@inproceedings{fahup13, title = "Policies in Context: Factors Influencing the Elicitation and Categorisation of Context-Sensitive Security Policies", author = "Shamal Faily and John Lyle and Ivan Flechais and Andrea Atzeni and Cesare Cameroni and Hans Myrhaug and Ayse Goker and Robert Kleinfeld", year = "2013", booktitle = "Proceedings of the Workshop on Home Usable Privacy and Security", } @inproceedings{fapat13, title = "Security Patterns Considered Harmful?", author = "Shamal Faily", year = "2013", booktitle = "Proceedings of The Second International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns", note = "To Appear", } @inproceedings{falyew, title = "Guidelines for Integrating Personas into Software Engineering Tools", author = "Shamal Faily and John Lyle", year = "2013", booktitle = "Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems", pages = "69--74", series = "EICS '13", } @inbook{atlf13, title = "Developing secure, unified multi-device and multi-domain platforms: A case study from the webinos project", author = "Andrea Atzeni and John Lyle and Shamal Faily", year = "2013", booktitle = "Architectures and Protocols for Secure Information Technology", note = "To Appear", publisher = "IGI Global", } @inproceedings{faco13, title = "Designing Interactive Secure Systems: CHI 2013 Special Interest Group", author = "Shamal Faily and Lizzie Coles-Kemp and Paul Dunphy and Mike Just and Yoko Akama and Alexander De Luca", year = "2013", booktitle = "CHI '13 Extended Abstracts on Human Factors in Computing Systems", note = "To Appear", publisher = "ACM", series = "CHI EA '13", } @inproceedings{sac13-extending-web, title = "Extending the web to support personal network services", author = "John Lyle and Shamal Faily and Claes Nilsson and Anders Isberg", year = "2013", booktitle = "(To appear) In the Proceedings of the 28th ACM Symposium On Applied Computing (SAC '13)", } @inproceedings{failymdsec2012, title = "Model-driven architectural risk analysis using architectural and contextualised attack patterns", author = "Shamal Faily and John Lyle and Cornelius Namiluko and Andrea Atzeni and Cesare Cameroni", year = "2012", booktitle = "Proceedings of the Workshop on Model-Driven Security", pages = "3:1--3:6", publisher = "ACM", } @inproceedings{falyhcse12, title = "Requirements Sensemaking using Concept Maps", author = "Shamal Faily and John Lyle and Andre Paul and Andrea Atzeni and Dieter Blomme and Heiko Desruelle and Krishna Bangalore", year = "2012", booktitle = "HCSE'2012: Proceedings of the 4th International Conference on Human-Centered Software Engineering", pages = "217--232", publisher = "Springer", } @inproceedings{fafldiss2012, title = "Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS", author = "Shamal Faily and Ivan Flechais", year = "2012", booktitle = "Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems", pages = "3:1--3:4", } @inproceedings{falpdiss2012, title = "Secure System? Challenge Accepted: Finding and Resolving Security Failures Using Security Premortems", author = "Shamal Faily and John Lyle and Simon Parkin", year = "2012", booktitle = "Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems", pages = "5:1--5:4", } @inproceedings{lypaepki12, title = "Personal PKI for the smart device era", author = "John Lyle and Andrew Paverd and Justin King-Lacroix and Andrea Atzeni and Habib Virji and Ivan Flechais and Shamal Faily", year = "2012", booktitle = "9th European PKI Workshop: Research and Applications", } @incollection{falp12, title = "Tool-support Premortems with Attack and Security Patterns", author = "Shamal Faily and John Lyle and Simon Parkin", year = "2012", booktitle = "First International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns", pages = "10--11", } @inproceedings{lyfadais12, title = "On the design and development of webinos: a distributed mobile application middleware", author = "John Lyle and Shamal Faily and Ivan Flechais and Andre Paul and Ayse Goker and Hans Myrhaug and Heiko Desruelle and Andrew Martin", year = "2012", booktitle = "Proceedings of the 12th IFIP WG 6.1 international conference on Distributed applications and interoperable systems", pages = "140--147", series = "DAIS' 12", } @inproceedings{lymo12, title = "Cross-platform access control for mobile web applications", author = "John Lyle and Salvatore Monteleone and Shamal Faily and Davide Patti and Fabio Ricciato", year = "2012", booktitle = "Policies for Distributed Systems and Networks (POLICY), 2012 IEEE International Symposium on", pages = "37--44", } @inproceedings{failydefam2012, title = "Analysing Chindogu: Applying Defamiliarisation to Security Design", author = "Shamal Faily", year = "2012", booktitle = "CHI 2012 Workshop on Defamiliarisation in Innovation and Usability", } @inproceedings{lyfa12, title = "The webinos project", author = "Christian Fuhrhop and John Lyle and Shamal Faily", year = "2012", booktitle = "Proceedings of the 21st international conference companion on World Wide Web", location = "Lyon, France", pages = "259--262", publisher = "ACM", series = "WWW '12 Companion", } @inproceedings{failyistar11, title = "Bridging User-Centered Design and Requirements Engineering with GRL and Persona Cases", author = "Shamal Faily", year = "2011", booktitle = "Proceedings of the 5th International i* Workshop", pages = "114--119", } @inproceedings{fswec11-webinos, title = "“Do we know each other or is it just our Devices?”: A Federated Context Model for Describing Social Activity Across Devices", author = "George Gionis and Heiko Desruelle and Dieter Blomme and John Lyle and Shamal Faily and Louay Bassbouss", year = "2011", booktitle = "W3C/PrimeLife Federated Social Web Europe Conference 2011", month = "June", url = "http://d-cent.org/fsw2011/wp-content/uploads/fsw2011-A-Federated-Context-Model-for-Describing-Social-Activity-Across-Devices.pdf", } @inproceedings{faflre11, title = "Eliciting Usable Security Requirements with Misusability Cases", author = "Shamal Faily and Ivan Flechais", year = "2011", booktitle = "Proceedings of the 19th IEEE International Requirements Engineering Conference", note = "Pre-print available at http://www.cs.ox.ac.uk/files/4125/PID1921187.pdf", pages = "339--340", publisher = "IEEE Computer Society", doi = "10.1109/RE.2011.6051665", } @inproceedings{atfasecse2011, title = "Here's Johnny: a Methodology for Developing Attacker Personas", author = "Andrea Atzeni and Shamal Faily and John Lyle and Cesare Cameroni and Ivan Flechais", year = "2011", booktitle = "Proceedings of the 6th International Conference on Availability, Reliability and Security", pages = "722--727", }