Skip to main content

Michael Goldsmith : Publications

Click here to download all publications in a single bibtex file

@techreport{RR-17-01,
  title = "The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance",
  author = "Ioannis Agrafiotis and Sadie Creese and Michael Goldsmith and Jason R.C. Nurse and David Upton",
  year = "2017",
  address = "Oxford, UK",
  institution = "DCS",
  number = "RR-17-01",
  pages = "87",
}
@conference{2016-securware-acgn,
  title = "Reflecting on the Use of Sonification for Network Monitoring",
  author = "Axon, Louise and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R.C.",
  year = "2016",
  booktitle = "10th International Conference on Emerging Security Information, Systems and Technologies",
  isbn = "978-1-61208-493-0",
  issn = "2162-2116",
  keywords = "Sonification; Network Security; Anomaly Detection; Network Monitoring",
  pages = "254--261",
}
@article{cfs2015agrafiotisetal,
  title = "Identifying attack patterns for insider threat detection",
  author = "Ioannis Agrafiotis and Jason R. C. Nurse and Oliver Buckley and Phil Legg and Sadie Creese and Michael Goldsmith",
  year = "2015",
  issn = "1361-3723",
  journal = "Computer Fraud & Security",
  month = "July",
  number = "7",
  pages = "9--17",
  url = "http://www.journals.elsevier.com/computer-fraud-and-security",
  doi = "10.1016/S1361-3723(15)30066-X",
}
@article{negc2015email,
  title = "Investigating the leakage of sensitive personal and organisational information in email headers",
  author = "Jason R. C. Nurse and Arnau Erola and Michael Goldsmith and Sadie Creese",
  year = "2015",
  journal = "Journal of Internet Services and Information Security",
  number = "1",
  url = "http://isyou.info/jisis/vol5/no1/jisis-2015-vol5-no1-04.pdf",
  volume = "5",
}
@conference{2015_eisic,
  title = "Applying semantic technologies to fight online banking fraud",
  author = "Rodrigo Carvalho and Michael Goldsmith and Sadie Creese",
  year = "2015",
  booktitle = "European Intelligence and Security Informatics Conference (EISIC)",
}
@inproceedings{nurse2015,
  title = "Information trustworthiness as a solution to the misinformation problems in social media",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen and Price, Darren and Jones, Glyn",
  year = "2015",
  booktitle = "International Conference on Cyber Security for Sustainable Society",
  issn = "2052-8604",
  pages = "28-35",
}
@inproceedings{dnhgc2015predictinggps,
  title = "Predicting Graphical Passwords",
  author = "Matthieu Devlin and Jason R. C. Nurse and Duncan Hodges and Michael Goldsmith and Sadie Creese",
  year = "2015",
  booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 17th International Conference on Human-Computer Interaction (HCI)",
  editor = "Theo Tryfonas and Ioannis Askoxylakis",
  pages = "23--35",
  publisher = "Springer",
  series = "9190",
  doi = "10.1007/978-3-319-20376-8_3",
}
@inproceedings{ephillips2015snasecurity,
  title = "Applying Social Network Analysis to Security",
  author = "Elizabeth Phillips and Jason R. C. Nurse and Michael Goldsmith and Sadie Creese",
  year = "2015",
  booktitle = "International Conference on Cyber Security for Sustainable Society",
  pages = "11--27",
}
@conference{rcarvalho2015ontology,
  title = "Online banking malware ontology",
  author = "Rodrigo Carvalho and Michael Goldsmith and Jason R. C. Nurse",
  year = "2015",
  booktitle = "International Crime and Intelligence Analysis Conference (ICIA)",
}
@article{nagcl14,
  title = "Two sides of the coin: measuring and communicating the trustworthiness of online information",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen",
  year = "2014",
  journal = "Journal of Trust Management",
  keywords = "Information trustworthiness; Information quality; Trust metrics; Trust visuals; Decision-making; Social-media content; Risk communication",
  number = "5",
  publisher = "Springer Open",
  url = "http://www.journaloftrustmanagement.com/content/1/1/5",
  volume = "1",
  doi = "10.1186/2196-064X-1-5",
}
@inproceedings{bnlgs2014,
  title = "Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat",
  author = "Buckley, Oliver and Nurse, Jason R. C. and Legg, Philip A. and Goldsmith, Michael and Creese, Sadie",
  year = "2014",
  booktitle = "Workshop on Socio-Technical Aspects in Security and Trust (STAST) associated with 27th IEEE Computer Security Foundations Symposium (CSF)",
  publisher = "IEEE",
  doi = "10.1109/STAST.2014.10",
}
@conference{nagclpj2014,
  title = "Managing the influence of social media using information trust",
  author = "Jason R.C. Nurse and Ioannis Agrafiotis and Michael Goldsmith and Sadie Creese and Koen Lamberts and Darren Price and Glyn Jones",
  year = "2014",
  booktitle = "Social Influence in the Information Age Conference",
}
@inproceedings{nblgcww2014,
  title = "Understanding Insider Threat: A Framework for Characterising Attacks",
  author = "Jason R.C. Nurse and Oliver Buckley and Philip A. Legg and Michael Goldsmith and Sadie Creese and Gordon R.T. Wright and Monica Whitty",
  year = "2014",
  booktitle = "Workshop on Research for Insider Threat (WRIT) held as part of the IEEE Computer Society  Security and Privacy Workshops (SPW14), in conjunction with the IEEE Symposium on Security and Privacy (SP).",
  publisher = "IEEE",
  url = "http://www.sei.cmu.edu/community/writ2014/",
  doi = "10.1109/SPW.2014.38",
}
@inproceedings{nlbawwugc14,
  title = "A critical reflection on the threat from human insiders - its nature, industry perceptions, and detection approaches",
  author = "Nurse, Jason R.C. and Legg, Philip A. and Buckley, Oliver and Agrafiotis, Ioannis and Wright, Gordon and Whitty, Monica and Upton, David and Goldsmith, Michael and Creese, Sadie",
  year = "2014",
  booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 16th International Conference on Human-Computer Interaction (HCI)",
  publisher = "Springer",
  doi = "10.1007/978-3-319-07620-1_24",
}
@article{legg2013mist,
  title = "Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection",
  author = "Philip A. Legg, Nick Moffat, Jason R.C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese",
  year = "2013",
  issn = "2093-5382",
  journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications",
  number = "4",
  pages = "20-37",
  url = "http://isyou.info/jowua/papers/jowua-v4n4-2.pdf",
  volume = "4",
}
@inproceedings{skipmeaning,
  title = "The Meaning and Implementation of SKIP in CSP",
  author = "Thomas Gibson-Robinson and Michael Goldsmith",
  year = "2013",
  booktitle = "Communicating Process Architectures 2013",
}
@inproceedings{7026,
  title = "Building Confidence in Information-Trustworthiness Metrics for Decision Support",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2013",
  booktitle = "The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13)",
  keywords = "Trust metrics; trustworthiness visualisation; decision-making; risk communication; information quality",
  publisher = "IEEE",
  doi = "10.1109/TrustCom.2013.6",
}
@inproceedings{7027,
  title = "Communicating Trustworthiness using Radar Graphs: A Detailed Look",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2013",
  booktitle = "The 11th International Conference on Privacy, Security and Trust (PST)",
  keywords = "Trustworthiness factors; trustworthiness visualisation; risk communication; communicating trustworthiness and quality; user studies",
  publisher = "IEEE",
  doi = "10.1109/PST.2013.6596085",
}
@inproceedings{ncgrhas2013,
  title = "Supporting Human Decision-Making Online using Information Trustworthiness Metrics",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Rahman, Syed S.",
  year = "2013",
  booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 15th International Conference on Human-Computer Interaction (HCII)",
  keywords = "information trustworthiness; information quality; metrics; human decision-making; open-source content; social-media; online risks",
  publisher = "Springer",
  doi = "10.1007/978-3-642-39345-7_33",
}
@inproceedings{Creese:2013fkHST,
  title = "Tools for Understanding Identity",
  author = "Creese, Sadie and Gibson-Robinson, Thomas and Goldsmith, Michael and Hodges, Duncan and Kim, Dee and Love, Oriana and Nurse, Jason R. C. and Pike, Bill and Schultz, Jean",
  year = "2013",
  booktitle = "IEEE Conference on Technologies for Homeland Security (HST '13)",
  doi = "10.1109/THS.2013.6699064",
}
@inproceedings{creese2013cybervis,
  title = "{CyberVis}: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise",
  author = "Sadie Creese and Michael Goldsmith and Nick Moffat and Jassim Happa and Ioannis Agrafiotis",
  year = "2013",
  booktitle = "13th annual IEEE Conference on Technologies for Homeland Security (HST'13)",
  note = "To appear",
  url = "http://ieee-hst.org/",
}
@inproceedings{creese2013tools,
  title = "Tools for Understanding Identity",
  author = "Creese, Sadie and Gibson-Robinson, Thomas and Goldsmith, Michael and Hodges, Duncan and Kim, Dee and Love, Oriana and Nurse, Jason R.C. and Pike, Bill and Scholtz, Jean",
  year = "2013",
  booktitle = "13th annual IEEE Conference on Technologies for Homeland Security (HST'13)",
  note = "To appear",
  url = "http://ieee-hst.org/",
}
@inproceedings{duncan2013cloud,
  title = "Cloud Computing: Insider Attacks on Virtual Machines During Migration",
  author = "Duncan, Adrian and Goldsmith, Michael and Creese, Sadie and Quinton, James",
  year = "2013",
  booktitle = "The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13)",
  keywords = "Trust metrics; trustworthiness visualisation; decision-making; risk communication; information quality",
  publisher = "IEEE",
  doi = "10.1109/TrustCom.2013.62",
}
@inproceedings{nurse2013building,
  title = "Building Confidence in Information-Trustworthiness Metrics for Decision Support",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2013",
  booktitle = "The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13)",
  keywords = "Trust metrics; trustworthiness visualisation; decision-making; risk communication; information quality",
  publisher = "IEEE",
  doi = "10.1109/TrustCom.2013.6",
}
@inproceedings{adetoye2013reasoning,
  title = "Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment",
  author = "Adetoye, Adedayo O and Creese, Sadie and Goldsmith, Michael H",
  year = "2013",
  booktitle = "Critical Information Infrastructures Security",
  pages = "155--167",
  publisher = "Springer Berlin Heidelberg",
}
@inproceedings{nurse2013supporting,
  title = "Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics",
  author = "Nurse, Jason RC and Creese, Sadie and Goldsmith, Michael and Rahman, Syed Sadiqur",
  year = "2013",
  booktitle = "Human Aspects of Information Security, Privacy, and Trust",
  pages = "316--325",
  publisher = "Springer Berlin Heidelberg",
}
@inproceedings{nurse2013communicating,
  title = "Communicating trustworthiness using radar graphs: A detailed look",
  author = "Nurse, Jason RC and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2013",
  booktitle = "Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on",
  organization = "IEEE",
  pages = "333--339",
}
@inproceedings{nicholls2013netvis,
  title = "NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data",
  author = "Nicholls, James and Peters, Dominik and Slawinski, Albert and Spoor, Thomas and Vicol, Sergiu and Happa, Jassim and Goldsmith, Michael and Creese, Sadie",
  year = "2013",
  booktitle = "Theory and Practice of Computer Graphics",
  organization = "The Eurographics Association",
  pages = "9--16",
}
@incollection{creese2013inadequacies,
  title = "Inadequacies of Current Risk Controls for the Cloud",
  author = "Creese, Sadie and Goldsmith, Michael and Hopkins, Paul",
  year = "2013",
  booktitle = "Privacy and Security for Cloud Computing",
  pages = "235--255",
  publisher = "Springer London",
}
@inproceedings{SATURN:CRITIS12,
  title = "Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment",
  author = "Adedayo O. Adetoye and Sadie Creese and Michael H. Goldsmith",
  year = "2012",
  booktitle = "7th International Conference On Critical Information Infrastructures Security (CRITIS 2012)",
  month = "sep",
  note = "To appear",
  publisher = "LNCS",
}
@inproceedings{Adetoye12a,
  title = "From Qualitative to Quantitative Information Erasure",
  author = "Adedayo O. Adetoye and Michael H. Goldsmith",
  year = "2012",
  booktitle = "International Workshop on Quantitative Aspects in Security Assurance (QASA 2012, colocated with ESORICS)",
  month = "sep",
  note = "To appear",
}
@inproceedings{6298821,
  title = "A Model for Identity in the Cyber and Natural Universes",
  author = "Hodges, Duncan and Creese, Sadie and Goldsmith, Michael",
  year = "2012",
  booktitle = "Intelligence and Security Informatics Conference (EISIC), 2012 European",
  month = "aug.",
  organization = "IEEE",
  pages = "115--122",
  doi = "10.1109/EISIC.2012.43",
}
@inproceedings{ncglcjiscram2012,
  title = "An Initial Usability Evaluation of the Secure Situation Awareness System",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Craddock, Rachel and Jones, Glyn",
  year = "2012",
  booktitle = "The 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012)",
  publisher = "IAS of ISCRAM",
  url = "http://www.iscramlive.org/ISCRAM2012/proceedings/240.pdf",
}
@inproceedings{cgnptrustcom2012,
  title = "A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks",
  author = "Creese, Sadie and Goldsmith, Michael and Nurse, Jason R.C. and Phillips, Elizabeth",
  year = "2012",
  booktitle = "11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)",
  pages = "1124-1131",
  publisher = "IEEE",
  doi = "10.1109/TrustCom.2012.22",
}
@inproceedings{goldsmith2012inside,
  title = "Inside FDR (abstract of invited talk)",
  author = "Goldsmith, Michael",
  year = "2012",
  booktitle = "Pre-Proceedings of the 12th International Workshop on Automated Verification of Critical Systems (AVoCS 2012)",
  pages = "11",
}
@inproceedings{rahman2012accepting,
  title = "Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources",
  author = "Rahman, Syed and Creese, Sadie and Goldsmith, Michael",
  year = "2012",
  booktitle = "Security and Trust Management",
  pages = "223--238",
  publisher = "Springer Berlin/Heidelberg LNCS",
}
@inproceedings{armstrong2012recent,
  title = "Recent developments in FDR",
  author = "Armstrong, Philip and Goldsmith, Michael and Lowe, Gavin and Ouaknine, Jo{\"e}l and Palikareva, Hristina and Roscoe, AW and Worrell, James",
  year = "2012",
  booktitle = "Computer Aided Verification",
  pages = "699--704",
  publisher = "Springer Berlin/Heidelberg",
  doi = "10.1007/978-3-642-31424-7_52",
}
@inproceedings{duncan2012insider,
  title = "Insider Attacks in Cloud Computing",
  author = "Duncan, Adrian J and Creese, Sadie and Goldsmith, Michael",
  year = "2012",
  booktitle = "Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on",
  organization = "IEEE",
  pages = "857--862",
}
@inproceedings{nurse2012using,
  title = "Using Information Trustworthiness Advice in Decision Making",
  author = "Nurse, Jason RC and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2012",
  booktitle = "Socio-Technical Aspects in Security and Trust (STAST), 2012 Workshop on",
  organization = "IEEE",
  pages = "35--42",
}
@inproceedings{chen2012secure,
  title = "Secure Communication in Disasters",
  author = "Chen, Bangdao and Flechais, Ivan and Creese, Sadie and Goldsmith, Michael and Roscoe, AW",
  year = "2012",
  booktitle = "Proceedings of HCI 2012 - People \& Computers XXVI: The 26th BCS Conference on Human Computer Interaction",
}
@inproceedings{creese2012data,
  title = "A data-reachability model for elucidating privacy and security risks related to the use of online social networks",
  author = "Creese, Sadie and Goldsmith, Michael and Nurse, Jason RC and Phillips, Elizabeth",
  year = "2012",
  booktitle = "Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on",
  organization = "IEEE",
  pages = "1124--1131",
}
@inproceedings{nurse2012initial,
  title = "An Initial Usability Evaluation of the Secure Situation Awareness System",
  author = "Nurse, Jason RC and Creese, Sadie and Goldsmith, Michael and Craddock, Rachel and Jones, Glyn",
  year = "2012",
  booktitle = "9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012)",
}
@inproceedings{hngc2012,
  title = "Identity attribution across CyberSpace and the Natural Space",
  author = "Hodges, D. and Nurse, J.R.C. and Goldsmith, M. and Creese, S.",
  year = "2012",
  booktitle = "The International Crime and Intelligence Analysis Conference",
  url = "http://www.ucl.ac.uk/jdi/events/int-CIA-conf",
}
@inproceedings{ncglstast2012,
  title = "Using Information Trustworthiness Advice in Decision-Making",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2012",
  booktitle = "The 2nd Workshop on Socio-Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF)",
  publisher = "IEEE",
  doi = "10.1109/STAST.2012.10",
}
@incollection{agrafiotis2012formalising,
  title = "Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation",
  author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael",
  year = "2012",
  booktitle = "Privacy and Identity Management for Life",
  pages = "232--244",
  publisher = "Springer Boston",
}
@incollection{agrafiotis2012developing,
  title = "Developing a Strategy for Automated Privacy Testing Suites",
  author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael",
  year = "2012",
  booktitle = "Privacy and Identity Management for Life",
  pages = "32--44",
  publisher = "Springer Boston",
}
@inproceedings{SATURN:CSS11,
  title = "A Logical High-Level Framework for Critical Infrastructure Resilience and Risk Assessment",
  author = "Sadie Creese and Michael H. Goldsmith and Adedayo O. Adetoye",
  year = "2011",
  address = "Milan, Italy",
  booktitle = "The 3rd International Workshop on Cyberspace Safety and Security (CSS 2011)",
  month = "September",
  publisher = "To appear",
}
@inproceedings{5557,
  title = "Formalising Requirements for a Biobank Scenario using a Logic for Consent and Revocation",
  author = "I. Agrafiotis, S. Creese, M. Goldsmith",
  year = "2011",
  booktitle = "Proceedings of the IFIP Summer School 2011",
  month = "September",
}
@inproceedings{5560,
  title = "Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources",
  author = "Syed Sadiqur Rahman and Michael Goldsmith and Sadie Creese",
  year = "2011",
  booktitle = "Proceedings of STM'11 7th International Workshop on Security and Trust Management",
  month = "June",
}
@article{papanikolaou2011refinement,
  title = "Refinement Checking for Privacy Policies",
  author = "N. Papanikolaou, M. Goldsmith, S. Creese",
  year = "2011",
  journal = "Science of Computer Programming",
  doi = "10.1016/j.scico.2011.07.009",
}
@inproceedings{adetoye2011analysis,
  title = "Analysis of Dependencies in Critical Infrastructures",
  author = "Adetoye, Adedayo O. and Creese, Sadie and Goldsmith, Michael H",
  year = "2011",
  booktitle = "6th International Conference on Critical Information Infrastructure Security (CRITIS'11)",
}
@inproceedings{nurse2011guidelines,
  title = "Guidelines for usable cybersecurity: past and present",
  author = "Nurse, Jason RC and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2011",
  booktitle = "Cyberspace Safety and Security (CSS), 2011 Third International Workshop on",
  organization = "IEEE",
  pages = "21--26",
}
@inproceedings{creese2011logical,
  title = "A logical high-level framework for Critical Infrastructure resilience and risk assessment",
  author = "Creese, Sadie and Goldsmith, Michael H and Adetoye, Adedayo O",
  year = "2011",
  booktitle = "Cyberspace Safety and Security (CSS), 2011 Third International Workshop on",
  organization = "IEEE",
  pages = "7--14",
}
@inproceedings{adetoye2011modelling,
  title = "A Modelling Approach for Interdependency in Digital Systems-of-Systems Security",
  author = "Adetoye, Adedayo and Creese, Sadie and Goldsmith, Michael and Hopkins, Paul",
  year = "2011",
  booktitle = "Critical Information Infrastructure Security",
  organization = "Springer Berlin/Heidelberg",
  pages = "153--156",
}
@inproceedings{nurse2011information,
  title = "Information Quality and Trustworthiness: A Topical State-of-the-Art Review",
  author = "Nurse, Jason RC and Rahman, Syed S and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2011",
  booktitle = "International Conference on Computer Applications and Network Security",
  organization = "IEEE",
}
@inproceedings{nurse2011trustworthy,
  title = "Trustworthy and effective communication of cybersecurity risks: a review",
  author = "Nurse, Jason RC and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2011",
  booktitle = "1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) at 5th International Conference on Network and System Security (NSS)",
}
@inproceedings{5556,
  title = "Developing a Strategy for Automated Privacy Testing Suites",
  author = "I. Agrafiotis, S. Creese, M. Goldsmith",
  year = "2011",
  booktitle = "Proceedings of the IFIP Summer School",
  month = "September 2011",
}
@inproceedings{5465,
  title = "Guidelines for Usable Cybersecurity: Past and Present",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2011",
  booktitle = "The 3rd International Workshop on Cyberspace Safety and Security (CSS 2011) at The 5th International Conference on Network and System Security (NSS 2011)",
  publisher = "IEEE",
  doi = "10.1109/CSS.2011.6058566",
}
@inproceedings{5464,
  title = "Information Quality and Trustworthiness: A Topical State-of-the-Art Review",
  author = "Nurse, Jason R.C. and Rahman, Syed Sadiqur and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2011",
  booktitle = "The International Conference on Computer Applications and Network Security (ICCANS) 2011",
  publisher = "IEEE",
  url = "http://www.tease-project.info/publications/iccans2011_nrcgl_authors_final",
}
@inproceedings{ncglstast2011,
  title = "Trustworthy and Effective Communication of Cybersecurity Risks: A Review",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2011",
  booktitle = "The 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011)",
  publisher = "IEEE",
  doi = "10.1109/STAST.2011.6059257",
}
@incollection{mont2011encore,
  title = "EnCoRe: Towards A Conceptual Model For Privacy Policies",
  author = "Mont, Marco Casassa and Pearson, Siani and Creese, Sadie and Goldsmith, Michael and Papanikolaou, Nick",
  year = "2011",
  booktitle = "Privacy and Identity Management for Life",
  publisher = "Springer IFIP AICT",
  volume = "352",
}
@incollection{agrafiotis2011applying,
  title = "Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements",
  author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Papanikolaou, Nick",
  year = "2011",
  booktitle = "Privacy and Identity Management for Life",
  pages = "271--282",
  publisher = "Springer IFIP AICT",
  volume = "352",
}
@incollection{casassa2011towards,
  title = "Towards A Conceptual Model For Privacy Policies",
  author = "Casassa Mont and Marco and Pearson, Siani and Creese, Sadie and Goldsmith, Michael and Papanikolaou, Nick",
  year = "2011",
  booktitle = "Privacy and Identity Management for Life",
  publisher = "Springer IFIP AICT",
  volume = "352",
}
@incollection{mont2011conceptual,
  title = "A Conceptual Model for Privacy Policies with Consent and Revocation Requirements",
  author = "Mont, Marco Casassa and Pearson, Siani and Creese, Sadie and Goldsmith, Michael and Papanikolaou, Nick",
  year = "2011",
  booktitle = "Privacy and Identity Management for Life: 6th IFIP WG 9. 2, 9. 6/11. 7, 11. 4, 11. 6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers",
  pages = "258--271",
  publisher = "Springer IFIP AICT",
  volume = "352",
}
@inproceedings{5562,
  title = "Inadequacies of Current Risk Controls for the Cloud",
  author = "M. Auty, S. Creese, M. Goldsmith, P. Hopkins",
  year = "2010",
  booktitle = "Proceedings of CloudCom 2010",
  month = "November",
}
@inproceedings{goldsmith2010refinement,
  title = "Refinement-Friendly Bigraphs and Spygraphs",
  author = "Goldsmith, Michael and Creese, Sadie",
  year = "2010",
  booktitle = "Software Engineering and Formal Methods (SEFM), 2010 8th IEEE International Conference on",
  organization = "IEEE",
  pages = "203--207",
}
@inproceedings{papanikolaou2010encore,
  title = "EnCoRe: Towards a holistic approach to privacy",
  author = "Papanikolaou, Nick and Creese, Sadie and Goldsmith, Michael and Mont, Marco Casassa and Pearson, Siani",
  year = "2010",
  booktitle = "Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on",
  organization = "IEEE",
  pages = "1--6",
}
@inproceedings{auty2010inadequacies,
  title = "Inadequacies of Current Risk Controls for the Cloud",
  author = "Auty, Michael and Creese, Sadie and Goldsmith, M and Hopkins, P",
  year = "2010",
  booktitle = "Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on",
  organization = "IEEE",
  pages = "659--666",
}
@inproceedings{5567,
  title = "Applying formal methods to describe the privacy-control requirements in real case-study scenario: emerging ambiguities and proposed solutions",
  author = "I. Agrafiotis, S. Creese, M. Goldsmith, N. Papanikolaou",
  year = "2010",
  booktitle = "Proceedings of 2010 IFIP/PrimeLife Summer School",
}
@inproceedings{5568,
  title = "EnCoRe: Towards a Holistic Approach to Privacy",
  author = "N. Papanikolaou, S. Creese, M. Goldsmith, M. Casassa Mont, S. Pearson",
  year = "2010",
  booktitle = "Proceedings of SECRYPT2010",
}
@inproceedings{5565,
  title = "Defining Consent and Revocation Policies",
  author = "I. Agrafiotis, S. Creese, M. Goldsmith, N. Papanikolaou, M Casassa Mont, S. Pearson",
  year = "2010",
  booktitle = "Proceedings of 2010 IFIP/PrimeLife Summer School",
}
@inproceedings{5563,
  title = "A Modelling Approach for Interdependency in Digital Systems-of-Systems Security – Extended Abstract",
  author = "A. Adetoye, S. Creese, M. Goldsmith",
  year = "2010",
  booktitle = "Proceedings of CRITIS'10",
}
@inproceedings{5564,
  title = "Refinement-Friendly Bigraphs and Spygraphs",
  author = "M. Goldsmith, S. Creese",
  year = "2010",
  booktitle = "Proceedings of SEFM'10",
}
@incollection{agrafiotis2010reaching,
  title = "Reaching for informed revocation: shutting off the tap on personal data",
  author = "Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Papanikolaou, Nick",
  year = "2010",
  booktitle = "Privacy and Identity Management for Life",
  pages = "246--258",
  publisher = "Springer IFIP AICT",
  volume = "320",
}
@inbook{5576,
  title = "Reaching for Informed Revocation: Shutting Off the Tap on Personal Data",
  author = "I. Agrafiotis, S. Creese, M. Goldsmith, N. Papanikolaou",
  year = "2009",
  booktitle = "Privacy and Identity Management for Life, Proceedings of 5th PrimeLife/IFIP International Summer School",
  publisher = "Springer IFIP AICT 320",
}
@inproceedings{creese2009ensuring,
  title = "Ensuring Consent and Revocation: Towards a Taxonomy of Consent",
  author = "Creese, Sadie and Goldsmith, Michael and Papanikolaou, Nikolaos",
  year = "2009",
  booktitle = "WebSci'09: Society Online",
}
@inproceedings{mont2009towards,
  title = "Towards an Integrated Approach to the Management, Specification and Enforcement of Privacy Policies",
  author = "Mont, Marco Casassa and Pearson, Siani and Creese, Sadie and Goldsmith, Michael and Papanikolaou, Nick",
  year = "2009",
  booktitle = "Proceedings of W3C Workshop on Access Control Application Scenarios",
}
@inproceedings{goldsmith2009beyond,
  title = "Beyond Mobility: What Next After CSP/$\pi$",
  author = "Goldsmith, Michael",
  year = "2009",
  booktitle = "The thirty-second Communicating Process Architectures Conference, CPA",
  pages = "1--6",
}
@inproceedings{5577,
  title = "Ensuring Consent and Revocation: Towards a Taxonomy of Consent",
  author = "S. Creese, M. Goldsmith, N. Papnikolaou",
  year = "2009",
  booktitle = "Proceedings of WebSci'09: Society On-Line",
}
@article{moffat2008assumption,
  title = "Assumption--Commitment Support for CSP Model Checking",
  author = "Moffat, Nick and Goldsmith, Michael",
  year = "2008",
  journal = "Journal of Automated Reasoning",
  number = "3",
  pages = "365--398",
  publisher = "Springer",
  volume = "41",
  doi = "10.1007/s10817-008-9111-8",
}
@inproceedings{moffat2008representative,
  title = "A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking",
  author = "Moffat, Nick and Goldsmith, Michael and Roscoe, Bill",
  year = "2008",
  booktitle = "Formal methods and software engineering: 10th International Conference on Formal Engineering Methods, ICFEM 2008, Kitakyushu-City, Japan, October 27-31, 2008: proceedings",
  organization = "Springer-Verlag New York Inc",
  pages = "258--277",
}
@inproceedings{creese2008requirements,
  title = "Requirements and Concepts for Information Assurance and Pervasive Adaptation Co-design",
  author = "Creese, Sadie and Goldsmith, Michael",
  year = "2008",
  booktitle = "Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, Workshop on Pervasive Adaptation, 2008. SASO/PerAda 2008",
  organization = "IEEE",
  pages = "73--77",
}
@inproceedings{5578,
  title = "Requirements and Concepts for Information Assurance and Pervasive Adaptation Co-Design",
  author = "S. Creese, M. Goldsmith",
  year = "2008",
  booktitle = "Proceedings of Pervasive Adaptation (PerAda) workshop, 2nd Conference on Self-Adapting and Self-Organizing Systems (SASO 2008)",
}
@inproceedings{goldsmith2006taking,
  title = "Taking quotients in CSP",
  author = "Goldsmith, Michael",
  year = "2006",
  booktitle = "Conference in Topology and Theoretical Computer Science in honour of Peter Collins and Mike Reed",
}
@inproceedings{creese2006bootstrapping,
  title = "Bootstrapping multi-party ad-hoc security",
  author = "Creese, Sadie and Goldsmith, Michael and Roscoe, Bill and Xiao, Ming",
  year = "2006",
  booktitle = "Proceedings of the 2006 ACM symposium on Applied computing",
  organization = "ACM",
  pages = "369--375",
}
@inproceedings{5581,
  title = "Exploiting Empirical Engagement in Authentication Protocol Design",
  author = "Sadie Creese and Michael Goldsmith and Richard Harrison and Bill Roscoe and Paul Whittaker and Irfan Zakiuddin",
  year = "2005",
  booktitle = "Proceedings of SPPC 2005",
  month = "May",
}
@inproceedings{creese2005exploiting,
  title = "Exploiting empirical engagement in authentication protocol design",
  author = "Creese, Sadie and Goldsmith, Michael and Harrison, Richard and Roscoe, Bill and Whittaker, Paul and Zakiuddin, Irfan",
  year = "2005",
  booktitle = "Security in Pervasive Computing",
  organization = "Springer Berlin/Heidelberg",
  pages = "119--133",
}
@incollection{goldsmith2005operational,
  title = "Operational semantics for fun and profit",
  author = "Goldsmith, Michael",
  year = "2005",
  booktitle = "Communicating Sequential Processes. The First 25 Years",
  pages = "265--274",
  publisher = "Springer Berlin/Heidelberg",
}
@inproceedings{goldsmith2004csp,
  title = "CSP: The Best Concurrent-System Description Language in the World-Probably!",
  author = "Goldsmith, Michael",
  year = "2004",
  booktitle = "Communicating Process Architectures",
  pages = "227--232",
}
@inproceedings{creese2004authentication,
  title = "Authentication for pervasive computing",
  author = "Creese, Sadie and Goldsmith, Michael and Roscoe, Bill and Zakiuddin, Irfan",
  year = "2004",
  booktitle = "Security in pervasive computing",
  organization = "Springer Berlin/Heidelberg",
  pages = "439--488",
}
@incollection{creese2004security,
  title = "Security properties and mechanisms in human-centric computing",
  author = "Creese, SJ and Goldsmith, MH and Roscoe, AW and Zakiuddin, Irfan",
  year = "2004",
  booktitle = "Privacy, Security and Trust within the Context of Pervasive Computing",
  editor = "Robinson, P. and Vogt, H. and Wagealla, W.",
  publisher = "Springer",
  series = "Kluwer International Series in Engineering and Computer Science",
}
@inproceedings{PervasiveComputing,
  title = "Authentication in pervasive computing",
  author = "A. W. Roscoe and S.J. Creese and M.H. Goldsmith and I.Zakiuddin",
  year = "2003",
  booktitle = "Proceedings of the First International Conference on Security in Pervasive Computing",
  month = "March",
  publisher = "{LNCS}",
  url = "http://www.cs.ox.ac.uk/people/bill.roscoe/publications/87.ps",
}
@inproceedings{goldsmith2003watchdog,
  title = "Watchdog transformations for property-oriented model-checking",
  author = "Goldsmith, Michael and Moffat, Nick and Roscoe, Bill and Whitworth, Tim and Zakiuddin, Irfan",
  year = "2003",
  booktitle = "FME 2003: Formal Methods",
  organization = "Springer Berlin/Heidelberg",
  pages = "600--616",
}
@inproceedings{zakiuddin2003methodology,
  title = "A methodology for model-checking ad-hoc networks",
  author = "Zakiuddin, Irfan and Goldsmith, Michael and Whittaker, Paul and Gardiner, Paul",
  year = "2003",
  booktitle = "Proceedings of the 10th international conference on Model checking software",
  organization = "Springer-Verlag",
  pages = "181--196",
}
@inproceedings{goldsmith2002implementing,
  title = "Implementing Data-Independence: Symbolic Operational Semantics for CSP\_M",
  author = "Goldsmith, M and Whittaker, P",
  year = "2002",
  booktitle = "Proceedings of second workshop on Automated Verification of Critical Systems {(AVoCS'02)}",
  pages = "59--64",
  publisher = "University of Birmingham; 1999",
}
@inproceedings{goldsmith2002parallelization,
  title = "Parallelization of FDR",
  author = "Goldsmith, Michael and Martin, Jeremy",
  year = "2002",
  booktitle = "Workshop on Parallel and Distributed Model Checking, afiliated to CONCUR",
}
@inproceedings{zakiuddin2002property,
  title = "Property-based compression strategies",
  author = "Zakiuddin, Irfan and Moffat, Nick and Goldsmith, Michael and Whitworth, Tim",
  year = "2002",
  booktitle = "Proceedings of Second Workshop on Automated Verification of Critical Systems (AVoCS 2002)",
}
@book{ryan2001modelling,
  title = "Modelling and Analysis of Security Protocols",
  author = "Ryan, Peter and Schneider, Steve and Goldsmith, M and Lowe, G and Roscoe, B",
  year = "2001",
  isbn = "0201674718",
  publisher = "Addison Wesley",
}
@misc{gardiner2000fdr2,
  title = "FDR2 user manual",
  author = "Gardiner, Paul and Goldsmith, Michael and Hulance, Jason and Jackson, David and Roscoe, AW and Scattergood, Bryan and Armstrong, Philip",
  year = "2000",
  journal = "Formal Systems (Europe) Ltd",
}
@inproceedings{goldsmith1999critical,
  title = "Critical systems validation and verification with CSP and FDR",
  author = "Goldsmith, Michael and Zakiuddin, Irfan",
  year = "1999",
  booktitle = "Applied Formal Methods—FM-Trends 98",
  organization = "Springer Berlin/Heidelberg",
  pages = "243--250",
}
@inproceedings{roscoe1999intransitive,
  title = "What is intransitive noninterference?",
  author = "Roscoe, AW and Goldsmith, MH",
  year = "1999",
  booktitle = "Computer Security Foundations Workshop, 1999. Proceedings of the 12th IEEE",
  organization = "IEEE",
  pages = "228--238",
}
@article{roscoe1997perfect,
  title = "The perfect ‘spy’ for model-checking cryptoprotocols",
  author = "Roscoe, AW and Goldsmith, MH",
  year = "1997",
  journal = "Proceedings of DIMACS workshop on the design and formal verification of cryptographic protocols",
  volume = "574",
}
@inproceedings{roscoe1995hierarchical,
  title = "Hierarchical compression for model-checking CSP or how to check 10 20 dining philosophers for deadlock",
  author = "Roscoe, A and Gardiner, P and Goldsmith, Michael and Hulance, J and Jackson, D and Scattergood, J",
  year = "1995",
  booktitle = "Tools and Algorithms for the Construction and Analysis of Systems",
  organization = "Springer Berlin/Heidelberg",
  pages = "133--152",
}
@article{goldsmith1993denotational,
  title = "Denotational semantics for occam 2",
  author = "Goldsmith, MH and Roscoe, AW and Scott, BG",
  year = "1993",
  journal = "Transputer Communications",
  number = "\textbf{1}(2); \textbf{2}(1)",
}
@inproceedings{barrett1991classifying,
  title = "Classifying unbounded nondeterminism in CSP",
  author = "Barrett, Geoff and Goldsmith, Michael",
  year = "1991",
  booktitle = "Topology and category theory in computer science",
  organization = "Oxford University Press, Inc.",
  pages = "57--74",
}
@inproceedings{roscoe1991formal,
  title = "Formal Methods in the development of the H1 transputer",
  author = "Roscoe, AW and Goldsmith, MH and Cox, ADB and Scattergood, JB",
  year = "1991",
  booktitle = "Proceedings of the world transputer user group (WOTUG) conference on Transputing'91",
  organization = "IOS Press",
  pages = "629--642",
}
@book{jones1988programming,
  title = "Programming in occam 2",
  author = "Jones, Geraint and Goldsmith, Michael",
  year = "1988",
  isbn = "0-13-730334-3",
  publisher = "Prentice-Hall",
  doi = "10.1016/0167-6423(89)90031-2",
}
@inproceedings{goldsmith1988transformation,
  title = "Transformation of occam programs",
  author = "Goldsmith, MH and Roscoe, AW",
  year = "1988",
  booktitle = "Design and Application of Parallel Digital Processors, 1988., International Specialist Seminar on the",
  organization = "IET",
  pages = "180--188",
}
@inproceedings{barrett1988meaning,
  title = "The meaning and implementation of PRI ALT in occam",
  author = "Barrett, Geoff and Goldsmith, Michael and Jones, Geraint and Kay, Andrew",
  year = "1988",
  booktitle = "occam and the Transputer, research and applications (OUG-9)",
  volume = "88",
}
@misc{goldsmith1988oxford,
  title = "The Oxford occam transformation system",
  author = "Goldsmith, Michael",
  year = "1988",
  journal = "documentation, Programming Research Group, Oxford University",
  number = "Documentation, Programming Research Group, Oxford",
}
@inproceedings{goldsmith1987algebraic,
  title = "An algebraic transformation system for occam programs",
  author = "Goldsmith, Michael and Cox, Anthony and Barrett, Geoff",
  year = "1987",
  booktitle = "STACS 87",
  organization = "Springer Berlin/Heidelberg",
  pages = "481--481",
}
@inproceedings{goldsmith1987occam,
  title = "occam transformation at Oxford",
  author = "Goldsmith, MH",
  year = "1987",
  booktitle = "Proc. 7th occam User Group Technical Meeting",
}