Skip to main content

John Lyle : Publications

Click here to download all publications in a single bibtex file

@inbook{atlf13,
  title = "Developing secure, unified multi-device and multi-domain platforms: A case study from the webinos project",
  author = "Andrea Atzeni and John Lyle and Shamal Faily",
  year = "2013",
  booktitle = "Architectures and Protocols for Secure Information Technology",
  note = "To Appear",
  publisher = "IGI Global",
}
@inproceedings{fahup13,
  title = "Policies in Context: Factors Influencing the Elicitation and Categorisation of Context-Sensitive Security Policies",
  author = "Shamal Faily and John Lyle and Ivan Flechais and Andrea Atzeni and Cesare Cameroni and Hans Myrhaug and Ayse Goker and Robert Kleinfeld",
  year = "2013",
  booktitle = "Proceedings of the Workshop on Home Usable Privacy and Security",
}
@inproceedings{falyew,
  title = "Guidelines for Integrating Personas into Software Engineering Tools",
  author = "Shamal Faily and John Lyle",
  year = "2013",
  booktitle = "Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems",
  pages = "69--74",
  series = "EICS '13",
}
@inproceedings{sac13-extending-web,
  title = "Extending the web to support personal network services",
  author = "John Lyle and Shamal Faily and Claes Nilsson and Anders Isberg",
  year = "2013",
  booktitle = "(To appear) In the Proceedings of the 28th ACM Symposium On Applied Computing (SAC '13)",
}
@inproceedings{failymdsec2012,
  title = "Model-driven architectural risk analysis using architectural and contextualised attack patterns",
  author = "Shamal Faily and John Lyle and Cornelius Namiluko and Andrea Atzeni and Cesare Cameroni",
  year = "2012",
  booktitle = "Proceedings of the Workshop on Model-Driven Security",
  pages = "3:1--3:6",
  publisher = "ACM",
}
@inproceedings{falyhcse12,
  title = "Requirements Sensemaking using Concept Maps",
  author = "Shamal Faily and John Lyle and Andre Paul and Andrea Atzeni and Dieter Blomme and Heiko Desruelle and Krishna Bangalore",
  year = "2012",
  booktitle = "HCSE'2012: Proceedings of the 4th International Conference on Human-Centered Software Engineering",
  pages = "217--232",
  publisher = "Springer",
}
@inproceedings{ubimi,
  title = "On the Challenges of Building a Web-based Ubiquitous Application Platform",
  author = "Heiko Desruelle and John Lyle and Simon Isenberg and Frank Gielen",
  year = "2012",
  booktitle = "Proceedings of the 1st International Workshop on Ubiquitous Mobile Instrumentation",
  note = "To appear",
}
@inproceedings{falpdiss2012,
  title = "Secure System? Challenge Accepted: Finding and Resolving Security Failures Using Security Premortems",
  author = "Shamal Faily and John Lyle and Simon Parkin",
  year = "2012",
  booktitle = "Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems",
  pages = "5:1--5:4",
}
@inproceedings{lypaepki12,
  title = "Personal PKI for the smart device era",
  author = "John Lyle and Andrew Paverd and Justin King-Lacroix and Andrea Atzeni and Habib Virji and Ivan Flechais and Shamal Faily",
  year = "2012",
  booktitle = "9th European PKI Workshop: Research and Applications",
}
@inproceedings{tapp12-provenance-security,
  title = "Provenance as a Security Control",
  author = "Andrew Martin and John Lyle and Cornelius Namiluko",
  year = "2012",
  booktitle = "Proceedings of TaPP'12: the 4th USENIX Workshop on the Theory and Practice of Provenance",
  publisher = "USENIX",
  url = "https://www.usenix.org/conference/tapp12/provenance-security-control",
}
@inproceedings{lyfadais12,
  title = "On the design and development of webinos: a distributed mobile application middleware",
  author = "John Lyle and Shamal Faily and Ivan Flechais and Andre Paul and Ayse Goker and Hans Myrhaug and Heiko Desruelle and Andrew Martin",
  year = "2012",
  booktitle = "Proceedings of the 12th IFIP WG 6.1 international conference on Distributed applications and interoperable systems",
  pages = "140--147",
  series = "DAIS' 12",
}
@inproceedings{lymo12,
  title = "Cross-platform access control for mobile web applications",
  author = "John Lyle and Salvatore Monteleone and Shamal Faily and Davide Patti and Fabio Ricciato",
  year = "2012",
  booktitle = "Policies for Distributed Systems and Networks (POLICY), 2012 IEEE International Symposium on",
  pages = "37--44",
}
@inproceedings{lyfa12,
  title = "The webinos project",
  author = "Christian Fuhrhop and John Lyle and Shamal Faily",
  year = "2012",
  booktitle = "Proceedings of the 21st international conference companion on World Wide Web",
  location = "Lyon, France",
  pages = "259--262",
  publisher = "ACM",
  series = "WWW '12 Companion",
}
@incollection{falp12,
  title = "Tool-support Premortems with Attack and Security Patterns",
  author = "Shamal Faily and John Lyle and Simon Parkin",
  year = "2012",
  booktitle = "First International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns",
  pages = "10--11",
}
@inproceedings{fswec11-webinos,
  title = "“Do we know each other or is it just our Devices?”: A Federated Context Model for Describing Social Activity Across Devices",
  author = "George Gionis and Heiko Desruelle and Dieter Blomme and John Lyle and Shamal Faily and Louay Bassbouss",
  year = "2011",
  booktitle = "W3C/PrimeLife Federated Social Web Europe Conference 2011",
  month = "June",
  url = "http://d-cent.org/fsw2011/wp-content/uploads/fsw2011-A-Federated-Context-Model-for-Describing-Social-Activity-Across-Devices.pdf",
}
@inproceedings{HoHuh2011,
  title = "Achieving attestation with less effort: an indirect and configurable approach to integrity reporting",
  author = "Huh, Jun Ho and Kim, Hyoungshick and Lyle, John and Martin, Andrew",
  year = "2011",
  booktitle = "Proceedings of the sixth ACM workshop on Scalable trusted computing",
  isbn = "978-1-4503-1001-7",
  pages = "31--36",
  publisher = "ACM",
  series = "STC '11",
  url = "http://doi.acm.org/10.1145/2046582.2046589",
  doi = "10.1145/2046582.2046589",
}
@inproceedings{AbbadiLyle2011,
  title = "Challenges for Provenance in Cloud Computing",
  author = "Imad M. Abbadi and John Lyle",
  year = "2011",
  booktitle = "TaPP 2011: Proceedings of the Third USENIX Workshop on the Theory and Practice of Provenance",
  publisher = "USENIX",
  url = "http://www.usenix.org/event/tapp11/tech/final_files/Abbadi.pdf",
}
@inproceedings{atfasecse2011,
  title = "Here's Johnny: a Methodology for Developing Attacker Personas",
  author = "Andrea Atzeni and Shamal Faily and John Lyle and Cesare Cameroni and Ivan Flechais",
  year = "2011",
  booktitle = "Proceedings of the 6th International Conference on Availability, Reliability and Security",
  pages = "722--727",
}
@phdthesis{Lyle2011,
  title = "Trustworthy Services Through Attestation",
  author = "John Lyle",
  year = "2011",
  school = "Department of Computer Science, University of Oxford",
  url = "http://www.cs.ox.ac.uk/people/John.Lyle/thesis-final-25-06-11.pdf",
}
@inproceedings{lyle-martin-trust2010,
  title = "Engineering Attestable Services (short paper)",
  author = "John Lyle and Andrew Martin",
  year = "2010",
  booktitle = "Proceedings of the 3rd International Conference on Trust and Trustworthy Computing",
  editor = "Acquisti, Alessandro; Smith, Sean W.; Sadeghi, Ahmad-Reza",
  location = "Berlin",
  month = "June",
  pages = "257--264",
  publisher = "Springer",
  series = "Lecture Notes in Computer Science",
  url = "http://www.springerlink.com/content/4NG0010448040134",
  doi = "10.1007/978-3-642-13869-0",
}
@article{Huh2010,
  title = "Managing application whitelists in trusted distributed systems",
  author = "Jun Ho Huh and John Lyle and Cornelius Namiluko and Andrew Martin",
  year = "2010",
  issn = "0167-739X",
  journal = "Future Generation Computer Systems",
  keywords = ""Configuration management", "Trusted computing","Trusted grid", "Virtual organisations", "Whitelisting"",
  url = ""http://www.sciencedirect.com/science/article/B6V06-50XCXVD-2/2/6efb0eda0beeb1edcc156190e2f843e8",
  volume = "In Press, Accepted Manuscript",
  doi = "DOI: 10.1016/j.future.2010.08.014",
}
@inproceedings{lyle-tapp10,
  title = "Trusted Computing and Provenance: Better Together",
  author = "John Lyle and Andrew Martin",
  year = "2010",
  booktitle = "Proceedings of the 2nd Workshop on the Theory and Practice of Provenance",
  publisher = "Usenix",
  url = "http://www.usenix.org/events/tapp10/tech/full_papers/lyle.pdf",
}
@inproceedings{DBLP:conf/trust/HuhL09,
  title = "Trustworthy Log Reconciliation for Distributed Virtual Organisations",
  author = "Jun Ho Huh and John Lyle",
  year = "2009",
  address = "Berlin, Heidelberg",
  booktitle = "Trust '09: Proceedings of the 2nd International Conference on Trusted Computing",
  editor = "Liqun Chen and Chris J. Mitchell and Andrew Martin",
  isbn = "978-3-642-00586-2",
  location = "Oxford, UK",
  month = "April",
  pages = "169-182",
  publisher = "Springer-Verlag",
  series = "Lecture Notes in Computer Science",
  doi = "10.1007/978-3-642-00587-9_11",
}
@inproceedings{DBLP:conf/trust/Lyle09,
  title = "Trustable Remote Verification of Web Services",
  author = "John Lyle",
  year = "2009",
  booktitle = "TRUST",
  editor = "Liqun Chen and Chris J. Mitchell and Andrew Martin",
  isbn = "978-3-642-00586-2",
  location = "Oxford, UK",
  month = "April",
  pages = "153-168",
  publisher = "Springer",
  series = "Lecture Notes in Computer Science",
  url = "http://dx.doi.org/10.1007/978-3-642-00587-9_10",
}
@techreport{RR-09-14,
  title = "Proceedings of the Oxford University Computing Laboratory Student Conference 2009",
  author = "Programme Co-Chairs: Lu Feng and John Lyle and Nicolas Wu",
  year = "2009",
  institution = "OUCL",
  month = "November",
  number = "RR-09-14",
  pages = "33",
}
@inproceedings{LyleSecureCom09,
  title = "On the Feasibility of Remote Attestation for Web Services",
  author = "John Lyle and Andrew Martin",
  year = "2009",
  booktitle = "SecureCom09: Proceedings of the International Symposium on Secure Computing",
  isbn = "978-0-7695-3823-5",
  pages = "283-288",
  publisher = "IEEE",
  url = "http://doi.ieeecomputersociety.org/10.1109/CSE.2009.213",
}