal Data Lifecycle Model
Majed Alshammari and Andrew Simpson
In Proceedings of the SPBP'17 workshop. 2017.
Details about Personal Data Management: An Abstract Personal Data Lifecycle Model | BibTeX data for Personal Data Management: An Abstract Personal Data Lifecycle Model | Download of Personal Data Management: An Abstract Personal Data Lifecycle Model
-
[22]
The use of data protection regulatory actions as a data source for privacy economics
Aaron Ceross and Andrew Simpson
In Proceedings of TELERISE 2017. 2017.
Details about The use of data protection regulatory actions as a data source for privacy economics | BibTeX data for The use of data protection regulatory actions as a data source for privacy economics
-
[23]
On the Performance of a Trustworthy Remote Entity in Comparison to Secure Multi−Party Computation
Robin Ankele and Andrew Simpson
In Proceedings of the 3rd IEEE International Workshop on Cloud Security and Forensics (WCSF 2017). 2017.
Details about On the Performance of a Trustworthy Remote Entity in Comparison to Secure Multi−Party Computation | BibTeX data for On the Performance of a Trustworthy Remote Entity in Comparison to Secure Multi−Party Computation
-
[24]
Towards a Principled Approach for Engineering Privacy by Design
Majed Alshammari and Andrew Simpson
In Proceedings of the 2017 ENISA Annual Privacy Forum (APF 2017). 2017.
Details about Towards a Principled Approach for Engineering Privacy by Design | BibTeX data for Towards a Principled Approach for Engineering Privacy by Design
-
[25]
Exploring the use of Intel SGX for Secure Many−Party Applications
K.A. Küçük‚ A. Paverd‚ A. Martin‚ N. Asokan‚ A. Simpson and R. Ankele
In Proceedings of the 1st Workshop on System Software for Trusted Execution (SysTEX '16). New York‚ NY‚ USA. 2016. ACM.
The theoretical construct of a Trusted Third Party (TTP) has the potential to solve many security and privacy challenges. In particular‚ a TTP is an ideal way to achieve secure multiparty computation—a privacy−enhancing technique in which mutually distrusting participants jointly compute a function over their private inputs without revealing these inputs. Although there exist cryptographic protocols to achieve this‚ their performance often limits them to the two−party case‚ or to a small number of participants. However‚ many real−world applications involve thousands or tens of thousands of participants. Examples of this type of many−party application include privacy−preserving energy metering‚ location−based services‚ and mobile network roaming. Challenging the notion that a trustworthy TTP does not exist‚ recent research has shown how trusted hardware and remote attestation can be used to establish a sufficient level of assurance in a real system such that it can serve as a trustworthy remote entity (TRE). We explore the use of Intel SGX‚ the most recent and arguably most promising trusted hardware technology‚ as the basis for a TRE for many−party applications. Using privacy−preserving energy metering as a case study‚ we design and implement a prototype TRE using SGX‚ and compare its performance to a previous system based on the Trusted Platform Module (TPM). Our results show that even without specialized optimizations‚ SGX provides comparable performance to the optimized TPM system‚ and therefore has significant potential for large−scale many−party applications.
Details about Exploring the use of Intel SGX for Secure Many−Party Applications | BibTeX data for Exploring the use of Intel SGX for Secure Many−Party Applications | DOI (10.1145/3007788.3007793) | Link to Exploring the use of Intel SGX for Secure Many−Party Applications
-
[26]
Formal Models for Automotive Systems and Vehicular Networks: Benefits and Challenges
E. dos Santos‚ D. Schoop and A. C. Simpson
In Proceedings of VNC 2016. 2016.
Details about Formal Models for Automotive Systems and Vehicular Networks: Benefits and Challenges | BibTeX data for Formal Models for Automotive Systems and Vehicular Networks: Benefits and Challenges
-
[27]
Software Security Investment: The Right Amount of a Good Thing
Chad Heitzenrater and Andrew Simpson
In Proceedings of the 1st IEEE Cybersecurity Development Conference (SecDev 2016). 2016.
Details about Software Security Investment: The Right Amount of a Good Thing | BibTeX data for Software Security Investment: The Right Amount of a Good Thing
-
[28]
Privacy−Preserving Targeted Mobile Advertising: Formal Models and Analysis
Y. Liu and A. C. Simpson
In Proceedings of the 11th International Workshop on Data Privacy Management (DPM 2016). 2016.
Details about Privacy−Preserving Targeted Mobile Advertising: Formal Models and Analysis | BibTeX data for Privacy−Preserving Targeted Mobile Advertising: Formal Models and Analysis
-
[29]
A Case for the Economics of Secure Software Development
Chad Heitzenrater and Andrew Simpson
In Proceedings of NSPW 2016. 2016.
Details about A Case for the Economics of Secure Software Development | BibTeX data for A Case for the Economics of Secure Software Development
-
[30]
Misuse‚ Abuse‚ and Reuse: Economic utility functions for characterising security requirements
C. Heitzenrater and A. C. Simpson
In Proceedings of The Second International Workshop on Agile Secure Software Development (ASSD 2016). 2016.
Details about Misuse‚ Abuse‚ and Reuse: Economic utility functions for characterising security requirements | BibTeX data for Misuse‚ Abuse‚ and Reuse: Economic utility functions for characterising security requirements
-
[31]
Motivating Security Engineering with Economics: A Utility Function Approach
C. Heitzenrater‚ J. King−Lacroix and A. C. Simpson
In Proceedings of The 1st IEEE International Workshop on Cyber Resiliency Economics (CRE 2016). 2016.
Details about Motivating Security Engineering with Economics: A Utility Function Approach | BibTeX data for Motivating Security Engineering with Economics: A Utility Function Approach
-
[32]
Applying the Trustworthy Remote Entity to Privacy−Preserving Multiparty Computation: Requirements and Criteria for Large−Scale Applications
R. Ankele‚ K.A. Küçük‚ A.P. Martin‚ A.C. Simpson and A. Paverd
In Proceedings of the 13th IEEE International Conference on Advanced and Trusted Computing (ATC 2016). 2016.
The significant improvements in technology that have been seen in recent years have resulted in a shift in the computing paradigm: from isolated computational tasks to distributed tasks executed in multi−party settings. Secure Multi−Party Computation (MPC) allows for multiple parties to jointly compute a function on their private inputs. Unfortunately‚ traditional MPC algorithms are inefficient in the presence of a large number of participants. Moreover‚ in the traditional setting‚ MPC is only concerned with privacy of the input values. However‚ there is often a need to preserve the privacy of individuals on the basis of the output of the computation. Techniques proposed by the Trusted Computing community have shown promise in the context of new secure‚ efficient large−scale applications. In this paper‚ we define‚ analyse several use cases related to large−scale applications of the MPC paradigm. From these use cases‚ we derive requirements‚ criteria to evaluate certain MPC protocols used for large−scale applications. Furthermore‚ we propose the utilisation of a Trustworthy Remote Entity‚ privacy−preserving algorithms to achieve confidentiality‚ privacy in such settings.
Details about Applying the Trustworthy Remote Entity to Privacy−Preserving Multiparty Computation: Requirements and Criteria for Large−Scale Applications | BibTeX data for Applying the Trustworthy Remote Entity to Privacy−Preserving Multiparty Computation: Requirements and Criteria for Large−Scale Applications | DOI (10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0077) | Link to Applying the Trustworthy Remote Entity to Privacy−Preserving Multiparty Computation: Requirements and Criteria for Large−Scale Applications
-
[33]
The Days Before Zero Day: Investment Models for Secure Software Engineering
Chad Heitzenrater‚ Rainier Bohme and Andrew Simpson
In Proceedings of WEIS 2016. 2016.
Details about The Days Before Zero Day: Investment Models for Secure Software Engineering | BibTeX data for The Days Before Zero Day: Investment Models for Secure Software Engineering
-
[34]
Formal Models for Privacy
Alan Abe and Andrew Simpson
In Proceedings of the 9th International Workshop on Privacy and Anonymity in the Information Society (PAIS 2016). 2016.
Details about Formal Models for Privacy | BibTeX data for Formal Models for Privacy
-
[35]
Small−Scale Cyber Security
Emma Osborn and Andrew Simpson
In Proceedings of IEEE CSCloud 2015. 2015.
Details about Small−Scale Cyber Security | BibTeX data for Small−Scale Cyber Security
-
[36]
When the Winning Move is Not to Play: Games of Deterrence in Cyber Security
C. Heitzenrater and A. C. Simpson
In Proceedings of the 6th Conference on Decision and Game Theory for Security (GameSec 2015). 2015.
Details about When the Winning Move is Not to Play: Games of Deterrence in Cyber Security | BibTeX data for When the Winning Move is Not to Play: Games of Deterrence in Cyber Security
-
[37]
Policy‚ Statistics‚ and Questions: Reflections on UK Cyber Security Disclosures
Chad Heitzenrater and Andrew Simpson
In Proceedings of WEIS 2015. 2015.
Details about Policy‚ Statistics‚ and Questions: Reflections on UK Cyber Security Disclosures | BibTeX data for Policy‚ Statistics‚ and Questions: Reflections on UK Cyber Security Disclosures
-
[38]
Experiences in Developing and Delivering a Programme of Part−Time Education in Software and Systems Security
A. C. Simpson‚ A. P. Martin‚ C. Cremers‚ I. Flechais‚ I. Martinovic and K. B. Rasmussen
In Proceedings of ICSE 2015. 2015.
Details about Experiences in Developing and Delivering a Programme of Part−Time Education in Software and Systems Security | BibTeX data for Experiences in Developing and Delivering a Programme of Part−Time Education in Software and Systems Security
-
[39]
Usability and Security by Design: A Case Study in Research and Development
S. Faily‚ J. Lyle‚ I. Flechais and A. C. Simpson
In Proceedings of the 2015 NDSS Workshop on Usable Security (USEC 2015). Internet Society. 2015.
Details about Usability and Security by Design: A Case Study in Research and Development | BibTeX data for Usability and Security by Design: A Case Study in Research and Development
-
[40]
A Formal Model of SysML Blocks using CSP for Assured Systems Engineering
J. Jacobs and A. C. Simpson
In Proceedings of the 3rd International Workshop on Formal Techniques for Safety−Critical Systems (FTSCS 2014). Vol. ?? of Communications in Computer and Information Science. Pages ??−??. 2015.
Details about A Formal Model of SysML Blocks using CSP for Assured Systems Engineering | BibTeX data for A Formal Model of SysML Blocks using CSP for Assured Systems Engineering | Download (pdf) of A Formal Model of SysML Blocks using CSP for Assured Systems Engineering
-
[41]
On the Formal Interpretation of SysML Blocks using a Safety Critical Case Study
J. Jacobs and A. C. Simpson
In Proceedings of the 8th Brazilian Symposium on Software Components‚ Architectures and Reuse (SBCARS 2014). Pages 95−104. IEEE. 2014.
Details about On the Formal Interpretation of SysML Blocks using a Safety Critical Case Study | BibTeX data for On the Formal Interpretation of SysML Blocks using a Safety Critical Case Study | Download (pdf) of On the Formal Interpretation of SysML Blocks using a Safety Critical Case Study
-
[42]
On a Process Algebraic Representation of Sequence Diagrams
J. Jacobs and A. C. Simpson
In Proceedings of the 1st International Workshop on Safety and Formal Methods (SaFoMe 2014). Vol. 8938 of Lecture Notes in Computer Science. Pages 71–85. Springer. 2014.
Details about On a Process Algebraic Representation of Sequence Diagrams | BibTeX data for On a Process Algebraic Representation of Sequence Diagrams | Download (pdf) of On a Process Algebraic Representation of Sequence Diagrams
-
[43]
On the Cloud−enabled Refinement Checking of Railway Signalling Interlockings
A. C. Simpson and J. Jacobs
In Proceedings of the 2nd International Workshop on Formal Techniques for Safety−Critical Systems (FTSCS 2013). Vol. 419 of Communications in Computer and Information Science. Pages 195–211. 2014.
Details about On the Cloud−enabled Refinement Checking of Railway Signalling Interlockings | BibTeX data for On the Cloud−enabled Refinement Checking of Railway Signalling Interlockings | Download (pdf) of On the Cloud−enabled Refinement Checking of Railway Signalling Interlockings
-
[44]
Towards a Process Algebra Framework for Supporting Behavioural Consistency and Requirements Traceability in SysML
J. Jacobs and A. C. Simpson
In Proceedings of the 15th International Conference on Formal Engineering Methods (ICFEM 2013). Vol. 8144 of Lecture Notes in Computer Science. Pages 265–280. Springer. 2013.
Details about Towards a Process Algebra Framework for Supporting Behavioural Consistency and Requirements Traceability in SysML | BibTeX data for Towards a Process Algebra Framework for Supporting Behavioural Consistency and Requirements Traceability in SysML | Download (pdf) of Towards a Process Algebra Framework for Supporting Behavioural Consistency and Requirements Traceability in SysML
-
[45]
Virtual experiments for reusable models
Jonathan Cooper‚ Gary Mirams‚ Mark Slaymaker‚ Andrew Simpson‚ Jon Olav Vik and Dagmar Waltemath
In Proceedings of VPH 2012. 2012.
Details about Virtual experiments for reusable models | BibTeX data for Virtual experiments for reusable models
-
[46]
Conformance checking of dynamic access control policies
D. J. Power‚ M. A. Slaymaker and A. C. Simpson
In Proceedings of the 13th International Conference on Formal Methods and Software Engineering (ICFEM 2011). Vol. 6255 of Lecture Notes in Computer Science. Pages 227–242. Springer. 2011.
Details about Conformance checking of dynamic access control policies | BibTeX data for Conformance checking of dynamic access control policies
-
[47]
Automatic conformance checking of role−based access control policies via Alloy
David Power‚ Mark Slaymaker and Andrew Simpson
In Proceedings of Engineering Secure Software and Systems (ESSoS 2011). Pages 15–28. Springer−Verlag Lecture Notes in Computer Science‚ volume 6542. 2011.
Details about Automatic conformance checking of role−based access control policies via Alloy | BibTeX data for Automatic conformance checking of role−based access control policies via Alloy
-
[48]
On the secure sharing and aggregation of data to support Systems Biology research
Andrew Simpson‚ Mark Slaymaker and David Gavaghan
In Proceedings of the 7th International Conference on Data Integration in the Life Sciences (DILS 2010). Pages 58–73. Springer−Verlag Lecture Notes in Computer Science‚ volume 6254. 2010.
Details about On the secure sharing and aggregation of data to support Systems Biology research | BibTeX data for On the secure sharing and aggregation of data to support Systems Biology research
-
[49]
On the modelling and analysis of Amazon Web Services access policies
David Power‚ Mark Slaymaker and Andrew Simpson
In Proceedings of Abstract State Machines‚ Alloy‚ B and Z (ABZ 2010). Pages 394. Springer−Verlag Lecture Notes in Computer Science‚ volume 5977. 2010.
Details about On the modelling and analysis of Amazon Web Services access policies | BibTeX data for On the modelling and analysis of Amazon Web Services access policies
-
[50]
Formalising and validating RBAC−to−XACML translation using lightweight formal methods
Mark Slaymaker‚ David Power and Andrew Simpson
In Proceedings of Abstract State Machines‚ Alloy‚ B and Z (ABZ 2010). Pages 349–362. Springer−Verlag Lecture Notes in Computer Science‚ volume 5977. 2010.
Details about Formalising and validating RBAC−to−XACML translation using lightweight formal methods | BibTeX data for Formalising and validating RBAC−to−XACML translation using lightweight formal methods
-
[51]
Towards Formally Templated Relational Database Representations in Z
N. Wu and A. C. Simpson
In Proceedings of the 2nd International Conference on Abstract State Machines‚ Alloy‚ B and Z (ABZ 2010). Vol. 5977 of Lecture Notes in Computer Science. Pages 363–376. Springer. 2010.
Details about Towards Formally Templated Relational Database Representations in Z | BibTeX data for Towards Formally Templated Relational Database Representations in Z
-
[52]
GIMI: the past‚ the present‚ and the future
A. C. Simpson‚ D. J. Power‚ D. Russell‚ M. A. Slaymaker‚ V. Bailey‚ C. Tromans‚ J. M. Brady and L. Tarassenko
In Proceedings of the 2009 UK e−Science All Hands Meeting. 2009.
Details about GIMI: the past‚ the present‚ and the future | BibTeX data for GIMI: the past‚ the present‚ and the future
-
[53]
On the construction and verification of self−modifying access control policies
D. J. Power‚ M. A. Slaymaker and A. C. Simpson
In Proceedings of the 6th VLDB Workshop on Secure Data Management (SDM 2009). Vol. 5776 of Lecture Notes in Computer Science. Pages 107–121. Springer. 2009.
Details about On the construction and verification of self−modifying access control policies | BibTeX data for On the construction and verification of self−modifying access control policies
-
[54]
On the utilisation of a service−oriented infrastructure to support radiologist training
A. C. Simpson‚ M. A. Slaymaker‚ M. Yap‚ A. G. Gale‚ D. J. Power and D. Russell
In Proceedings of the 22nd IEEE Symposium on Computer−Based Medical Systems (CBMS 2009). Pages 1–4. IEEE Computer Society Press. 2009.
Details about On the utilisation of a service−oriented infrastructure to support radiologist training | BibTeX data for On the utilisation of a service−oriented infrastructure to support radiologist training
-
[55]
On the secure sharing of legacy data
D. Russell‚ D. J. Power‚ M. A. Slaymaker‚ G. K. Kouadri Mostefaoui‚ X. Ma and A. C. Simpson
In Proceedings of the 6th International Conference on IT: Next Generation (ITNG 2009). Pages 1676–1679. IEEE. 2009.
Details about On the secure sharing of legacy data | BibTeX data for On the secure sharing of legacy data
-
[56]
On Quality Assurance of Web Services in Agile Projects: An Experience Report
G. Kouadri Mostefaoui and A. C. Simpson
In Proceedings of the 3rd ACM Workshop on Software Engineering for Pervasive Services (SEPS 2008). Pages 21–26. ACM. 2008.
Details about On Quality Assurance of Web Services in Agile Projects: An Experience Report | BibTeX data for On Quality Assurance of Web Services in Agile Projects: An Experience Report
-
[57]
The Application of a Service−Oriented Infrastructure to Support Medical Research in Mammography
C. Tromans‚ J. M. Brady‚ D. J. Power‚ M. A. Slaymaker‚ D. Russell and A. C. Simpson
In Proceedings of MICCAI−Grid 2008. Pages 43–52. 2008.
Details about The Application of a Service−Oriented Infrastructure to Support Medical Research in Mammography | BibTeX data for The Application of a Service−Oriented Infrastructure to Support Medical Research in Mammography
-
[58]
On the facilitation of fine−grained access to distributed healthcare data
D. Russell M. A. Slaymaker D. J. Power and A. C. Simpson
In Proceedings of Secure Data Management 2008. 2008.
Details about On the facilitation of fine−grained access to distributed healthcare data | BibTeX data for On the facilitation of fine−grained access to distributed healthcare data
-
[59]
On the need for user−defined fine−grained access control policies for social networking applications
A. C. Simpson
In Proceedings of the 2008 workshop on Security in Opportunistic and SOCial networks (SOSOC 2008). Pages Article number 1. ACM. 2008.
Details about On the need for user−defined fine−grained access control policies for social networking applications | BibTeX data for On the need for user−defined fine−grained access control policies for social networking applications
-
[60]
A healthcare−driven framework for facilitating the secure sharing of data across organisational boundaries
A. C. Simpson‚ D. J. Power‚ D. Russell‚ M. A. Slaymaker‚ G. Kouadri−Mostefaoui‚ X. Ma and G. Wilson
In Proceedings of HealthGrid 2008. 2008.
Details about A healthcare−driven framework for facilitating the secure sharing of data across organisational boundaries | BibTeX data for A healthcare−driven framework for facilitating the secure sharing of data across organisational boundaries
-
[61]
On formal descriptions of synchronization requirements in multimedia systems
A. C. M. Fong and A. C. Simpson
In Proceedings of the 5th International Conference on IT: Next Generation (ITNG 2009). Pages 1255−1256. IEEE. 2008.
Details about On formal descriptions of synchronization requirements in multimedia systems | BibTeX data for On formal descriptions of synchronization requirements in multimedia systems
-
[62]
Accessing and aggregating legacy data sources for healthcare research‚ delivery and training
M. A. Slaymaker‚ D. J. Power‚ D. Russell‚ G. Wilson and A. C. Simpson
In Proceedings of SAC 2008. 2008.
Details about Accessing and aggregating legacy data sources for healthcare research‚ delivery and training | BibTeX data for Accessing and aggregating legacy data sources for healthcare research‚ delivery and training
-
[63]
Practical Experiences of Testing Web Services
G. Kouadri Mostefaoui and A. C. Simpson
In Proceedings of the 5th International Workshop on SOA and Web Services Best Practices. 2007.
Details about Practical Experiences of Testing Web Services | BibTeX data for Practical Experiences of Testing Web Services
-
[64]
Empirical analysis and optimization of an NP−hard problem using CSP and FDR
D. A. Creager and A. C. Simpson
In Proceedings of the 2007 Brazilian Symposium on Formal Methods (SBMF 2007). 2007.
Details about Empirical analysis and optimization of an NP−hard problem using CSP and FDR | BibTeX data for Empirical analysis and optimization of an NP−hard problem using CSP and FDR
-
[65]
Switched lightpaths for e−health applications: Issues and challenges
L. Momtahan‚ S. Lloyd and A. C. Simpson
In Proceedings of the 20th IEEE Symposium on Computer−Based Medical Systems (CBMS 2007). Pages 459–464. IEEE Computer Society Press. 2007.
Details about Switched lightpaths for e−health applications: Issues and challenges | BibTeX data for Switched lightpaths for e−health applications: Issues and challenges
-
[66]
Exploitation of switched lightpaths for e−health: Constraints and challenges
L. Momtahan and A. C. Simpson
In Lighting the blue touchpaper for UK e−Science: Closing conference of ESLEA project. Proceedings of Science. 2007.
Details about Exploitation of switched lightpaths for e−health: Constraints and challenges | BibTeX data for Exploitation of switched lightpaths for e−health: Constraints and challenges
-
[67]
Developing collaborative technology for neuro−science
S. Lloyd‚ A. C. Simpson‚ D. J. Power‚ J. Geddes‚ A. Khanban and J. Palmer
In Proceedings of CollaborateCom 2007. 2007.
Details about Developing collaborative technology for neuro−science | BibTeX data for Developing collaborative technology for neuro−science
-
[68]
Towards build−time interoperability of workflow definition languages
S. D. Induruwa−Fernando‚ D. A. Creager and A. C. Simpson
In Proceedings of the 9th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNSAC 2007). Pages 525–532. IEEE. 2007.
Details about Towards build−time interoperability of workflow definition languages | BibTeX data for Towards build−time interoperability of workflow definition languages
-
[69]
Switched lightpaths for e−health applications: a feasibility study
L. Momtahan and A. C. Simpson
In Proceedings of the 19th IEEE Symposium on Computer Based Medical Systems (CBMS 2006). Pages 469–472. IEEE Computer Society Press. 2006.
Details about Switched lightpaths for e−health applications: a feasibility study | BibTeX data for Switched lightpaths for e−health applications: a feasibility study
-
[70]
A prototype infrastructure for the secure aggregation of imaging and pathology data for colorectal cancer care
M. A. Slaymaker‚ A. C. Simpson‚ J. M. Brady‚ D. J. Gavaghan‚ F. Reddington and P. Quirke
In Proceedings of the IEEE Symposium on Computer Based Medical Systems. IEEE Computer Society Press. 2006.
Details about A prototype infrastructure for the secure aggregation of imaging and pathology data for colorectal cancer care | BibTeX data for A prototype infrastructure for the secure aggregation of imaging and pathology data for colorectal cancer care
-
[71]
On tracker attacks in health grids
A. C. Simpson‚ D. J. Power and M. A. Slaymaker
In Proceedings of the Annual ACM Symposium on Applied Computing (SAC '06). Pages 209–216. ACM Press. 2006.
Details about On tracker attacks in health grids | BibTeX data for On tracker attacks in health grids
-
[72]
Logic‚ damned logic‚ and statistics
A. C. Simpson
In Proceedings of Teaching Formal Methods 2006. 2006.
Details about Logic‚ damned logic‚ and statistics | BibTeX data for Logic‚ damned logic‚ and statistics
-
[73]
The utilisation of clinical data in research health grids: eDiaMoND as a case study
S. Lloyd and A. C. Simpson
In Proceedings of HealthCare 2006. 2006.
Details about The utilisation of clinical data in research health grids: eDiaMoND as a case study | BibTeX data for The utilisation of clinical data in research health grids: eDiaMoND as a case study
-
[74]
Delegation in a distributed healthcare context: a survey of current approaches
M. Katzarova and A. C. Simpson
In Proceedings of the 9th Information Security Conference 2006. Vol. 4176 of Lecture Notes in Computer Science. Pages 517–529. Springer. 2006.
Details about Delegation in a distributed healthcare context: a survey of current approaches | BibTeX data for Delegation in a distributed healthcare context: a survey of current approaches
-
[75]
The challenges of developing a collaborative data and compute grid for Neurosciences
J. Geddes‚ C. Mackay‚ S. Lloyd‚ A. C. Simpson‚ D. J. Power‚ D. Russell‚ M. Katzarova‚ M. Rossor‚ N. Fox‚ J. Fletcher‚ D. Hill‚ K. McLeish‚ J. V. Hajnal‚ S. Lawrie‚ D. Job‚ A. McIntosh‚ J. Wardlaw‚ P. Sandercocka‚ J. Palmer‚ D. Perry‚ R. Procter‚ J. Ure‚ P. Bath and G. Watson
In Proceedings of the 19th IEEE Symposium on Computer Based Medical Systems (CBMS 2006). Pages 81–86. IEEE Computer Society Press. 2006.
Details about The challenges of developing a collaborative data and compute grid for Neurosciences | BibTeX data for The challenges of developing a collaborative data and compute grid for Neurosciences
-
[76]
A fully generic‚ graph−based approach to data transformation discovery
D. A. Creager and A. C. Simpson
In Proceedings of GMC (Graph Computation Models) 2006. 2006.
Details about A fully generic‚ graph−based approach to data transformation discovery | BibTeX data for A fully generic‚ graph−based approach to data transformation discovery
-
[77]
Towards a fully generic theory of data
D. A. Creager and A. C. Simpson
In Proceedings of the 8th International Conference on Formal Engineering Methods (ICFEM 2006). Vol. 4260 of Lecture Notes in Computer Science. Pages 304–323. Springer. 2006.
Details about Towards a fully generic theory of data | BibTeX data for Towards a fully generic theory of data
-
[78]
Project management in multi−disciplinary collaborative research
S. Lloyd and A. C. Simpson
In Proceedings of IPCC (International Professional Communication Conference) 2005‚ Limerick. Pages 602–611. 2005.
Details about Project management in multi−disciplinary collaborative research | BibTeX data for Project management in multi−disciplinary collaborative research
-
[79]
Towards fine−grained access control in health grids
A. C. Simpson‚ D. J. Power‚ M. A. Slaymaker and E. A. Politou
In Proceedings of the Ottawa Workshop on New Challenges in Access Control. April, 2005.
Details about Towards fine−grained access control in health grids | BibTeX data for Towards fine−grained access control in health grids
-
[80]
GIMI: Generic Infrastructure for Medical Informatics
A. C. Simpson‚ D. J. Power‚ M. A. Slaymaker and E. A. Politou
In Proceedings of the 18th IEEE Symposium on Computer−Based Medical Systems (CBMS 2005). Pages 564–566. IEEE Computer Society Press. 2005.
Details about GIMI: Generic Infrastructure for Medical Informatics | BibTeX data for GIMI: Generic Infrastructure for Medical Informatics
-
[81]
On deducibility and anonymisation in medical databases
D. J. Power‚ M. A. Slaymaker and A. C. Simpson
In W. Jonker and M. Petkovic, editors, Proceedings of Secure Data Management 2005. Vol. 3674 of Lecture Notes in Computer Science. Pages 170–184. Springer. 2005.
Details about On deducibility and anonymisation in medical databases | BibTeX data for On deducibility and anonymisation in medical databases
-
[82]
A secure wrapper for OGSA−DAI
D. J. Power‚ M. A. Slaymaker‚ E. A. Politou and A. C. Simpson
In Proceedings of the European Grid Conference‚ 2005. Vol. 3470 of Lecture Notes in Computer Science. Pages 485–494. Springer. 2005.
Details about A secure wrapper for OGSA−DAI | BibTeX data for A secure wrapper for OGSA−DAI
-
[83]
On XACML‚ role−based access control‚ and health grids
D. J. Power‚ M. A. Slaymaker‚ E. A. Politou and A. C. Simpson
In Proceedings of the 2005 UK e−Science All Hands Meeting. 2005.
Details about On XACML‚ role−based access control‚ and health grids | BibTeX data for On XACML‚ role−based access control‚ and health grids
-
[84]
Protecting Sensitive Patient Data via Query Modification
D. J. Power‚ M. A. Slaymaker‚ E. A. Politou and A. C. Simpson
In Proceedings of the 20th ACM Symposium on Applied Computing. Pages 224−230. March, 2005.
Details about Protecting Sensitive Patient Data via Query Modification | BibTeX data for Protecting Sensitive Patient Data via Query Modification
-
[85]
Exploitation of switched lightpaths for e−health
L. Momtahan and A. C. Simpson
In Proceedings of the 2005 UK e−Science All Hands Meeting. 2005.
Details about Exploitation of switched lightpaths for e−health | BibTeX data for Exploitation of switched lightpaths for e−health
-
[86]
The Integrative Biology Infrastructure
D. Mac Randal‚ L. Sastry‚ D. Hanlon‚ D. J. Gavaghan‚ S. Lloyd and A. C. Simpson
In Proceedings of the 2005 UK e−Science All Hands Meeting. 2005.
Details about The Integrative Biology Infrastructure | BibTeX data for The Integrative Biology Infrastructure
-
[87]
Managing collaborative expertise: issues and challenges
I. Kinti‚ S. Lloyd‚ A. C. Simpson and G. Hayward
In Proceedings of OKLC 2005‚ Boston‚ MA. 2005.
Details about Managing collaborative expertise: issues and challenges | BibTeX data for Managing collaborative expertise: issues and challenges
-
[88]
NeuroGrid: collaborative neuroscience via grid computing
J. Geddes‚ S. Lloyd‚ A. C. Simpson‚ M. Rossor‚ N. Fox‚ D. Hill‚ J. Hajnal‚ S. Lawrie‚ A. McIntosh‚ E. Johnstone‚ J. Wardlaw‚ D. Perry‚ R. Procter‚ P. Bath and E. Bullimore
In Proceedings of the 2005 UK e−Science All Hands Meeting. 2005.
Details about NeuroGrid: collaborative neuroscience via grid computing | BibTeX data for NeuroGrid: collaborative neuroscience via grid computing
-
[89]
NeuroGrid: using grid technology to advance neuroscience
J. Geddes‚ S. Lloyd‚ A. C. Simpson‚ M. Rossor‚ N. Fox‚ D. Hill‚ J. V. Hajnal‚ S. Lawrie‚ A. McIntosh‚ E. Johnstone‚ J. Wardlaw‚ D. Perry‚ R. Procter‚ P. Bath and E. Bullimore
In Proceedings of the 18th IEEE Symposium on Computer−Based Medical Systems. Pages 570–573. IEEE Computer Society Press. 2005.
Details about NeuroGrid: using grid technology to advance neuroscience | BibTeX data for NeuroGrid: using grid technology to advance neuroscience
-
[90]
VRE for the Integrative Biology research consortium
M. J. Dovey‚ M. Mascord‚ D. J. Gavaghan‚ S. Lloyd‚ A. C. Simpson‚ G. Williams and D. Mac Randal
In Proceedings of the 2005 UK e−Science All Hands Meeting. 2005.
Details about VRE for the Integrative Biology research consortium | BibTeX data for VRE for the Integrative Biology research consortium
-
[91]
Security principles for public−resource modeling research
D. A. Stainforth‚ A. P. Martin‚ A. C. Simpson‚ C. A. Christensen‚ J. Kettleborough‚ T. Aina and M. R. Allen
In Proceedings of the IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE−2004). Pages 319–324. 2004.
Details about Security principles for public−resource modeling research | BibTeX data for Security principles for public−resource modeling research
-
[92]
A vision for secure grid−enabled healthcare
M. A. Slaymaker‚ D. J Power‚ E. A. Politou and A. C. Simpson
In Workshop on Grid Security Practice and Experience. Technical Report YCS−2004−380‚ University of York. June, 2004.
Details about A vision for secure grid−enabled healthcare | BibTeX data for A vision for secure grid−enabled healthcare
-
[93]
eDiaMoND: risk analysis
M. A. Slaymaker‚ E. A. Politou‚ D. J. Power‚ S. Lloyd and A. C. Simpson
In Proceedings of HealthGrid 2004‚ Claremont‚ France. 2004.
Details about eDiaMoND: risk analysis | BibTeX data for eDiaMoND: risk analysis
-
[94]
Security aspects of grid−based digital mammography
M. A. Slaymaker‚ E. A. Politou‚ D. J. Power‚ S. Lloyd and A. C. Simpson
In Proceedings of HealthGrid 2004‚ Claremont‚ France. 2004.
Details about Security aspects of grid−based digital mammography | BibTeX data for Security aspects of grid−based digital mammography
-
[95]
e−health security issues: the eDiaMoND perspective
M. A. Slaymaker‚ E. A. Politou‚ D. J. Power and S. Lloyd
In Proceedings of the 2004 UK e−Science All Hands Meeting. 2004.
Details about e−health security issues: the eDiaMoND perspective | BibTeX data for e−health security issues: the eDiaMoND perspective
-
[96]
An Approach to the Storage of DICOM files for Grid−Enabled Medical Imaging Databases
D. J. Power‚ E. A. Politou‚ M. A. Slaymaker‚ S. Harris and A. C. Simpson
In Proceedings of the 19th ACM Symposium on Applied Computing. Pages 272–279. 2004.
Details about An Approach to the Storage of DICOM files for Grid−Enabled Medical Imaging Databases | BibTeX data for An Approach to the Storage of DICOM files for Grid−Enabled Medical Imaging Databases
-
[97]
eDiaMoND: challenges for the e−scientist in the e−health domain
S. Lloyd‚ A. C. Simpson‚ D. J. Gavaghan and J. M. Brady
In Proceedings of the 2004 UK e−Science All Hands Meeting. 2004.
Details about eDiaMoND: challenges for the e−scientist in the e−health domain | BibTeX data for eDiaMoND: challenges for the e−scientist in the e−health domain
-
[98]
Digital mammography: a world without film?
S. Lloyd‚ M. Jirotka‚ A. C. Simpson‚ R. P. Highnam‚ D. J. Gavaghan‚ D. Watson and J. M. Brady
In Proceedings of HealthGrid 2004‚ Claremont‚ France. 2004.
Details about Digital mammography: a world without film? | BibTeX data for Digital mammography: a world without film?
-
[99]
Integrative Biology: exploiting e−Science to combat fatal diseases
D.J. Gavaghan‚ S. Lloyd‚ D. R. S. Boyd‚ P. W. Jeffreys‚ A. C. Simpson‚ D. F. Mac Randal‚ L. Sastry and K. Kleese van Dam
In Proceedings of the 2004 UK e−Science All Hands Meeting. 2004.
Details about Integrative Biology: exploiting e−Science to combat fatal diseases | BibTeX data for Integrative Biology: exploiting e−Science to combat fatal diseases
-
[100]
Teaching Formal Methods in Context
J. W. Davies‚ A. C. Simpson and A. P. Martin
In C. N. Dean and R. F. Boute, editors, Proceedings of CoLogNet / Formal Methods Europe Symposium on Teaching Formal Methods 2004. Vol. 3294 of Lecture Notes in Computer Science. Pages 186–202. Springer. 2004.
Details about Teaching Formal Methods in Context | BibTeX data for Teaching Formal Methods in Context
-
[101]
eDiaMoND: the UK's national digital mammography database
J. M. Brady‚ F. Gilbert‚ S. Lloyd‚ M. Jirotka‚ D. J. Gavaghan‚ A. C. Simpson‚ R. P. Highnam‚ T. Bowles‚ D. Schottlander‚ D. McCabe‚ D. Watson‚ B. Collins‚ J. Williams‚ A. Knox‚ M. Oevers and P. Taylor
In Proceedings of IWDM 2004. 2004.
Details about eDiaMoND: the UK's national digital mammography database | BibTeX data for eDiaMoND: the UK's national digital mammography database
-
[102]
Generalizing the Z Schema Calculus: Database Schemas and Beyond
A. P. Martin and A. C. Simpson
In Proceedings of the 10th Asia−Pacific Software Engineering Conference (APSEC 2003). Pages 28–37. IEEE. 2003.
Details about Generalizing the Z Schema Calculus: Database Schemas and Beyond | BibTeX data for Generalizing the Z Schema Calculus: Database Schemas and Beyond
-
[103]
On the supervision and assessment of part−time postgraduate software engineering projects
A C. Simpson‚ A. P. Martin‚ J. Gibbons‚ J. W. Davies and S. W. McKeever
In Proceedings of the 25th International Conference on Software Engineering (ICSE)‚ Portland‚ Oregon‚ 3–10 May‚ 2003. Pages 628–633. IEEE Computer Society Press. 2003.
Details about On the supervision and assessment of part−time postgraduate software engineering projects | BibTeX data for On the supervision and assessment of part−time postgraduate software engineering projects
-
[104]
Supplementing the understanding of Z: a formal approach to database design
A. C. Simpson and A. P. Martin
In Proceedings of the BCS Teaching Formal Methods workshop. BCS. 2003.
Details about Supplementing the understanding of Z: a formal approach to database design | BibTeX data for Supplementing the understanding of Z: a formal approach to database design
-
[105]
An approach to the storage of DICOM files for grid−enabled medical imaging databases
D. J. Power‚ E. A. Politou‚ M. A. Slaymaker‚ S. Harris and A. C. Simpson
In Proceedings of the 2003 UK e−Science All Hands Meeting. 2003.
Details about An approach to the storage of DICOM files for grid−enabled medical imaging databases | BibTeX data for An approach to the storage of DICOM files for grid−enabled medical imaging databases
-
[106]
Grid computing for digital mammography
J. M. Brady‚ D. J. Gavaghan‚ R. P. Highnam‚ A. Knox‚ S. Lloyd‚ A. C. Simpson and D. Watson
In Proceedings of the 2003 UK e−Science All Hands Meeting. 2003.
Details about Grid computing for digital mammography | BibTeX data for Grid computing for digital mammography
-
[107]
Climateprediction.net: design principles for public resource modelling research
D. Stainforth‚ J. Kettleborough‚ A. P. Martin‚ A. C. Simpson‚ R. Gillis‚ A. Akkas‚ R. Gault‚ M. Collins‚ D. J. Gavaghan and M. Allen
In Proc. 14th IASTED conference on parallel and distributed computing systems.. 2002.
Details about Climateprediction.net: design principles for public resource modelling research | BibTeX data for Climateprediction.net: design principles for public resource modelling research
-
[108]
climateprediction.com: security and design planning
D. Stainforth‚ J. A. Kettleborough‚ A. P. Martin‚ A. C. Simpson‚ A. P. Martin‚ R. Gillis‚ A. Akkas‚ R. Gault‚ M. Collins‚ D. J. Gavaghan and M. Allen
In Proceedings of the 2002 UK e−Science All Hands Meeting. 2002.
Details about climateprediction.com: security and design planning | BibTeX data for climateprediction.com: security and design planning
-
[109]
eDiamond: Digital Mammography
J. M. Brady‚ D. J. Gavaghan‚ R. P. Highnam‚ M. Mulet−Parada and A. C. Simpson
In Proceedings of the 2002 UK e−Science All Hands Conference. 2002.
Details about eDiamond: Digital Mammography | BibTeX data for eDiamond: Digital Mammography
-
[110]
BSP in CSP: Easy as ABC
A. C. Simpson‚ J. M. D. Hill and S. R. Donaldson
In Proceedings of Fourth International Workshop on Formal Methods for Parallel Programming: Theory and Applications‚ San Juan‚ Puerto Rico‚ April 1999. Pages 1299–1313. Springer. 1999.
Details about BSP in CSP: Easy as ABC | BibTeX data for BSP in CSP: Easy as ABC
-
[111]
Model Checking for Interlocking Safety
A. C. Simpson
In Proceedings of the 2nd FMERail Seminar‚ 15–16 October 1998‚ London‚ United Kingdom. 1998.
Details about Model Checking for Interlocking Safety | BibTeX data for Model Checking for Interlocking Safety
-
[112]
Security management via Z and CSP
A. C. Simpson‚ J. W. Davies and J. C. P. Woodcock
In Proceedings of Formal Methods Pacific '98‚ Canberra‚ Australia‚ 29 September – 2 October‚ 1998. Pages 334–351. Springer Series in Discrete Mathematics and Theoretical Computer Science. 1998.
Details about Security management via Z and CSP | BibTeX data for Security management via Z and CSP
-
[113]
A Novel Data Mining Tool for ATM Networks
K. E. Burn−Thornton‚ D. M. Cattrall and A. C. Simpson
In Proceedings of IEE conference on Data Mining. 1996.
Details about A Novel Data Mining Tool for ATM Networks | BibTeX data for A Novel Data Mining Tool for ATM Networks
-
[114]
Polymorphic Functions for Data Mining in an ATM Network
K. E. Burn−Thornton‚ D. M. Cattrall and A. C. Simpson
In Proceedings of the 4th IFIP conference on ATM Networks. 1996.
Details about Polymorphic Functions for Data Mining in an ATM Network | BibTeX data for Polymorphic Functions for Data Mining in an ATM Network
-
[115]
Railway Signalling as a case study in Safety through Determinism
A. C. Simpson
In Proceedings of Aspect 1995. Institution of Railway Signal Engineers. 1995.
Details about Railway Signalling as a case study in Safety through Determinism | BibTeX data for Railway Signalling as a case study in Safety through Determinism
Technical reports
-
[1]
Towards an effective PIA−based Risk Analysis: An Approach for Analysing Potential Privacy Risks
Majed Alshammari and Andrew Simpson
No. RR−18−01. Department of Computer Science. Oxford‚ UK. 2018.
Details about Towards an effective PIA−based Risk Analysis: An Approach for Analysing Potential Privacy Risks | BibTeX data for Towards an effective PIA−based Risk Analysis: An Approach for Analysing Potential Privacy Risks | Download (pdf) of Towards an effective PIA−based Risk Analysis: An Approach for Analysing Potential Privacy Risks
-
[2]
Personal Data Management for Privacy Engineering: An Abstract Personal Data Lifecycle Model
Majed Alshammari and Andrew Simpson
No. CS−RR−17−02. Department of Computer Science. Oxford UK. 2017.
Details about Personal Data Management for Privacy Engineering: An Abstract Personal Data Lifecycle Model | BibTeX data for Personal Data Management for Privacy Engineering: An Abstract Personal Data Lifecycle Model | Download (pdf) of Personal Data Management for Privacy Engineering: An Abstract Personal Data Lifecycle Model
-
[3]
Whither the privacy breach case studies?
Andrew Simpson
No. RR−16−06. Department of Computer Science. Oxford‚ UK. 2016.
Details about Whither the privacy breach case studies? | BibTeX data for Whither the privacy breach case studies? | Download (pdf) of Whither the privacy breach case studies?
-
[4]
Towards a Principled Approach for Engineering Privacy by Design
Majed Alshammari and Andrew Simpson
No. RR−16−05. Department of Computer Science. Oxford‚ UK. 2016.
Details about Towards a Principled Approach for Engineering Privacy by Design | BibTeX data for Towards a Principled Approach for Engineering Privacy by Design | Download (pdf) of Towards a Principled Approach for Engineering Privacy by Design
-
[5]
On the modelling and analysis of Amazon Web Services access policies
David Power‚ Mark Slaymaker and Andrew Simpson
No. RR−09−15. Oxford University Computing Laboratory. November, 2009.
Details about On the modelling and analysis of Amazon Web Services access policies | BibTeX data for On the modelling and analysis of Amazon Web Services access policies | Download (pdf) of On the modelling and analysis of Amazon Web Services access policies
-
[6]
Towards the mechanical verification of moving block signalling systems
A. C. Simpson
No. CMS−TR−99−06. School of Computing and Mathematical Sciences‚ Oxford Brookes University. 1999.
Details about Towards the mechanical verification of moving block signalling systems | BibTeX data for Towards the mechanical verification of moving block signalling systems
Miscellaneous
-
[1]
On Small−Scale IT Users' System Architectures and Cyber Security: A UK Case Study
Emma Osborn and Andrew Simpson
2017.
Details about On Small−Scale IT Users' System Architectures and Cyber Security: A UK Case Study | BibTeX data for On Small−Scale IT Users' System Architectures and Cyber Security: A UK Case Study
-
[2]
Safety through Security
A. C. Simpson
DPhil thesis‚ Oxford University Computing Laboratory. 1996.
Details about Safety through Security | BibTeX data for Safety through Security