Skip to main content

Sadie Creese : Publications

Click here to download all publications in a single bibtex file

@article{Neil:2014aa,
  title = "The SuperIdentity Stimulus Dataset - a Multi-Modal Biometric and Cybermetric Resource",
  author = "Neil, G. and Stevenage, S. and Black, S. and Meadows, H. and Creese, S. and Hodges, D. and He, H. and Pike, W. and Love, O. and Saxby, S. and Knight, A. and Hamlin, I. and Schultz, J. and Stanton-Fraser, D. and Bevan, C. and Emanuel, L. and Whitty, M. and Jamison-Powell, S",
  year = "In Review",
  journal = "Pattern Analysis and Machine Intelligence, IEEE Transactions on",
}
@conference{2018-usec-aangc,
  title = "Sonification in Security Operations Centres: What do Security Practitioners Think?",
  author = "Louise M. Axon and Bushra Alahmadi and Jason R. C. Nurse and Michael Goldsmith and Sadie Creese",
  year = "2018",
  booktitle = "Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium",
  note = "To appear",
  publisher = "Internet Society",
}
@techreport{RR-17-01,
  title = "The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance",
  author = "Ioannis Agrafiotis and Sadie Creese and Michael Goldsmith and Jason R.C. Nurse and David Upton",
  year = "2017",
  address = "Oxford, UK",
  institution = "DCS",
  number = "RR-17-01",
  pages = "87",
}
@conference{2016-securware-acgn,
  title = "Reflecting on the Use of Sonification for Network Monitoring",
  author = "Axon, Louise and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R.C.",
  year = "2016",
  booktitle = "10th International Conference on Emerging Security Information, Systems and Technologies",
  isbn = "978-1-61208-493-0",
  issn = "2162-2116",
  keywords = "Sonification; Network Security; Anomaly Detection; Network Monitoring",
  pages = "254--261",
}
@article{cfs2015agrafiotisetal,
  title = "Identifying attack patterns for insider threat detection",
  author = "Ioannis Agrafiotis and Jason R. C. Nurse and Oliver Buckley and Phil Legg and Sadie Creese and Michael Goldsmith",
  year = "2015",
  issn = "1361-3723",
  journal = "Computer Fraud & Security",
  month = "July",
  number = "7",
  pages = "9--17",
  url = "http://www.journals.elsevier.com/computer-fraud-and-security",
  doi = "10.1016/S1361-3723(15)30066-X",
}
@article{negc2015email,
  title = "Investigating the leakage of sensitive personal and organisational information in email headers",
  author = "Jason R. C. Nurse and Arnau Erola and Michael Goldsmith and Sadie Creese",
  year = "2015",
  journal = "Journal of Internet Services and Information Security",
  number = "1",
  url = "http://isyou.info/jisis/vol5/no1/jisis-2015-vol5-no1-04.pdf",
  volume = "5",
}
@conference{2015_eisic,
  title = "Applying semantic technologies to fight online banking fraud",
  author = "Rodrigo Carvalho and Michael Goldsmith and Sadie Creese",
  year = "2015",
  booktitle = "European Intelligence and Security Informatics Conference (EISIC)",
}
@inproceedings{nurse2015,
  title = "Information trustworthiness as a solution to the misinformation problems in social media",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen and Price, Darren and Jones, Glyn",
  year = "2015",
  booktitle = "International Conference on Cyber Security for Sustainable Society",
  issn = "2052-8604",
  pages = "28-35",
}
@inproceedings{dnhgc2015predictinggps,
  title = "Predicting Graphical Passwords",
  author = "Matthieu Devlin and Jason R. C. Nurse and Duncan Hodges and Michael Goldsmith and Sadie Creese",
  year = "2015",
  booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 17th International Conference on Human-Computer Interaction (HCI)",
  editor = "Theo Tryfonas and Ioannis Askoxylakis",
  pages = "23--35",
  publisher = "Springer",
  series = "9190",
  doi = "10.1007/978-3-319-20376-8_3",
}
@inproceedings{ephillips2015snasecurity,
  title = "Applying Social Network Analysis to Security",
  author = "Elizabeth Phillips and Jason R. C. Nurse and Michael Goldsmith and Sadie Creese",
  year = "2015",
  booktitle = "International Conference on Cyber Security for Sustainable Society",
  pages = "11--27",
}
@article{nagcl14,
  title = "Two sides of the coin: measuring and communicating the trustworthiness of online information",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen",
  year = "2014",
  journal = "Journal of Trust Management",
  keywords = "Information trustworthiness; Information quality; Trust metrics; Trust visuals; Decision-making; Social-media content; Risk communication",
  number = "5",
  publisher = "Springer Open",
  url = "http://www.journaloftrustmanagement.com/content/1/1/5",
  volume = "1",
  doi = "10.1186/2196-064X-1-5",
}
@inproceedings{bnlgs2014,
  title = "Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat",
  author = "Buckley, Oliver and Nurse, Jason R. C. and Legg, Philip A. and Goldsmith, Michael and Creese, Sadie",
  year = "2014",
  booktitle = "Workshop on Socio-Technical Aspects in Security and Trust (STAST) associated with 27th IEEE Computer Security Foundations Symposium (CSF)",
  publisher = "IEEE",
  doi = "10.1109/STAST.2014.10",
}
@conference{nagclpj2014,
  title = "Managing the influence of social media using information trust",
  author = "Jason R.C. Nurse and Ioannis Agrafiotis and Michael Goldsmith and Sadie Creese and Koen Lamberts and Darren Price and Glyn Jones",
  year = "2014",
  booktitle = "Social Influence in the Information Age Conference",
}
@inproceedings{nblgcww2014,
  title = "Understanding Insider Threat: A Framework for Characterising Attacks",
  author = "Jason R.C. Nurse and Oliver Buckley and Philip A. Legg and Michael Goldsmith and Sadie Creese and Gordon R.T. Wright and Monica Whitty",
  year = "2014",
  booktitle = "Workshop on Research for Insider Threat (WRIT) held as part of the IEEE Computer Society  Security and Privacy Workshops (SPW14), in conjunction with the IEEE Symposium on Security and Privacy (SP).",
  publisher = "IEEE",
  url = "http://www.sei.cmu.edu/community/writ2014/",
  doi = "10.1109/SPW.2014.38",
}
@inproceedings{abc,
  title = "Image Choice to represent the Self in Different Online Environments",
  author = "Whitty, M. and Doodson, J. and Creese, S. and Hodges, D.",
  year = "2014",
  booktitle = "International Conference on Social Computing and Social Media at the 16th International Conference on Human-Computer Interaction (HCI)",
  note = "To appear",
  publisher = "Springer",
}
@inproceedings{nlbawwugc14,
  title = "A critical reflection on the threat from human insiders - its nature, industry perceptions, and detection approaches",
  author = "Nurse, Jason R.C. and Legg, Philip A. and Buckley, Oliver and Agrafiotis, Ioannis and Wright, Gordon and Whitty, Monica and Upton, David and Goldsmith, Michael and Creese, Sadie",
  year = "2014",
  booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 16th International Conference on Human-Computer Interaction (HCI)",
  publisher = "Springer",
  doi = "10.1007/978-3-319-07620-1_24",
}
@incollection{whitty2014image,
  title = "Image Choice to Represent the Self in Different Online Environments",
  author = "Whitty, Monica and Doodson, James and Creese, Sadie and Hodges, Duncan",
  year = "2014",
  booktitle = "Social Computing and Social Media",
  pages = "528--537",
  publisher = "Springer International Publishing",
}
@inproceedings{Whitty:2013fk,
  title = "Who's Making Security Risks Online ?",
  author = "Whitty, M. T. and Creese, S. and Hodges, D.",
  year = "2013",
  booktitle = "European Congress of Psychology",
  month = "july",
}
@inproceedings{Hodges:2013bh,
  title = "Breaking the Arc: Risk Control for Big Data",
  author = "Hodges, D. and Creese, S.",
  year = "2013",
  booktitle = "IEEE BigData 2013",
  month = "oct",
}
@article{legg2013mist,
  title = "Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection",
  author = "Philip A. Legg, Nick Moffat, Jason R.C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese",
  year = "2013",
  issn = "2093-5382",
  journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications",
  number = "4",
  pages = "20-37",
  url = "http://isyou.info/jowua/papers/jowua-v4n4-2.pdf",
  volume = "4",
}
@inproceedings{6691630,
  title = "Breaking the Arc: Risk control for Big Data",
  author = "Hodges, Duncan and Creese, Sadie",
  year = "2013",
  booktitle = "Big Data, 2013 IEEE International Conference on",
  keywords = "big-data;personal-data;privacy;risk;society",
  pages = "613-621",
  doi = "10.1109/BigData.2013.6691630",
}
@inproceedings{Creese:2013fkHST,
  title = "Tools for Understanding Identity",
  author = "Creese, Sadie and Gibson-Robinson, Thomas and Goldsmith, Michael and Hodges, Duncan and Kim, Dee and Love, Oriana and Nurse, Jason R. C. and Pike, Bill and Schultz, Jean",
  year = "2013",
  booktitle = "IEEE Conference on Technologies for Homeland Security (HST '13)",
  doi = "10.1109/THS.2013.6699064",
}
@inproceedings{hodges2013building,
  title = "Building a better intelligence machine: A new approach to capability review and development",
  author = "Hodges, Duncan and Creese, Sadie",
  year = "2013",
  booktitle = "Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on",
  organization = "IEEE",
  pages = "113--115",
}
@inproceedings{ncgrhas2013,
  title = "Supporting Human Decision-Making Online using Information Trustworthiness Metrics",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Rahman, Syed S.",
  year = "2013",
  booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 15th International Conference on Human-Computer Interaction (HCII)",
  keywords = "information trustworthiness; information quality; metrics; human decision-making; open-source content; social-media; online risks",
  publisher = "Springer",
  doi = "10.1007/978-3-642-39345-7_33",
}
@inproceedings{7027,
  title = "Communicating Trustworthiness using Radar Graphs: A Detailed Look",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2013",
  booktitle = "The 11th International Conference on Privacy, Security and Trust (PST)",
  keywords = "Trustworthiness factors; trustworthiness visualisation; risk communication; communicating trustworthiness and quality; user studies",
  publisher = "IEEE",
  doi = "10.1109/PST.2013.6596085",
}
@inproceedings{7026,
  title = "Building Confidence in Information-Trustworthiness Metrics for Decision Support",
  author = "Nurse, Jason R.C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2013",
  booktitle = "The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13)",
  keywords = "Trust metrics; trustworthiness visualisation; decision-making; risk communication; information quality",
  publisher = "IEEE",
  doi = "10.1109/TrustCom.2013.6",
}
@incollection{year={2013},
  title = "Relationships between Password Choices, Perceptions of Risk and Security Expertise",
  author = "Creese, Sadie and Hodges, Duncan and Jamison-Powell, Sue and Whitty, Monica",
  year = "2013",
  booktitle = "Human Aspects of Information Security, Privacy, and Trust",
  editor = "Marinos, Louis and Askoxylakis, Ioannis",
  isbn = "978-3-642-39344-0",
  pages = "80-89",
  publisher = "Springer Berlin Heidelberg",
  series = "Lecture Notes in Computer Science",
  url = "http://dx.doi.org/10.1007/978-3-642-39345-7_9",
  volume = "8030",
  doi = "10.1007/978-3-642-39345-7_9",
}
@inproceedings{SATURN:CRITIS12,
  title = "Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment",
  author = "Adedayo O. Adetoye and Sadie Creese and Michael H. Goldsmith",
  year = "2012",
  booktitle = "7th International Conference On Critical Information Infrastructures Security (CRITIS 2012)",
  month = "sep",
  note = "To appear",
  publisher = "LNCS",
}
@inproceedings{6298821,
  title = "A Model for Identity in the Cyber and Natural Universes",
  author = "Hodges, Duncan and Creese, Sadie and Goldsmith, Michael",
  year = "2012",
  booktitle = "Intelligence and Security Informatics Conference (EISIC), 2012 European",
  month = "aug.",
  organization = "IEEE",
  pages = "115--122",
  doi = "10.1109/EISIC.2012.43",
}
@article{7967,
  title = "Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviours",
  author = "Jackson, Jenifer and Creese, Sadie",
  year = "2012",
  issn = "1545-5971",
  journal = "IEEE Transactions on Dependable and Secure Computing",
  number = "6",
  pages = "930-943",
  url = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6268271",
  volume = "9",
  doi = "10.1109/TDSC.2012.72",
}
@inproceedings{hngc2012,
  title = "Identity attribution across CyberSpace and the Natural Space",
  author = "Hodges, D. and Nurse, J.R.C. and Goldsmith, M. and Creese, S.",
  year = "2012",
  booktitle = "The International Crime and Intelligence Analysis Conference",
  url = "http://www.ucl.ac.uk/jdi/events/int-CIA-conf",
}
@inproceedings{cgnptrustcom2012,
  title = "A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks",
  author = "Creese, Sadie and Goldsmith, Michael and Nurse, Jason R.C. and Phillips, Elizabeth",
  year = "2012",
  booktitle = "11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)",
  pages = "1124-1131",
  publisher = "IEEE",
  doi = "10.1109/TrustCom.2012.22",
}
@inproceedings{ncglstast2012,
  title = "Using Information Trustworthiness Advice in Decision-Making",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2012",
  booktitle = "The 2nd Workshop on Socio-Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF)",
  publisher = "IEEE",
  doi = "10.1109/STAST.2012.10",
}
@inproceedings{ncglcjiscram2012,
  title = "An Initial Usability Evaluation of the Secure Situation Awareness System",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Craddock, Rachel and Jones, Glyn",
  year = "2012",
  booktitle = "The 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012)",
  publisher = "IAS of ISCRAM",
  url = "http://www.iscramlive.org/ISCRAM2012/proceedings/240.pdf",
}
@inproceedings{SATURN:CSS11,
  title = "A Logical High-Level Framework for Critical Infrastructure Resilience and Risk Assessment",
  author = "Sadie Creese and Michael H. Goldsmith and Adedayo O. Adetoye",
  year = "2011",
  address = "Milan, Italy",
  booktitle = "The 3rd International Workshop on Cyberspace Safety and Security (CSS 2011)",
  month = "September",
  publisher = "To appear",
}
@inproceedings{5557,
  title = "Formalising Requirements for a Biobank Scenario using a Logic for Consent and Revocation",
  author = "I. Agrafiotis, S. Creese, M. Goldsmith",
  year = "2011",
  booktitle = "Proceedings of the IFIP Summer School 2011",
  month = "September",
}
@inproceedings{5560,
  title = "Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources",
  author = "Syed Sadiqur Rahman and Michael Goldsmith and Sadie Creese",
  year = "2011",
  booktitle = "Proceedings of STM'11 7th International Workshop on Security and Trust Management",
  month = "June",
}
@inproceedings{5561,
  title = "Biodiversity: A Security Approach for Ad Hoc Networks",
  author = "Jen Jackson and Sadie Creese and Mark Leeson",
  year = "2011",
  booktitle = "Proceedings of IEEE SSCI2011 Symposium Series on Computational Intelligence, CICS2011 Symposium on Computational Intelligence in Cyber Security",
  month = "April",
}
@article{5559,
  title = "Refinement Checking for Privacy Policies",
  author = "N. Papanikolaou, M. Goldsmith, S. Creese",
  year = "2011",
  journal = "Science of Computer Programming",
  doi = "10.1016/j.scico.2011.07.009",
}
@inproceedings{5556,
  title = "Developing a Strategy for Automated Privacy Testing Suites",
  author = "I. Agrafiotis, S. Creese, M. Goldsmith",
  year = "2011",
  booktitle = "Proceedings of the IFIP Summer School",
  month = "September 2011",
}
@inproceedings{5465,
  title = "Guidelines for Usable Cybersecurity: Past and Present",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2011",
  booktitle = "The 3rd International Workshop on Cyberspace Safety and Security (CSS 2011) at The 5th International Conference on Network and System Security (NSS 2011)",
  publisher = "IEEE",
  doi = "10.1109/CSS.2011.6058566",
}
@inproceedings{5464,
  title = "Information Quality and Trustworthiness: A Topical State-of-the-Art Review",
  author = "Nurse, Jason R.C. and Rahman, Syed Sadiqur and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2011",
  booktitle = "The International Conference on Computer Applications and Network Security (ICCANS) 2011",
  publisher = "IEEE",
  url = "http://www.tease-project.info/publications/iccans2011_nrcgl_authors_final",
}
@inproceedings{ncglstast2011,
  title = "Trustworthy and Effective Communication of Cybersecurity Risks: A Review",
  author = "Nurse, Jason R.C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen",
  year = "2011",
  booktitle = "The 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011)",
  publisher = "IEEE",
  doi = "10.1109/STAST.2011.6059257",
}
@inproceedings{5562,
  title = "Inadequacies of Current Risk Controls for the Cloud",
  author = "M. Auty, S. Creese, M. Goldsmith, P. Hopkins",
  year = "2010",
  booktitle = "Proceedings of CloudCom 2010",
  month = "November",
}
@inproceedings{5568,
  title = "EnCoRe: Towards a Holistic Approach to Privacy",
  author = "N. Papanikolaou, S. Creese, M. Goldsmith, M. Casassa Mont, S. Pearson",
  year = "2010",
  booktitle = "Proceedings of SECRYPT2010",
}
@inproceedings{5567,
  title = "Applying formal methods to describe the privacy-control requirements in real case-study scenario: emerging ambiguities and proposed solutions",
  author = "I. Agrafiotis, S. Creese, M. Goldsmith, N. Papanikolaou",
  year = "2010",
  booktitle = "Proceedings of 2010 IFIP/PrimeLife Summer School",
}
@inproceedings{5566,
  title = "Towards a Conceptual Model for Privacy Policies",
  author = "M. Casassa Mont, S. Pearson, S. Creese, M. Goldsmith, N. Papanikolaou",
  year = "2010",
  booktitle = "Proceedings of 2010 IFIP/PrimeLife Summer School",
}
@inproceedings{5565,
  title = "Defining Consent and Revocation Policies",
  author = "I. Agrafiotis, S. Creese, M. Goldsmith, N. Papanikolaou, M Casassa Mont, S. Pearson",
  year = "2010",
  booktitle = "Proceedings of 2010 IFIP/PrimeLife Summer School",
}
@inproceedings{5564,
  title = "Refinement-Friendly Bigraphs and Spygraphs",
  author = "M. Goldsmith, S. Creese",
  year = "2010",
  booktitle = "Proceedings of SEFM'10",
}
@inproceedings{5563,
  title = "A Modelling Approach for Interdependency in Digital Systems-of-Systems Security – Extended Abstract",
  author = "A. Adetoye, S. Creese, M. Goldsmith",
  year = "2010",
  booktitle = "Proceedings of CRITIS'10",
}
@inproceedings{5571,
  title = "Policy Refinement Checking (extended abstract)",
  author = "N. Papanikolaou, M. Goldsmith, S. Creese",
  year = "2009",
  booktitle = "Proceedings of 9th Symposium on Automated Verification of Critical Systems (AvoCS’09), Technical Report CSR-2-2009, Swansea University",
  month = "September",
}
@inproceedings{5570,
  title = "Towards an Integrated Approach to the Management, Specification and Enforcement of Privacy Policies",
  author = "M. Casassa Mont, S. Pearson, S. Creese, M. Goldsmith, N. Papanikolaou",
  year = "2009",
  booktitle = "Proceedings of W3C Workshop on Access Control Application Scenarios",
  month = "November",
}
@inbook{5576,
  title = "Reaching for Informed Revocation: Shutting Off the Tap on Personal Data",
  author = "I. Agrafiotis, S. Creese, M. Goldsmith, N. Papanikolaou",
  year = "2009",
  booktitle = "Privacy and Identity Management for Life, Proceedings of 5th PrimeLife/IFIP International Summer School",
  publisher = "Springer IFIP AICT 320",
}
@article{5573,
  title = "Can cognitive science help us make information risk more tangible online?",
  author = "Sadie Creese and Koen Lamberts",
  year = "2009",
  publisher = "IEEE Intelligent Systems",
  volume = "Vol 24 Issue 6 32-36",
}
@inproceedings{5577,
  title = "Ensuring Consent and Revocation: Towards a Taxonomy of Consent",
  author = "S. Creese, M. Goldsmith, N. Papnikolaou",
  year = "2009",
  booktitle = "Proceedings of WebSci'09: Society On-Line",
}
@inproceedings{5569,
  title = "Data Protection-Aware Design for Cloud Services",
  author = "Sadie Creese and Paul Hopkins and Siani Pearson and Yun Shen",
  year = "2009",
  booktitle = "Proceedings of CloudCom 2009",
  publisher = "LNCS",
  volume = "Vol 5931/2009, 119-130",
}
@inproceedings{5578,
  title = "Requirements and Concepts for Information Assurance and Pervasive Adaptation Co-Design",
  author = "S. Creese, M. Goldsmith",
  year = "2008",
  booktitle = "Proceedings of Pervasive Adaptation (PerAda) workshop, 2nd Conference on Self-Adapting and Self-Organizing Systems (SASO 2008)",
}
@inproceedings{5579,
  title = "Bootstrapping Multi-Party Ad-Hoc Security",
  author = "S. J. Creese, M. H. Goldsmith, A.W. Roscoe, Ming Xiao",
  year = "2006",
  booktitle = "Proceedings of SAC 2006 21st Annual ACM Symposium on Applied Computing",
  month = "April",
}
@inproceedings{5581,
  title = "Exploiting Empirical Engagement in Authentication Protocol Design",
  author = "Sadie Creese and Michael Goldsmith and Richard Harrison and Bill Roscoe and Paul Whittaker and Irfan Zakiuddin",
  year = "2005",
  booktitle = "Proceedings of SPPC 2005",
  month = "May",
}
@inproceedings{PervasiveComputing,
  title = "Authentication in pervasive computing",
  author = "A. W. Roscoe and S.J. Creese and M.H. Goldsmith and I.Zakiuddin",
  year = "2003",
  booktitle = "Proceedings of the First International Conference on Security in Pervasive Computing",
  month = "March",
  publisher = "{LNCS}",
  url = "http://www.cs.ox.ac.uk/people/bill.roscoe/publications/87.ps",
}
@booklet{5585,
  title = "MAFTIA (Malicious- and Accidental- Fault Tolerance for Internet Applications",
  author = "D. Powell, A. Adelsbach, C. Cachin, S. Creese, M. Dacier, Y. Deswarte, T. McCutcheon, N. Neves, B. Pfitzmann, B. Randell, R. Stroud, P. Veríssimo, M. Waidner",
  year = "2001",
  booktitle = "Supplement of the 2001 International Conference on Dependable Systems and Networks",
}
@inproceedings{ArbitraryNetworkTopologies,
  title = "{Formal Verification of Arbitrary Network Topologies}",
  author = "A. W. Roscoe and S.J. Creese",
  year = "1999",
  booktitle = "{Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'99)}",
  month = "June",
  publisher = "{CSREA Press}",
  url = "http://www.cs.ox.ac.uk/people/bill.roscoe/publications/73.pdf",
  volume = "II",
}