Skip to main content

Shamal Faily : Publications

Click here to download all publications in a single bibtex file

@inbook{atlf13,
  title = "Developing secure, unified multi-device and multi-domain platforms: A case study from the webinos project",
  author = "Andrea Atzeni and John Lyle and Shamal Faily",
  year = "2013",
  booktitle = "Architectures and Protocols for Secure Information Technology",
  note = "To Appear",
  publisher = "IGI Global",
}
@inproceedings{fahup13,
  title = "Policies in Context: Factors Influencing the Elicitation and Categorisation of Context-Sensitive Security Policies",
  author = "Shamal Faily and John Lyle and Ivan Flechais and Andrea Atzeni and Cesare Cameroni and Hans Myrhaug and Ayse Goker and Robert Kleinfeld",
  year = "2013",
  booktitle = "Proceedings of the Workshop on Home Usable Privacy and Security",
}
@inproceedings{fapat13,
  title = "Security Patterns Considered Harmful?",
  author = "Shamal Faily",
  year = "2013",
  booktitle = "Proceedings of The Second International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns",
  note = "To Appear",
}
@inproceedings{falyew,
  title = "Guidelines for Integrating Personas into Software Engineering Tools",
  author = "Shamal Faily and John Lyle",
  year = "2013",
  booktitle = "Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems",
  pages = "69--74",
  series = "EICS '13",
}
@inproceedings{fapotrust,
  title = "Formal Evaluation of Persona Trustworthiness with EUSTACE (Extended Abstract)",
  author = "Shamal Faily and David Power and Philip Armstrong and Ivan Flechais",
  year = "2013",
  booktitle = "Trust and Trustworthy Computing, 6th International Conference, TRUST 2013",
  note = "To Appear",
}
@inproceedings{faco13,
  title = "Designing Interactive Secure Systems: CHI 2013 Special Interest Group",
  author = "Shamal Faily and Lizzie Coles-Kemp and Paul Dunphy and Mike Just and Yoko Akama and Alexander De Luca",
  year = "2013",
  booktitle = "CHI '13 Extended Abstracts on Human Factors in Computing Systems",
  note = "To Appear",
  publisher = "ACM",
  series = "CHI EA '13",
}
@inproceedings{sac13-extending-web,
  title = "Extending the web to support personal network services",
  author = "John Lyle and Shamal Faily and Claes Nilsson and Anders Isberg",
  year = "2013",
  booktitle = "(To appear) In the Proceedings of the 28th ACM Symposium On Applied Computing (SAC '13)",
}
@inproceedings{failymdsec2012,
  title = "Model-driven architectural risk analysis using architectural and contextualised attack patterns",
  author = "Shamal Faily and John Lyle and Cornelius Namiluko and Andrea Atzeni and Cesare Cameroni",
  year = "2012",
  booktitle = "Proceedings of the Workshop on Model-Driven Security",
  pages = "3:1--3:6",
  publisher = "ACM",
}
@inproceedings{falyhcse12,
  title = "Requirements Sensemaking using Concept Maps",
  author = "Shamal Faily and John Lyle and Andre Paul and Andrea Atzeni and Dieter Blomme and Heiko Desruelle and Krishna Bangalore",
  year = "2012",
  booktitle = "HCSE'2012: Proceedings of the 4th International Conference on Human-Centered Software Engineering",
  pages = "217--232",
  publisher = "Springer",
}
@inproceedings{fafldiss2012,
  title = "Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS",
  author = "Shamal Faily and Ivan Flechais",
  year = "2012",
  booktitle = "Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems",
  pages = "3:1--3:4",
}
@inproceedings{falpdiss2012,
  title = "Secure System? Challenge Accepted: Finding and Resolving Security Failures Using Security Premortems",
  author = "Shamal Faily and John Lyle and Simon Parkin",
  year = "2012",
  booktitle = "Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems",
  pages = "5:1--5:4",
}
@inproceedings{lypaepki12,
  title = "Personal PKI for the smart device era",
  author = "John Lyle and Andrew Paverd and Justin King-Lacroix and Andrea Atzeni and Habib Virji and Ivan Flechais and Shamal Faily",
  year = "2012",
  booktitle = "9th European PKI Workshop: Research and Applications",
}
@inproceedings{lyfadais12,
  title = "On the design and development of webinos: a distributed mobile application middleware",
  author = "John Lyle and Shamal Faily and Ivan Flechais and Andre Paul and Ayse Goker and Hans Myrhaug and Heiko Desruelle and Andrew Martin",
  year = "2012",
  booktitle = "Proceedings of the 12th IFIP WG 6.1 international conference on Distributed applications and interoperable systems",
  pages = "140--147",
  series = "DAIS' 12",
}
@inproceedings{lymo12,
  title = "Cross-platform access control for mobile web applications",
  author = "John Lyle and Salvatore Monteleone and Shamal Faily and Davide Patti and Fabio Ricciato",
  year = "2012",
  booktitle = "Policies for Distributed Systems and Networks (POLICY), 2012 IEEE International Symposium on",
  pages = "37--44",
}
@inproceedings{lyfa12,
  title = "The webinos project",
  author = "Christian Fuhrhop and John Lyle and Shamal Faily",
  year = "2012",
  booktitle = "Proceedings of the 21st international conference companion on World Wide Web",
  location = "Lyon, France",
  pages = "259--262",
  publisher = "ACM",
  series = "WWW '12 Companion",
}
@inproceedings{failydefam2012,
  title = "Analysing Chindogu: Applying Defamiliarisation to Security Design",
  author = "Shamal Faily",
  year = "2012",
  booktitle = "CHI 2012 Workshop on Defamiliarisation in Innovation and Usability",
}
@incollection{falp12,
  title = "Tool-support Premortems with Attack and Security Patterns",
  author = "Shamal Faily and John Lyle and Simon Parkin",
  year = "2012",
  booktitle = "First International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns",
  pages = "10--11",
}
@inproceedings{fswec11-webinos,
  title = "“Do we know each other or is it just our Devices?”: A Federated Context Model for Describing Social Activity Across Devices",
  author = "George Gionis and Heiko Desruelle and Dieter Blomme and John Lyle and Shamal Faily and Louay Bassbouss",
  year = "2011",
  booktitle = "W3C/PrimeLife Federated Social Web Europe Conference 2011",
  month = "June",
  url = "http://d-cent.org/fsw2011/wp-content/uploads/fsw2011-A-Federated-Context-Model-for-Describing-Social-Activity-Across-Devices.pdf",
}
@article{fafl12,
  title = "Eliciting Policy Requirements for Critical National Infrastructure using the IRIS Framework",
  author = "Shamal Faily and Ivan Flechais",
  year = "2011",
  journal = "International Journal of Secure Software Engineering",
  number = "4",
  organization = "IGI Global",
  pages = "1--18",
  volume = "2",
}
@inproceedings{failyistar11,
  title = "Bridging User-Centered Design and Requirements Engineering with GRL and Persona Cases",
  author = "Shamal Faily",
  year = "2011",
  booktitle = "Proceedings of the 5th International i* Workshop",
  pages = "114--119",
}
@inproceedings{faflre11,
  title = "Eliciting Usable Security Requirements with Misusability Cases",
  author = "Shamal Faily and Ivan Flechais",
  year = "2011",
  booktitle = "Proceedings of the 19th IEEE International Requirements Engineering Conference",
  note = "Pre-print available at http://www.cs.ox.ac.uk/files/4125/PID1921187.pdf",
  pages = "339--340",
  publisher = "IEEE Computer Society",
  doi = "10.1109/RE.2011.6051665",
}
@inproceedings{atfasecse2011,
  title = "Here's Johnny: a Methodology for Developing Attacker Personas",
  author = "Andrea Atzeni and Shamal Faily and John Lyle and Cesare Cameroni and Ivan Flechais",
  year = "2011",
  booktitle = "Proceedings of the 6th International Conference on Availability, Reliability and Security",
  pages = "722--727",
}
@inproceedings{faflsecse2011,
  title = "User-Centered Information Security Policy Development in a Post-Stuxnet World",
  author = "Shamal Faily and Ivan Flechais",
  year = "2011",
  booktitle = "Proceedings of the 6th International Conference on Availability, Reliability and Security",
  pages = "716--721",
}
@inproceedings{faflchiw11,
  title = "Security goes to ground: on the applicability of Security Entrepreneurship to Grassroot Activism",
  author = "Shamal Faily",
  year = "2011",
  booktitle = "CHI Workshop on HCI, Politics and the City: Engaging with Urban Grassroots Movements for Reflection and Action",
}
@inproceedings{failysausage2011,
  title = "Two Requirements for Usable and Secure Software Engineering",
  author = "Shamal Faily",
  year = "2011",
  booktitle = "1st Software and Usable Security Aligned for Good Engineering (SAUSAGE) Workshop",
  location = "National Institute of Standards and Technology (NIST), Gaithersburg MD, USA",
}
@inproceedings{fafl1101,
  title = "Persona Cases: A Technique for grounding Personas",
  author = "Shamal Faily and Ivan Flechais",
  year = "2011",
  address = "Vancouver, BC, Canada",
  booktitle = "CHI '11: Proceedings of the 29th International conference on Human factors in computing systems",
  location = "Vancouver, BC, Canada",
  pages = "2267-2270",
  publisher = "ACM",
}
@phdthesis{failythesis,
  title = "A framework for usable and secure system design",
  author = "Shamal Faily",
  year = "2011",
  school = "University of Oxford",
}
@inproceedings{fafl103,
  title = "A Meta-Model for Usable Secure Requirements Engineering",
  author = "Shamal Faily and Ivan Flechais",
  year = "2010",
  booktitle = "Software Engineering for Secure Systems, 2010. SESS '10.  ICSE Workshop on",
  month = "May",
  pages = "29--35",
  doi = "10.1145/1809100.1809105",
}
@inproceedings{fafl105,
  title = "Improving Secure Systems Design with Security Culture",
  author = "Shamal Faily and Ivan Flechais",
  year = "2010",
  booktitle = "Poster at: Human Factors in Information Security",
  location = "London",
  month = "Feb",
}
@inproceedings{fafl101,
  title = "Analysing and Visualising Security and Usability in IRIS",
  author = "Shamal Faily and Ivan Flechais",
  year = "2010",
  booktitle = "Availability, Reliability and Security, 2010. ARES 10. Fifth International Conference on",
  month = "Feb",
  doi = "10.1109/ARES.2010.28",
}
@article{failyimcs10,
  title = "Designing and Aligning e-Science Security Culture with Design",
  author = "Shamal Faily and Ivan Flechais",
  year = "2010",
  journal = "Information Management & Computer Security",
  number = "5",
  volume = "18",
}
@article{fafl106,
  title = "Towards tool-support for Usable Secure Requirements Engineering with CAIRIS",
  author = "Shamal Faily and Ivan Flechais",
  year = "2010",
  journal = "International Journal of Secure Software Engineering",
  number = "3",
  organization = "IGI Global",
  pages = "56--70",
  volume = "1",
  doi = "10.4018/ijsse.2010070104",
}
@inproceedings{faflacsac2010,
  title = "Security through Usability: a user-centered approach for balanced security policy requirements",
  author = "Shamal Faily and Ivan Flechais",
  year = "2010",
  booktitle = "Poster at: Annual Computer Security Applications Conference",
  location = "Austin TX, USA",
}
@inproceedings{flfa101,
  title = "Security and Usability: Searching for the philosopher's stone",
  author = "Ivan Flechais and Shamal Faily",
  year = "2010",
  booktitle = "Workshop on the development of EuroSOUPS (European Symposium on Usable Privacy and Security)",
  location = "Northumbria University, Newcastle, UK",
}
@inproceedings{faflhcse,
  title = "The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design",
  author = "Shamal Faily and Ivan Flechais",
  year = "2010",
  booktitle = "HCSE'2010: Proceedings of the 3rd Conference on Human-Centered Software Engineering",
  pages = "111--118",
  publisher = "Springer",
}
@inproceedings{faflnspw10,
  title = "To boldly go where invention isn't secure: applying Security Entrepreneurship to secure systems design",
  author = "Shamal Faily and Ivan Flechais",
  year = "2010",
  address = "New York, NY, USA",
  booktitle = "NSPW '10: Proceedings of the 2010 New Security Paradigms Workshop",
  location = "Concord, Massachusetts, USA",
  pages = "73--84",
  publisher = "ACM",
}
@inproceedings{fafl106,
  title = "Barry is not the weakest link: Eliciting Secure System Requirements with Personas",
  author = "Shamal Faily and Ivan Flechais",
  year = "2010",
  booktitle = "Proceedings of the 24th British HCI Group Annual Conference on People and Computers: Play is a Serious Business",
  pages = "113--120",
  publisher = "British Computer Society",
  series = "BCS-HCI '10",
}
@inproceedings{fafl10haisa,
  title = "A Model of Security Culture for e-Science",
  author = "Shamal Faily and Ivan Flechais",
  year = "2010",
  booktitle = "Proceedings of the South African Information Security Multi-Conference (SAISMC 2010)",
  editor = "Nathan Clarke and Steven Furnell and Rossouw von Solms",
  location = "Port Elizabeth, South Africa",
  pages = "154--164",
  publisher = "University of Plymouth",
}
@inproceedings{faily091,
  title = "Context-Sensitive Requirements and Risk Management with IRIS",
  author = "Shamal Faily and Ivan Flechais",
  year = "2009",
  booktitle = "International Requirements Engineering, 2009. RE'09. 17th IEEE",
  month = "Aug",
  organization = "IEEE",
  doi = "10.1109/RE.2009.54",
}
@inproceedings{failydocsym09,
  title = "Context-Sensitive Requirements and Risk Analysis",
  author = "Shamal Faily",
  year = "2009",
  booktitle = "Requirements Engineering Doctoral Symposium",
}
@unpublished{failyrom09,
  title = "Context Matters: designing security for contexts of use",
  author = "Shamal Faily",
  year = "2009",
  booktitle = "Romulus 2009",
}
@inproceedings{fail08,
  title = "Towards Requirements Engineering Practice for Professional End User Developers: A Case Study",
  author = "Shamal Faily",
  year = "2008",
  booktitle = "Requirements Engineering Education and Training, 2008.  REET '08",
  location = "Barcelona, Spain",
  month = "September",
  pages = "38-44",
  publisher = "IEEE",
  doi = "10.1109/REET.2008.8",
}
@techreport{RR-08-10,
  title = "PROCEEDINGS OF THE OXFORD UNIVERSITY COMPUTING LABORATORY STUDENT CONFERENCE 2008",
  author = "Programme Co-Chairs: Shamal Faily and Stanislav \v{Z}ivn\'y Conference Co-Chairs: Christo Fogelberg and Andras Salamon and Max Schafer",
  year = "2008",
  institution = "OUCL",
  month = "October",
  number = "RR-08-10",
  pages = "33",
}
@inproceedings{failyahm08,
  title = "Making the invisible visible: a theory of security culture for secure and usable grids",
  author = "Shamal Faily and Ivan Flechais",
  year = "2008",
  booktitle = "UK e-Science All Hands Conference 2008, Edinburgh, UK (Oral Presentation)",
}
@inproceedings{failyesaw07,
  title = "Living with Flight Dynamics : Proposals and Possible Pitfalls for Harmonising Flight Dynamics Systems with EGOS",
  author = "Shamal Faily",
  year = "2007",
  booktitle = "European Ground System Architecture Workshop (ESAW) 2007, ESOC, Darmstadt, Germany (Oral Presentation)",
}