@inproceedings{fahup13, title = "Policies in Context: Factors Influencing the Elicitation and Categorisation of Context-Sensitive Security Policies", author = "Shamal Faily and John Lyle and Ivan Flechais and Andrea Atzeni and Cesare Cameroni and Hans Myrhaug and Ayse Goker and Robert Kleinfeld", year = "2013", booktitle = "Proceedings of the Workshop on Home Usable Privacy and Security", } @inproceedings{falyew, title = "Guidelines for Integrating Personas into Software Engineering Tools", author = "Shamal Faily and John Lyle", year = "2013", booktitle = "Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems", pages = "69--74", series = "EICS '13", } @inbook{atlf13, title = "Developing secure, unified multi-device and multi-domain platforms: A case study from the webinos project", author = "Andrea Atzeni and John Lyle and Shamal Faily", year = "2013", booktitle = "Architectures and Protocols for Secure Information Technology", note = "To Appear", publisher = "IGI Global", } @inproceedings{sac13-extending-web, title = "Extending the web to support personal network services", author = "John Lyle and Shamal Faily and Claes Nilsson and Anders Isberg", year = "2013", booktitle = "(To appear) In the Proceedings of the 28th ACM Symposium On Applied Computing (SAC '13)", } @inproceedings{failymdsec2012, title = "Model-driven architectural risk analysis using architectural and contextualised attack patterns", author = "Shamal Faily and John Lyle and Cornelius Namiluko and Andrea Atzeni and Cesare Cameroni", year = "2012", booktitle = "Proceedings of the Workshop on Model-Driven Security", pages = "3:1--3:6", publisher = "ACM", } @inproceedings{falyhcse12, title = "Requirements Sensemaking using Concept Maps", author = "Shamal Faily and John Lyle and Andre Paul and Andrea Atzeni and Dieter Blomme and Heiko Desruelle and Krishna Bangalore", year = "2012", booktitle = "HCSE'2012: Proceedings of the 4th International Conference on Human-Centered Software Engineering", pages = "217--232", publisher = "Springer", } @inproceedings{ubimi, title = "On the Challenges of Building a Web-based Ubiquitous Application Platform", author = "Heiko Desruelle and John Lyle and Simon Isenberg and Frank Gielen", year = "2012", booktitle = "Proceedings of the 1st International Workshop on Ubiquitous Mobile Instrumentation", note = "To appear", } @inproceedings{falpdiss2012, title = "Secure System? Challenge Accepted: Finding and Resolving Security Failures Using Security Premortems", author = "Shamal Faily and John Lyle and Simon Parkin", year = "2012", booktitle = "Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems", pages = "5:1--5:4", } @inproceedings{lypaepki12, title = "Personal PKI for the smart device era", author = "John Lyle and Andrew Paverd and Justin King-Lacroix and Andrea Atzeni and Habib Virji and Ivan Flechais and Shamal Faily", year = "2012", booktitle = "9th European PKI Workshop: Research and Applications", } @inproceedings{tapp12-provenance-security, title = "Provenance as a Security Control", author = "Andrew Martin and John Lyle and Cornelius Namiluko", year = "2012", booktitle = "Proceedings of TaPP'12: the 4th USENIX Workshop on the Theory and Practice of Provenance", publisher = "USENIX", url = "https://www.usenix.org/conference/tapp12/provenance-security-control", } @incollection{falp12, title = "Tool-support Premortems with Attack and Security Patterns", author = "Shamal Faily and John Lyle and Simon Parkin", year = "2012", booktitle = "First International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns", pages = "10--11", } @inproceedings{lyfadais12, title = "On the design and development of webinos: a distributed mobile application middleware", author = "John Lyle and Shamal Faily and Ivan Flechais and Andre Paul and Ayse Goker and Hans Myrhaug and Heiko Desruelle and Andrew Martin", year = "2012", booktitle = "Proceedings of the 12th IFIP WG 6.1 international conference on Distributed applications and interoperable systems", pages = "140--147", series = "DAIS' 12", } @inproceedings{lymo12, title = "Cross-platform access control for mobile web applications", author = "John Lyle and Salvatore Monteleone and Shamal Faily and Davide Patti and Fabio Ricciato", year = "2012", booktitle = "Policies for Distributed Systems and Networks (POLICY), 2012 IEEE International Symposium on", pages = "37--44", } @inproceedings{lyfa12, title = "The webinos project", author = "Christian Fuhrhop and John Lyle and Shamal Faily", year = "2012", booktitle = "Proceedings of the 21st international conference companion on World Wide Web", location = "Lyon, France", pages = "259--262", publisher = "ACM", series = "WWW '12 Companion", } @inproceedings{HoHuh2011, title = "Achieving attestation with less effort: an indirect and configurable approach to integrity reporting", author = "Huh, Jun Ho and Kim, Hyoungshick and Lyle, John and Martin, Andrew", year = "2011", booktitle = "Proceedings of the sixth ACM workshop on Scalable trusted computing", isbn = "978-1-4503-1001-7", pages = "31--36", publisher = "ACM", series = "STC '11", url = "http://doi.acm.org/10.1145/2046582.2046589", doi = "10.1145/2046582.2046589", } @inproceedings{fswec11-webinos, title = "“Do we know each other or is it just our Devices?”: A Federated Context Model for Describing Social Activity Across Devices", author = "George Gionis and Heiko Desruelle and Dieter Blomme and John Lyle and Shamal Faily and Louay Bassbouss", year = "2011", booktitle = "W3C/PrimeLife Federated Social Web Europe Conference 2011", month = "June", url = "http://d-cent.org/fsw2011/wp-content/uploads/fsw2011-A-Federated-Context-Model-for-Describing-Social-Activity-Across-Devices.pdf", } @inproceedings{AbbadiLyle2011, title = "Challenges for Provenance in Cloud Computing", author = "Imad M. Abbadi and John Lyle", year = "2011", booktitle = "TaPP 2011: Proceedings of the Third USENIX Workshop on the Theory and Practice of Provenance", publisher = "USENIX", url = "http://www.usenix.org/event/tapp11/tech/final_files/Abbadi.pdf", } @phdthesis{Lyle2011, title = "Trustworthy Services Through Attestation", author = "John Lyle", year = "2011", school = "Department of Computer Science, University of Oxford", url = "http://www.cs.ox.ac.uk/people/John.Lyle/thesis-final-25-06-11.pdf", } @inproceedings{atfasecse2011, title = "Here's Johnny: a Methodology for Developing Attacker Personas", author = "Andrea Atzeni and Shamal Faily and John Lyle and Cesare Cameroni and Ivan Flechais", year = "2011", booktitle = "Proceedings of the 6th International Conference on Availability, Reliability and Security", pages = "722--727", } @article{Huh2010, title = "Managing application whitelists in trusted distributed systems", author = "Jun Ho Huh and John Lyle and Cornelius Namiluko and Andrew Martin", year = "2010", issn = "0167-739X", journal = "Future Generation Computer Systems", keywords = ""Configuration management", "Trusted computing","Trusted grid", "Virtual organisations", "Whitelisting"", url = ""http://www.sciencedirect.com/science/article/B6V06-50XCXVD-2/2/6efb0eda0beeb1edcc156190e2f843e8", volume = "In Press, Accepted Manuscript", doi = "DOI: 10.1016/j.future.2010.08.014", } @inproceedings{lyle-martin-trust2010, title = "Engineering Attestable Services (short paper)", author = "John Lyle and Andrew Martin", year = "2010", booktitle = "Proceedings of the 3rd International Conference on Trust and Trustworthy Computing", editor = "Acquisti, Alessandro; Smith, Sean W.; Sadeghi, Ahmad-Reza", location = "Berlin", month = "June", pages = "257--264", publisher = "Springer", series = "Lecture Notes in Computer Science", url = "http://www.springerlink.com/content/4NG0010448040134", doi = "10.1007/978-3-642-13869-0", } @inproceedings{lyle-tapp10, title = "Trusted Computing and Provenance: Better Together", author = "John Lyle and Andrew Martin", year = "2010", booktitle = "Proceedings of the 2nd Workshop on the Theory and Practice of Provenance", publisher = "Usenix", url = "http://www.usenix.org/events/tapp10/tech/full_papers/lyle.pdf", } @techreport{RR-09-14, title = "Proceedings of the Oxford University Computing Laboratory Student Conference 2009", author = "Programme Co-Chairs: Lu Feng and John Lyle and Nicolas Wu", year = "2009", institution = "OUCL", month = "November", number = "RR-09-14", pages = "33", } @inproceedings{LyleSecureCom09, title = "On the Feasibility of Remote Attestation for Web Services", author = "John Lyle and Andrew Martin", year = "2009", booktitle = "SecureCom09: Proceedings of the International Symposium on Secure Computing", isbn = "978-0-7695-3823-5", pages = "283-288", publisher = "IEEE", url = "http://doi.ieeecomputersociety.org/10.1109/CSE.2009.213", } @inproceedings{DBLP:conf/trust/HuhL09, title = "Trustworthy Log Reconciliation for Distributed Virtual Organisations", author = "Jun Ho Huh and John Lyle", year = "2009", address = "Berlin, Heidelberg", booktitle = "Trust '09: Proceedings of the 2nd International Conference on Trusted Computing", editor = "Liqun Chen and Chris J. Mitchell and Andrew Martin", isbn = "978-3-642-00586-2", location = "Oxford, UK", month = "April", pages = "169-182", publisher = "Springer-Verlag", series = "Lecture Notes in Computer Science", doi = "10.1007/978-3-642-00587-9_11", } @inproceedings{DBLP:conf/trust/Lyle09, title = "Trustable Remote Verification of Web Services", author = "John Lyle", year = "2009", booktitle = "TRUST", editor = "Liqun Chen and Chris J. Mitchell and Andrew Martin", isbn = "978-3-642-00586-2", location = "Oxford, UK", month = "April", pages = "153-168", publisher = "Springer", series = "Lecture Notes in Computer Science", url = "http://dx.doi.org/10.1007/978-3-642-00587-9_10", }