Michael Goldsmith : Publications
Books
-
[1]
Modelling and Analysis of Security Protocols
Peter Ryan‚ Steve Schneider‚ M Goldsmith‚ G Lowe and B Roscoe
Addison Wesley. 2001.
Details about Modelling and Analysis of Security Protocols | BibTeX data for Modelling and Analysis of Security Protocols
-
[2]
Programming in occam 2
Geraint Jones and Michael Goldsmith
Prentice−Hall. 1988.
Details about Programming in occam 2 | BibTeX data for Programming in occam 2 | DOI (10.1016/0167-6423(89)90031-2)
Book chapters
-
[1]
Inadequacies of Current Risk Controls for the Cloud
Sadie Creese‚ Michael Goldsmith and Paul Hopkins
In Privacy and Security for Cloud Computing. Pages 235–255. Springer London. 2013.
Details about Inadequacies of Current Risk Controls for the Cloud | BibTeX data for Inadequacies of Current Risk Controls for the Cloud
-
[2]
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation
Ioannis Agrafiotis‚ Sadie Creese and Michael Goldsmith
In Privacy and Identity Management for Life. Pages 232–244. Springer Boston. 2012.
Details about Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation | BibTeX data for Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation
-
[3]
Developing a Strategy for Automated Privacy Testing Suites
Ioannis Agrafiotis‚ Sadie Creese and Michael Goldsmith
In Privacy and Identity Management for Life. Pages 32–44. Springer Boston. 2012.
Details about Developing a Strategy for Automated Privacy Testing Suites | BibTeX data for Developing a Strategy for Automated Privacy Testing Suites
-
[4]
EnCoRe: Towards A Conceptual Model For Privacy Policies
Marco Casassa Mont‚ Siani Pearson‚ Sadie Creese‚ Michael Goldsmith and Nick Papanikolaou
In Privacy and Identity Management for Life. Vol. 352. Springer IFIP AICT. 2011.
Details about EnCoRe: Towards A Conceptual Model For Privacy Policies | BibTeX data for EnCoRe: Towards A Conceptual Model For Privacy Policies
-
[5]
Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements
Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith and Nick Papanikolaou
In Privacy and Identity Management for Life. Vol. 352. Pages 271–282. Springer IFIP AICT. 2011.
Details about Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements | BibTeX data for Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements
-
[6]
Towards A Conceptual Model For Privacy Policies
Casassa Mont‚ Marco‚ Siani Pearson‚ Sadie Creese‚ Michael Goldsmith and Nick Papanikolaou
In Privacy and Identity Management for Life. Vol. 352. Springer IFIP AICT. 2011.
Details about Towards A Conceptual Model For Privacy Policies | BibTeX data for Towards A Conceptual Model For Privacy Policies
-
[7]
A Conceptual Model for Privacy Policies with Consent and Revocation Requirements
Marco Casassa Mont‚ Siani Pearson‚ Sadie Creese‚ Michael Goldsmith and Nick Papanikolaou
In Privacy and Identity Management for Life: 6th IFIP WG 9. 2‚ 9. 6/11. 7‚ 11. 4‚ 11. 6/PrimeLife International Summer School‚ Helsingborg‚ Sweden‚ August 2−6‚ 2010‚ Revised Selected Papers. Vol. 352. Pages 258–271. Springer IFIP AICT. 2011.
Details about A Conceptual Model for Privacy Policies with Consent and Revocation Requirements | BibTeX data for A Conceptual Model for Privacy Policies with Consent and Revocation Requirements
-
[8]
Reaching for informed revocation: shutting off the tap on personal data
Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith and Nick Papanikolaou
In Privacy and Identity Management for Life. Vol. 320. Pages 246–258. Springer IFIP AICT. 2010.
Details about Reaching for informed revocation: shutting off the tap on personal data | BibTeX data for Reaching for informed revocation: shutting off the tap on personal data
-
[9]
Reaching for Informed Revocation: Shutting Off the Tap on Personal Data
N. Papanikolaou I. Agrafiotis S. Creese M. Goldsmith
In Privacy and Identity Management for Life‚ Proceedings of 5th PrimeLife/IFIP International Summer School. Springer IFIP AICT 320. 2009.
Details about Reaching for Informed Revocation: Shutting Off the Tap on Personal Data | BibTeX data for Reaching for Informed Revocation: Shutting Off the Tap on Personal Data
-
[10]
Operational semantics for fun and profit
Michael Goldsmith
In Communicating Sequential Processes. The First 25 Years. Pages 265–274. Springer Berlin/Heidelberg. 2005.
Details about Operational semantics for fun and profit | BibTeX data for Operational semantics for fun and profit
-
[11]
Security properties and mechanisms in human−centric computing
SJ Creese‚ MH Goldsmith‚ AW Roscoe and Irfan Zakiuddin
In P. Robinson‚ H. Vogt and W. Wagealla, editors, Privacy‚ Security and Trust within the Context of Pervasive Computing. Springer. 2004.
Details about Security properties and mechanisms in human−centric computing | BibTeX data for Security properties and mechanisms in human−centric computing
Journal papers
-
[1]
Identifying attack patterns for insider threat detection
Ioannis Agrafiotis‚ Jason R. C. Nurse‚ Oliver Buckley‚ Phil Legg‚ Sadie Creese and Michael Goldsmith
In Computer Fraud & Security. No. 7. Pages 9–17. July, 2015.
Details about Identifying attack patterns for insider threat detection | BibTeX data for Identifying attack patterns for insider threat detection | DOI (10.1016/S1361-3723(15)30066-X) | Link to Identifying attack patterns for insider threat detection
-
[2]
Investigating the leakage of sensitive personal and organisational information in email headers
Jason R. C. Nurse‚ Arnau Erola‚ Michael Goldsmith and Sadie Creese
In Journal of Internet Services and Information Security. Vol. 5. No. 1. 2015.
Details about Investigating the leakage of sensitive personal and organisational information in email headers | BibTeX data for Investigating the leakage of sensitive personal and organisational information in email headers | Download (pdf) of Investigating the leakage of sensitive personal and organisational information in email headers | Download (pdf) of Investigating the leakage of sensitive personal and organisational information in email headers
-
[3]
Two sides of the coin: measuring and communicating the trustworthiness of online information
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Michael Goldsmith‚ Sadie Creese and Koen Lamberts
In Journal of Trust Management. Vol. 1. No. 5. 2014.
Details about Two sides of the coin: measuring and communicating the trustworthiness of online information | BibTeX data for Two sides of the coin: measuring and communicating the trustworthiness of online information | DOI (10.1186/2196-064X-1-5) | Link to Two sides of the coin: measuring and communicating the trustworthiness of online information
-
[4]
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
Sadie Creese Philip A. Legg Nick Moffat Jason R.C. Nurse Jassim Happa Ioannis Agrafiotis Michael Goldsmith
In Journal of Wireless Mobile Networks‚ Ubiquitous Computing‚ and Dependable Applications. Vol. 4. No. 4. Pages 20−37. 2013.
Details about Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection | BibTeX data for Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection | Download (pdf) of Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
-
[5]
Refinement Checking for Privacy Policies
S. Creese N. Papanikolaou M. Goldsmith
In Science of Computer Programming. 2011.
Details about Refinement Checking for Privacy Policies | BibTeX data for Refinement Checking for Privacy Policies | DOI (10.1016/j.scico.2011.07.009)
-
[6]
Assumption–Commitment Support for CSP Model Checking
Nick Moffat and Michael Goldsmith
In Journal of Automated Reasoning. Vol. 41. No. 3. Pages 365–398. 2008.
Details about Assumption–Commitment Support for CSP Model Checking | BibTeX data for Assumption–Commitment Support for CSP Model Checking | DOI (10.1007/s10817-008-9111-8)
-
[7]
The perfect ‘spy’ for model−checking cryptoprotocols
AW Roscoe and MH Goldsmith
In Proceedings of DIMACS workshop on the design and formal verification of cryptographic protocols. Vol. 574. 1997.
Details about The perfect ‘spy’ for model−checking cryptoprotocols | BibTeX data for The perfect ‘spy’ for model−checking cryptoprotocols
-
[8]
Denotational semantics for occam 2
MH Goldsmith‚ AW Roscoe and BG Scott
In Transputer Communications. No. 1(2); 2(1). 1993.
Details about Denotational semantics for occam 2 | BibTeX data for Denotational semantics for occam 2
Conference papers
-
[1]
Reflecting on the Use of Sonification for Network Monitoring
Louise Axon‚ Sadie Creese‚ Michael Goldsmith and Jason R.C. Nurse
In 10th International Conference on Emerging Security Information‚ Systems and Technologies. Pages 254–261. 2016.
Details about Reflecting on the Use of Sonification for Network Monitoring | BibTeX data for Reflecting on the Use of Sonification for Network Monitoring | Download (pdf) of Reflecting on the Use of Sonification for Network Monitoring
-
[2]
Applying semantic technologies to fight online banking fraud
Rodrigo Carvalho‚ Michael Goldsmith and Sadie Creese
In European Intelligence and Security Informatics Conference (EISIC). 2015.
Details about Applying semantic technologies to fight online banking fraud | BibTeX data for Applying semantic technologies to fight online banking fraud | Download (pdf) of Applying semantic technologies to fight online banking fraud
-
[3]
Information trustworthiness as a solution to the misinformation problems in social media
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Michael Goldsmith‚ Sadie Creese‚ Koen Lamberts‚ Darren Price and Glyn Jones
In International Conference on Cyber Security for Sustainable Society. Pages 28−35. 2015.
Details about Information trustworthiness as a solution to the misinformation problems in social media | BibTeX data for Information trustworthiness as a solution to the misinformation problems in social media | Download (pdf) of Information trustworthiness as a solution to the misinformation problems in social media
-
[4]
Predicting Graphical Passwords
Matthieu Devlin‚ Jason R. C. Nurse‚ Duncan Hodges‚ Michael Goldsmith and Sadie Creese
In Theo Tryfonas and Ioannis Askoxylakis, editors, International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 17th International Conference on Human−Computer Interaction (HCI). Pages 23–35. Springer. 2015.
Details about Predicting Graphical Passwords | BibTeX data for Predicting Graphical Passwords | Download (pdf) of Predicting Graphical Passwords | DOI (10.1007/978-3-319-20376-8_3)
-
[5]
Applying Social Network Analysis to Security
Elizabeth Phillips‚ Jason R. C. Nurse‚ Michael Goldsmith and Sadie Creese
In International Conference on Cyber Security for Sustainable Society. Pages 11–27. 2015.
Details about Applying Social Network Analysis to Security | BibTeX data for Applying Social Network Analysis to Security | Download (pdf) of Applying Social Network Analysis to Security
-
[6]
Online banking malware ontology
Rodrigo Carvalho‚ Michael Goldsmith and Jason R. C. Nurse
In International Crime and Intelligence Analysis Conference (ICIA). 2015.
Details about Online banking malware ontology | BibTeX data for Online banking malware ontology | Download (pdf) of Online banking malware ontology
-
[7]
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat
Oliver Buckley‚ Jason R. C. Nurse‚ Philip A. Legg‚ Michael Goldsmith and Sadie Creese
In Workshop on Socio−Technical Aspects in Security and Trust (STAST) associated with 27th IEEE Computer Security Foundations Symposium (CSF). IEEE. 2014.
Details about Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat | BibTeX data for Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat | Download (pdf) of Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat | DOI (10.1109/STAST.2014.10)
-
[8]
Managing the influence of social media using information trust
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Michael Goldsmith‚ Sadie Creese‚ Koen Lamberts‚ Darren Price and Glyn Jones
In Social Influence in the Information Age Conference. 2014.
Details about Managing the influence of social media using information trust | BibTeX data for Managing the influence of social media using information trust
-
[9]
Understanding Insider Threat: A Framework for Characterising Attacks
Jason R.C. Nurse‚ Oliver Buckley‚ Philip A. Legg‚ Michael Goldsmith‚ Sadie Creese‚ Gordon R.T. Wright and Monica Whitty
In Workshop on Research for Insider Threat (WRIT) held as part of the IEEE Computer Society Security and Privacy Workshops (SPW14)‚ in conjunction with the IEEE Symposium on Security and Privacy (SP).. IEEE. 2014.
Details about Understanding Insider Threat: A Framework for Characterising Attacks | BibTeX data for Understanding Insider Threat: A Framework for Characterising Attacks | Download of Understanding Insider Threat: A Framework for Characterising Attacks | DOI (10.1109/SPW.2014.38) | Link to Understanding Insider Threat: A Framework for Characterising Attacks
-
[10]
A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches
Jason R.C. Nurse‚ Philip A. Legg‚ Oliver Buckley‚ Ioannis Agrafiotis‚ Gordon Wright‚ Monica Whitty‚ David Upton‚ Michael Goldsmith and Sadie Creese
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 16th International Conference on Human−Computer Interaction (HCI). Springer. 2014.
Details about A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | BibTeX data for A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | Download (pdf) of A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | DOI (10.1007/978-3-319-07620-1_24)
-
[11]
The Meaning and Implementation of SKIP in CSP
Thomas Gibson−Robinson and Michael Goldsmith
In Communicating Process Architectures 2013. 2013.
Details about The Meaning and Implementation of SKIP in CSP | BibTeX data for The Meaning and Implementation of SKIP in CSP | Download (pdf) of The Meaning and Implementation of SKIP in CSP
-
[12]
Building Confidence in Information−Trustworthiness Metrics for Decision Support
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 12th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (IEEE TrustCom−13). IEEE. 2013.
Details about Building Confidence in Information−Trustworthiness Metrics for Decision Support | BibTeX data for Building Confidence in Information−Trustworthiness Metrics for Decision Support | Download of Building Confidence in Information−Trustworthiness Metrics for Decision Support | DOI (10.1109/TrustCom.2013.6)
-
[13]
Communicating Trustworthiness using Radar Graphs: A Detailed Look
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 11th International Conference on Privacy‚ Security and Trust (PST). IEEE. 2013.
Details about Communicating Trustworthiness using Radar Graphs: A Detailed Look | BibTeX data for Communicating Trustworthiness using Radar Graphs: A Detailed Look | Download (pdf) of Communicating Trustworthiness using Radar Graphs: A Detailed Look | DOI (10.1109/PST.2013.6596085)
-
[14]
Supporting Human Decision−Making Online using Information Trustworthiness Metrics
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith and Syed S. Rahman
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 15th International Conference on Human−Computer Interaction (HCII). Springer. 2013.
Details about Supporting Human Decision−Making Online using Information Trustworthiness Metrics | BibTeX data for Supporting Human Decision−Making Online using Information Trustworthiness Metrics | Download (pdf) of Supporting Human Decision−Making Online using Information Trustworthiness Metrics | DOI (10.1007/978-3-642-39345-7_33)
-
[15]
Tools for Understanding Identity
Sadie Creese‚ Thomas Gibson−Robinson‚ Michael Goldsmith‚ Duncan Hodges‚ Dee Kim‚ Oriana Love‚ Jason R. C. Nurse‚ Bill Pike and Jean Schultz
In IEEE Conference on Technologies for Homeland Security (HST '13). 2013.
Details about Tools for Understanding Identity | BibTeX data for Tools for Understanding Identity | DOI (10.1109/THS.2013.6699064)
-
[16]
CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise
Sadie Creese‚ Michael Goldsmith‚ Nick Moffat‚ Jassim Happa and Ioannis Agrafiotis
In 13th annual IEEE Conference on Technologies for Homeland Security (HST'13). 2013.
To appear
Details about CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise | BibTeX data for CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise | Link to CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise
-
[17]
Tools for Understanding Identity
Sadie Creese‚ Thomas Gibson−Robinson‚ Michael Goldsmith‚ Duncan Hodges‚ Dee Kim‚ Oriana Love‚ Jason R.C. Nurse‚ Bill Pike and Jean Scholtz
In 13th annual IEEE Conference on Technologies for Homeland Security (HST'13). 2013.
To appear
Details about Tools for Understanding Identity | BibTeX data for Tools for Understanding Identity | Link to Tools for Understanding Identity
-
[18]
Cloud Computing: Insider Attacks on Virtual Machines During Migration
Adrian Duncan‚ Michael Goldsmith‚ Sadie Creese and James Quinton
In The 12th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (IEEE TrustCom'13). IEEE. 2013.
Details about Cloud Computing: Insider Attacks on Virtual Machines During Migration | BibTeX data for Cloud Computing: Insider Attacks on Virtual Machines During Migration | DOI (10.1109/TrustCom.2013.62)
-
[19]
Building Confidence in Information−Trustworthiness Metrics for Decision Support
Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 12th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (IEEE TrustCom'13). IEEE. 2013.
Details about Building Confidence in Information−Trustworthiness Metrics for Decision Support | BibTeX data for Building Confidence in Information−Trustworthiness Metrics for Decision Support | DOI (10.1109/TrustCom.2013.6)
-
[20]
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
Adedayo O Adetoye‚ Sadie Creese and Michael H Goldsmith
In Critical Information Infrastructures Security. Pages 155–167. Springer Berlin Heidelberg. 2013.
Details about Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment | BibTeX data for Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
-
[21]
Supporting Human Decision−Making Online Using Information−Trustworthiness Metrics
Jason RC Nurse‚ Sadie Creese‚ Michael Goldsmith and Syed Sadiqur Rahman
In Human Aspects of Information Security‚ Privacy‚ and Trust. Pages 316–325. Springer Berlin Heidelberg. 2013.
Details about Supporting Human Decision−Making Online Using Information−Trustworthiness Metrics | BibTeX data for Supporting Human Decision−Making Online Using Information−Trustworthiness Metrics
-
[22]
Communicating trustworthiness using radar graphs: A detailed look
Jason RC Nurse‚ Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In Privacy‚ Security and Trust (PST)‚ 2013 Eleventh Annual International Conference on. Pages 333–339. IEEE. 2013.
Details about Communicating trustworthiness using radar graphs: A detailed look | BibTeX data for Communicating trustworthiness using radar graphs: A detailed look
-
[23]
NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data
James Nicholls‚ Dominik Peters‚ Albert Slawinski‚ Thomas Spoor‚ Sergiu Vicol‚ Jassim Happa‚ Michael Goldsmith and Sadie Creese
In Theory and Practice of Computer Graphics. Pages 9–16. The Eurographics Association. 2013.
Details about NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data | BibTeX data for NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data
-
[24]
An Initial Usability Evaluation of the Secure Situation Awareness System
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith‚ Rachel Craddock and Glyn Jones
In The 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012). IAS of ISCRAM. 2012.
Details about An Initial Usability Evaluation of the Secure Situation Awareness System | BibTeX data for An Initial Usability Evaluation of the Secure Situation Awareness System | Download (pdf) of An Initial Usability Evaluation of the Secure Situation Awareness System | Download (pdf) of An Initial Usability Evaluation of the Secure Situation Awareness System
-
[25]
A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks
Sadie Creese‚ Michael Goldsmith‚ Jason R.C. Nurse and Elizabeth Phillips
In 11th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (IEEE TrustCom−12). Pages 1124−1131. IEEE. 2012.
Details about A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks | BibTeX data for A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks | Download (pdf) of A Data−Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks | DOI (10.1109/TrustCom.2012.22)
-
[26]
Inside FDR (abstract of invited talk)
Michael Goldsmith
In Pre−Proceedings of the 12th International Workshop on Automated Verification of Critical Systems (AVoCS 2012). Pages 11. 2012.
Details about Inside FDR (abstract of invited talk) | BibTeX data for Inside FDR (abstract of invited talk)
-
[27]
Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources
Syed Rahman‚ Sadie Creese and Michael Goldsmith
In Security and Trust Management. Pages 223–238. Springer Berlin/Heidelberg LNCS. 2012.
Details about Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources | BibTeX data for Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources
-
[28]
Recent developments in FDR
Philip Armstrong‚ Michael Goldsmith‚ Gavin Lowe‚ Joël Ouaknine‚ Hristina Palikareva‚ AW Roscoe and James Worrell
In Computer Aided Verification. Pages 699–704. Springer Berlin/Heidelberg. 2012.
Details about Recent developments in FDR | BibTeX data for Recent developments in FDR | DOI (10.1007/978-3-642-31424-7_52)
-
[29]
Insider Attacks in Cloud Computing
Adrian J Duncan‚ Sadie Creese and Michael Goldsmith
In Trust‚ Security and Privacy in Computing and Communications (TrustCom)‚ 2012 IEEE 11th International Conference on. Pages 857–862. IEEE. 2012.
Details about Insider Attacks in Cloud Computing | BibTeX data for Insider Attacks in Cloud Computing
-
[30]
Using Information Trustworthiness Advice in Decision Making
Jason RC Nurse‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In Socio−Technical Aspects in Security and Trust (STAST)‚ 2012 Workshop on. Pages 35–42. IEEE. 2012.
Details about Using Information Trustworthiness Advice in Decision Making | BibTeX data for Using Information Trustworthiness Advice in Decision Making
-
[31]
Secure Communication in Disasters
Bangdao Chen‚ Ivan Flechais‚ Sadie Creese‚ Michael Goldsmith and AW Roscoe
In Proceedings of HCI 2012 − People People & Computers XXVI: The 26th BCS Conference on Human Computer Interaction. 2012.
Details about Secure Communication in Disasters | BibTeX data for Secure Communication in Disasters
-
[32]
A data−reachability model for elucidating privacy and security risks related to the use of online social networks
Sadie Creese‚ Michael Goldsmith‚ Jason RC Nurse and Elizabeth Phillips
In Trust‚ Security and Privacy in Computing and Communications (TrustCom)‚ 2012 IEEE 11th International Conference on. Pages 1124–1131. IEEE. 2012.
Details about A data−reachability model for elucidating privacy and security risks related to the use of online social networks | BibTeX data for A data−reachability model for elucidating privacy and security risks related to the use of online social networks
-
[33]
An Initial Usability Evaluation of the Secure Situation Awareness System
Jason RC Nurse‚ Sadie Creese‚ Michael Goldsmith‚ Rachel Craddock and Glyn Jones
In 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012). 2012.
Details about An Initial Usability Evaluation of the Secure Situation Awareness System | BibTeX data for An Initial Usability Evaluation of the Secure Situation Awareness System
-
[34]
A Model for Identity in the Cyber and Natural Universes
Duncan Hodges‚ Sadie Creese and Michael Goldsmith
In Intelligence and Security Informatics Conference (EISIC)‚ 2012 European. Pages 115–122. IEEE. August, 2012.
Details about A Model for Identity in the Cyber and Natural Universes | BibTeX data for A Model for Identity in the Cyber and Natural Universes | DOI (10.1109/EISIC.2012.43)
-
[35]
Identity attribution across CyberSpace and the Natural Space
D. Hodges‚ J.R.C. Nurse‚ M. Goldsmith and S. Creese
In The International Crime and Intelligence Analysis Conference. 2012.
Details about Identity attribution across CyberSpace and the Natural Space | BibTeX data for Identity attribution across CyberSpace and the Natural Space | Link to Identity attribution across CyberSpace and the Natural Space
-
[36]
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
Adedayo O. Adetoye‚ Sadie Creese and Michael H. Goldsmith
In 7th International Conference On Critical Information Infrastructures Security (CRITIS 2012). LNCS. September, 2012.
To appear
Details about Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment | BibTeX data for Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment
-
[37]
From Qualitative to Quantitative Information Erasure
Adedayo O. Adetoye and Michael H. Goldsmith
In International Workshop on Quantitative Aspects in Security Assurance (QASA 2012‚ colocated with ESORICS). September, 2012.
To appear
Details about From Qualitative to Quantitative Information Erasure | BibTeX data for From Qualitative to Quantitative Information Erasure | Download qasa2012-Erasure-SLIDES.pdf of From Qualitative to Quantitative Information Erasure | Download erasure-QASA.pdf of From Qualitative to Quantitative Information Erasure
-
[38]
Using Information Trustworthiness Advice in Decision−Making
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 2nd Workshop on Socio−Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF). IEEE. 2012.
Details about Using Information Trustworthiness Advice in Decision−Making | BibTeX data for Using Information Trustworthiness Advice in Decision−Making | Download (pdf) of Using Information Trustworthiness Advice in Decision−Making | DOI (10.1109/STAST.2012.10)
-
[39]
Analysis of Dependencies in Critical Infrastructures
Adedayo O. Adetoye‚ Sadie Creese and Michael H Goldsmith
In 6th International Conference on Critical Information Infrastructure Security (CRITIS'11). 2011.
Details about Analysis of Dependencies in Critical Infrastructures | BibTeX data for Analysis of Dependencies in Critical Infrastructures
-
[40]
Guidelines for usable cybersecurity: past and present
Jason RC Nurse‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In Cyberspace Safety and Security (CSS)‚ 2011 Third International Workshop on. Pages 21–26. IEEE. 2011.
Details about Guidelines for usable cybersecurity: past and present | BibTeX data for Guidelines for usable cybersecurity: past and present
-
[41]
A logical high−level framework for Critical Infrastructure resilience and risk assessment
Sadie Creese‚ Michael H Goldsmith and Adedayo O Adetoye
In Cyberspace Safety and Security (CSS)‚ 2011 Third International Workshop on. Pages 7–14. IEEE. 2011.
Details about A logical high−level framework for Critical Infrastructure resilience and risk assessment | BibTeX data for A logical high−level framework for Critical Infrastructure resilience and risk assessment
-
[42]
A Modelling Approach for Interdependency in Digital Systems−of−Systems Security
Adedayo Adetoye‚ Sadie Creese‚ Michael Goldsmith and Paul Hopkins
In Critical Information Infrastructure Security. Pages 153–156. Springer Berlin/Heidelberg. 2011.
Details about A Modelling Approach for Interdependency in Digital Systems−of−Systems Security | BibTeX data for A Modelling Approach for Interdependency in Digital Systems−of−Systems Security
-
[43]
Information Quality and Trustworthiness: A Topical State−of−the−Art Review
Jason RC Nurse‚ Syed S Rahman‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In International Conference on Computer Applications and Network Security. IEEE. 2011.
Details about Information Quality and Trustworthiness: A Topical State−of−the−Art Review | BibTeX data for Information Quality and Trustworthiness: A Topical State−of−the−Art Review
-
[44]
Trustworthy and effective communication of cybersecurity risks: a review
Jason RC Nurse‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In 1st Workshop on Socio−Technical Aspects in Security and Trust (STAST) at 5th International Conference on Network and System Security (NSS). 2011.
Details about Trustworthy and effective communication of cybersecurity risks: a review | BibTeX data for Trustworthy and effective communication of cybersecurity risks: a review
-
[45]
A Logical High−Level Framework for Critical Infrastructure Resilience and Risk Assessment
Sadie Creese‚ Michael H. Goldsmith and Adedayo O. Adetoye
In The 3rd International Workshop on Cyberspace Safety and Security (CSS 2011). Milan‚ Italy. September, 2011. To appear.
Details about A Logical High−Level Framework for Critical Infrastructure Resilience and Risk Assessment | BibTeX data for A Logical High−Level Framework for Critical Infrastructure Resilience and Risk Assessment
-
[46]
Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources
Syed Sadiqur Rahman‚ Michael Goldsmith and Sadie Creese
In Proceedings of STM'11 7th International Workshop on Security and Trust Management. June, 2011.
Details about Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources | BibTeX data for Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources
-
[47]
Formalising Requirements for a Biobank Scenario using a Logic for Consent and Revocation
M. Goldsmith I. Agrafiotis S. Creese
In Proceedings of the IFIP Summer School 2011. September, 2011.
Details about Formalising Requirements for a Biobank Scenario using a Logic for Consent and Revocation | BibTeX data for Formalising Requirements for a Biobank Scenario using a Logic for Consent and Revocation
-
[48]
Developing a Strategy for Automated Privacy Testing Suites
M. Goldsmith I. Agrafiotis S. Creese
In Proceedings of the IFIP Summer School. September, 2011.
Details about Developing a Strategy for Automated Privacy Testing Suites | BibTeX data for Developing a Strategy for Automated Privacy Testing Suites
-
[49]
Guidelines for Usable Cybersecurity: Past and Present
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 3rd International Workshop on Cyberspace Safety and Security (CSS 2011) at The 5th International Conference on Network and System Security (NSS 2011). IEEE. 2011.
Details about Guidelines for Usable Cybersecurity: Past and Present | BibTeX data for Guidelines for Usable Cybersecurity: Past and Present | Download (pdf) of Guidelines for Usable Cybersecurity: Past and Present | DOI (10.1109/CSS.2011.6058566)
-
[50]
Information Quality and Trustworthiness: A Topical State−of−the−Art Review
Jason R.C. Nurse‚ Syed Sadiqur Rahman‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The International Conference on Computer Applications and Network Security (ICCANS) 2011. IEEE. 2011.
Details about Information Quality and Trustworthiness: A Topical State−of−the−Art Review | BibTeX data for Information Quality and Trustworthiness: A Topical State−of−the−Art Review | Download (pdf) of Information Quality and Trustworthiness: A Topical State−of−the−Art Review | Link to Information Quality and Trustworthiness: A Topical State−of−the−Art Review
-
[51]
Trustworthy and Effective Communication of Cybersecurity Risks: A Review
Jason R.C. Nurse‚ Sadie Creese‚ Michael Goldsmith and Koen Lamberts
In The 1st Workshop on Socio−Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011). IEEE. 2011.
Details about Trustworthy and Effective Communication of Cybersecurity Risks: A Review | BibTeX data for Trustworthy and Effective Communication of Cybersecurity Risks: A Review | Download (pdf) of Trustworthy and Effective Communication of Cybersecurity Risks: A Review | DOI (10.1109/STAST.2011.6059257)
-
[52]
Refinement−Friendly Bigraphs and Spygraphs
Michael Goldsmith and Sadie Creese
In Software Engineering and Formal Methods (SEFM)‚ 2010 8th IEEE International Conference on. Pages 203–207. IEEE. 2010.
Details about Refinement−Friendly Bigraphs and Spygraphs | BibTeX data for Refinement−Friendly Bigraphs and Spygraphs
-
[53]
EnCoRe: Towards a holistic approach to privacy
Nick Papanikolaou‚ Sadie Creese‚ Michael Goldsmith‚ Marco Casassa Mont and Siani Pearson
In Security and Cryptography (SECRYPT)‚ Proceedings of the 2010 International Conference on. Pages 1–6. IEEE. 2010.
Details about EnCoRe: Towards a holistic approach to privacy | BibTeX data for EnCoRe: Towards a holistic approach to privacy
-
[54]
Inadequacies of Current Risk Controls for the Cloud
Michael Auty‚ Sadie Creese‚ M Goldsmith and P Hopkins
In Cloud Computing Technology and Science (CloudCom)‚ 2010 IEEE Second International Conference on. Pages 659–666. IEEE. 2010.
Details about Inadequacies of Current Risk Controls for the Cloud | BibTeX data for Inadequacies of Current Risk Controls for the Cloud
-
[55]
Applying formal methods to describe the privacy−control requirements in real case−study scenario: emerging ambiguities and proposed solutions
N. Papanikolaou I. Agrafiotis S. Creese M. Goldsmith
In Proceedings of 2010 IFIP/PrimeLife Summer School. 2010.
Details about Applying formal methods to describe the privacy−control requirements in real case−study scenario: emerging ambiguities and proposed solutions | BibTeX data for Applying formal methods to describe the privacy−control requirements in real case−study scenario: emerging ambiguities and proposed solutions
-
[56]
EnCoRe: Towards a Holistic Approach to Privacy
S. Pearson N. Papanikolaou S. Creese M. Goldsmith M. Casassa Mont
In Proceedings of SECRYPT2010. 2010.
Details about EnCoRe: Towards a Holistic Approach to Privacy | BibTeX data for EnCoRe: Towards a Holistic Approach to Privacy
-
[57]
Defining Consent and Revocation Policies
S. Pearson I. Agrafiotis S. Creese M. Goldsmith N. Papanikolaou M Casassa Mont
In Proceedings of 2010 IFIP/PrimeLife Summer School. 2010.
Details about Defining Consent and Revocation Policies | BibTeX data for Defining Consent and Revocation Policies
-
[58]
A Modelling Approach for Interdependency in Digital Systems−of−Systems Security – Extended Abstract
M. Goldsmith A. Adetoye S. Creese
In Proceedings of CRITIS'10. 2010.
Details about A Modelling Approach for Interdependency in Digital Systems−of−Systems Security – Extended Abstract | BibTeX data for A Modelling Approach for Interdependency in Digital Systems−of−Systems Security – Extended Abstract
-
[59]
Refinement−Friendly Bigraphs and Spygraphs
S. Creese M. Goldsmith
In Proceedings of SEFM'10. 2010.
Details about Refinement−Friendly Bigraphs and Spygraphs | BibTeX data for Refinement−Friendly Bigraphs and Spygraphs
-
[60]
Inadequacies of Current Risk Controls for the Cloud
P. Hopkins M. Auty S. Creese M. Goldsmith
In Proceedings of CloudCom 2010. November, 2010.
Details about Inadequacies of Current Risk Controls for the Cloud | BibTeX data for Inadequacies of Current Risk Controls for the Cloud
-
[61]
Ensuring Consent and Revocation: Towards a Taxonomy of Consent
Sadie Creese‚ Michael Goldsmith and Nikolaos Papanikolaou
In WebSci'09: Society Online. 2009.
Details about Ensuring Consent and Revocation: Towards a Taxonomy of Consent | BibTeX data for Ensuring Consent and Revocation: Towards a Taxonomy of Consent
-
[62]
Towards an Integrated Approach to the Management‚ Specification and Enforcement of Privacy Policies
Marco Casassa Mont‚ Siani Pearson‚ Sadie Creese‚ Michael Goldsmith and Nick Papanikolaou
In Proceedings of W3C Workshop on Access Control Application Scenarios. 2009.
Details about Towards an Integrated Approach to the Management‚ Specification and Enforcement of Privacy Policies | BibTeX data for Towards an Integrated Approach to the Management‚ Specification and Enforcement of Privacy Policies
-
[63]
Beyond Mobility: What Next After CSP/π
Michael Goldsmith
In The thirty−second Communicating Process Architectures Conference‚ CPA. Pages 1–6. 2009.
Details about Beyond Mobility: What Next After CSP/π | BibTeX data for Beyond Mobility: What Next After CSP/π
-
[64]
Ensuring Consent and Revocation: Towards a Taxonomy of Consent
N. Papnikolaou S. Creese M. Goldsmith
In Proceedings of WebSci'09: Society On−Line. 2009.
Details about Ensuring Consent and Revocation: Towards a Taxonomy of Consent | BibTeX data for Ensuring Consent and Revocation: Towards a Taxonomy of Consent
-
[65]
A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking
Nick Moffat‚ Michael Goldsmith and Bill Roscoe
In Formal methods and software engineering: 10th International Conference on Formal Engineering Methods‚ ICFEM 2008‚ Kitakyushu−City‚ Japan‚ October 27−31‚ 2008: proceedings. Pages 258–277. Springer−Verlag New York Inc. 2008.
Details about A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking | BibTeX data for A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking
-
[66]
Requirements and Concepts for Information Assurance and Pervasive Adaptation Co−design
Sadie Creese and Michael Goldsmith
In Second IEEE International Conference on Self−Adaptive and Self−Organizing Systems‚ Workshop on Pervasive Adaptation‚ 2008. SASO/PerAda 2008. Pages 73–77. IEEE. 2008.
Details about Requirements and Concepts for Information Assurance and Pervasive Adaptation Co−design | BibTeX data for Requirements and Concepts for Information Assurance and Pervasive Adaptation Co−design
-
[67]
Requirements and Concepts for Information Assurance and Pervasive Adaptation Co−Design
M. Goldsmith S. Creese
In Proceedings of Pervasive Adaptation (PerAda) workshop‚ 2nd Conference on Self−Adapting and Self−Organizing Systems (SASO 2008). 2008.
Details about Requirements and Concepts for Information Assurance and Pervasive Adaptation Co−Design | BibTeX data for Requirements and Concepts for Information Assurance and Pervasive Adaptation Co−Design
-
[68]
Taking quotients in CSP
Michael Goldsmith
In Conference in Topology and Theoretical Computer Science in honour of Peter Collins and Mike Reed. 2006.
Details about Taking quotients in CSP | BibTeX data for Taking quotients in CSP
-
[69]
Bootstrapping multi−party ad−hoc security
Sadie Creese‚ Michael Goldsmith‚ Bill Roscoe and Ming Xiao
In Proceedings of the 2006 ACM symposium on Applied computing. Pages 369–375. ACM. 2006.
Details about Bootstrapping multi−party ad−hoc security | BibTeX data for Bootstrapping multi−party ad−hoc security
-
[70]
Exploiting empirical engagement in authentication protocol design
Sadie Creese‚ Michael Goldsmith‚ Richard Harrison‚ Bill Roscoe‚ Paul Whittaker and Irfan Zakiuddin
In Security in Pervasive Computing. Pages 119–133. Springer Berlin/Heidelberg. 2005.
Details about Exploiting empirical engagement in authentication protocol design | BibTeX data for Exploiting empirical engagement in authentication protocol design
-
[71]
Exploiting Empirical Engagement in Authentication Protocol Design
Sadie Creese‚ Michael Goldsmith‚ Richard Harrison‚ Bill Roscoe‚ Paul Whittaker and Irfan Zakiuddin
In Proceedings of SPPC 2005. May, 2005.
Details about Exploiting Empirical Engagement in Authentication Protocol Design | BibTeX data for Exploiting Empirical Engagement in Authentication Protocol Design
-
[72]
CSP: The Best Concurrent−System Description Language in the World−Probably!
Michael Goldsmith
In Communicating Process Architectures. Pages 227–232. 2004.
Details about CSP: The Best Concurrent−System Description Language in the World−Probably! | BibTeX data for CSP: The Best Concurrent−System Description Language in the World−Probably!
-
[73]
Authentication for pervasive computing
Sadie Creese‚ Michael Goldsmith‚ Bill Roscoe and Irfan Zakiuddin
In Security in pervasive computing. Pages 439–488. Springer Berlin/Heidelberg. 2004.
Details about Authentication for pervasive computing | BibTeX data for Authentication for pervasive computing
-
[74]
Watchdog transformations for property−oriented model−checking
Michael Goldsmith‚ Nick Moffat‚ Bill Roscoe‚ Tim Whitworth and Irfan Zakiuddin
In FME 2003: Formal Methods. Pages 600–616. Springer Berlin/Heidelberg. 2003.
Details about Watchdog transformations for property−oriented model−checking | BibTeX data for Watchdog transformations for property−oriented model−checking
-
[75]
A methodology for model−checking ad−hoc networks
Irfan Zakiuddin‚ Michael Goldsmith‚ Paul Whittaker and Paul Gardiner
In Proceedings of the 10th international conference on Model checking software. Pages 181–196. Springer−Verlag. 2003.
Details about A methodology for model−checking ad−hoc networks | BibTeX data for A methodology for model−checking ad−hoc networks
-
[76]
Authentication in pervasive computing
A. W. Roscoe‚ S.J. Creese‚ M.H. Goldsmith and I.Zakiuddin
In Proceedings of the First International Conference on Security in Pervasive Computing. LNCS. March, 2003.
Details about Authentication in pervasive computing | BibTeX data for Authentication in pervasive computing | Link to Authentication in pervasive computing
-
[77]
Implementing Data−Independence: Symbolic Operational Semantics for CSP_M
M Goldsmith and P Whittaker
In Proceedings of second workshop on Automated Verification of Critical Systems (AVoCS'02). Pages 59–64. University of Birmingham; 1999. 2002.
Details about Implementing Data−Independence: Symbolic Operational Semantics for CSP_M | BibTeX data for Implementing Data−Independence: Symbolic Operational Semantics for CSP_M
-
[78]
Parallelization of FDR
Michael Goldsmith and Jeremy Martin
In Workshop on Parallel and Distributed Model Checking‚ afiliated to CONCUR. 2002.
Details about Parallelization of FDR | BibTeX data for Parallelization of FDR
-
[79]
Property−based compression strategies
Irfan Zakiuddin‚ Nick Moffat‚ Michael Goldsmith and Tim Whitworth
In Proceedings of Second Workshop on Automated Verification of Critical Systems (AVoCS 2002). 2002.
Details about Property−based compression strategies | BibTeX data for Property−based compression strategies
-
[80]
Critical systems validation and verification with CSP and FDR
Michael Goldsmith and Irfan Zakiuddin
In Applied Formal Methods—FM−Trends 98. Pages 243–250. Springer Berlin/Heidelberg. 1999.
Details about Critical systems validation and verification with CSP and FDR | BibTeX data for Critical systems validation and verification with CSP and FDR
-
[81]
What is intransitive noninterference?
AW Roscoe and MH Goldsmith
In Computer Security Foundations Workshop‚ 1999. Proceedings of the 12th IEEE. Pages 228–238. IEEE. 1999.
Details about What is intransitive noninterference? | BibTeX data for What is intransitive noninterference?
-
[82]
Hierarchical compression for model−checking CSP or how to check 10 20 dining philosophers for deadlock
A Roscoe‚ P Gardiner‚ Michael Goldsmith‚ J Hulance‚ D Jackson and J Scattergood
In Tools and Algorithms for the Construction and Analysis of Systems. Pages 133–152. Springer Berlin/Heidelberg. 1995.
Details about Hierarchical compression for model−checking CSP or how to check 10 20 dining philosophers for deadlock | BibTeX data for Hierarchical compression for model−checking CSP or how to check 10 20 dining philosophers for deadlock
-
[83]
Classifying unbounded nondeterminism in CSP
Geoff Barrett and Michael Goldsmith
In Topology and category theory in computer science. Pages 57–74. Oxford University Press‚ Inc.. 1991.
Details about Classifying unbounded nondeterminism in CSP | BibTeX data for Classifying unbounded nondeterminism in CSP
-
[84]
Formal Methods in the development of the H1 transputer
AW Roscoe‚ MH Goldsmith‚ ADB Cox and JB Scattergood
In Proceedings of the world transputer user group (WOTUG) conference on Transputing'91. Pages 629–642. IOS Press. 1991.
Details about Formal Methods in the development of the H1 transputer | BibTeX data for Formal Methods in the development of the H1 transputer
-
[85]
Transformation of occam programs
MH Goldsmith and AW Roscoe
In Design and Application of Parallel Digital Processors‚ 1988.‚ International Specialist Seminar on the. Pages 180–188. IET. 1988.
Details about Transformation of occam programs | BibTeX data for Transformation of occam programs
-
[86]
The meaning and implementation of PRI ALT in occam
Geoff Barrett‚ Michael Goldsmith‚ Geraint Jones and Andrew Kay
In occam and the Transputer‚ research and applications (OUG−9). Vol. 88. 1988.
Details about The meaning and implementation of PRI ALT in occam | BibTeX data for The meaning and implementation of PRI ALT in occam
-
[87]
An algebraic transformation system for occam programs
Michael Goldsmith‚ Anthony Cox and Geoff Barrett
In STACS 87. Pages 481–481. Springer Berlin/Heidelberg. 1987.
Details about An algebraic transformation system for occam programs | BibTeX data for An algebraic transformation system for occam programs
-
[88]
occam transformation at Oxford
MH Goldsmith
In Proc. 7th occam User Group Technical Meeting. 1987.
Details about occam transformation at Oxford | BibTeX data for occam transformation at Oxford
Technical reports
-
[1]
The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance
Ioannis Agrafiotis‚ Sadie Creese‚ Michael Goldsmith‚ Jason R.C. Nurse and David Upton
No. RR−17−01. DCS. Oxford‚ UK. 2017.
Details about The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance | BibTeX data for The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance | Download (pdf) of The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance
Miscellaneous
-
[1]
FDR2 user manual
Paul Gardiner‚ Michael Goldsmith‚ Jason Hulance‚ David Jackson‚ AW Roscoe‚ Bryan Scattergood and Philip Armstrong
2000.
Details about FDR2 user manual | BibTeX data for FDR2 user manual
-
[2]
The Oxford occam transformation system
Michael Goldsmith
1988.
Details about The Oxford occam transformation system | BibTeX data for The Oxford occam transformation system