Skip to main content

webinos Project: Publications

Click here to download all publications in a single bibtex file

@inbook{atlf13,
  title = "Developing secure, unified multi-device and multi-domain platforms: A case study from the webinos project",
  author = "Andrea Atzeni and John Lyle and Shamal Faily",
  year = "2013",
  booktitle = "Architectures and Protocols for Secure Information Technology",
  note = "To Appear",
  publisher = "IGI Global",
}
@inproceedings{fahup13,
  title = "Policies in Context: Factors Influencing the Elicitation and Categorisation of Context-Sensitive Security Policies",
  author = "Shamal Faily and John Lyle and Ivan Flechais and Andrea Atzeni and Cesare Cameroni and Hans Myrhaug and Ayse Goker and Robert Kleinfeld",
  year = "2013",
  booktitle = "Proceedings of the Workshop on Home Usable Privacy and Security",
}
@inproceedings{fapat13,
  title = "Security Patterns Considered Harmful?",
  author = "Shamal Faily",
  year = "2013",
  booktitle = "Proceedings of The Second International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns",
  note = "To Appear",
}
@inproceedings{falyew,
  title = "Guidelines for Integrating Personas into Software Engineering Tools",
  author = "Shamal Faily and John Lyle",
  year = "2013",
  booktitle = "Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems",
  pages = "69--74",
  series = "EICS '13",
}
@inproceedings{faco13,
  title = "Designing Interactive Secure Systems: CHI 2013 Special Interest Group",
  author = "Shamal Faily and Lizzie Coles-Kemp and Paul Dunphy and Mike Just and Yoko Akama and Alexander De Luca",
  year = "2013",
  booktitle = "CHI '13 Extended Abstracts on Human Factors in Computing Systems",
  note = "To Appear",
  publisher = "ACM",
  series = "CHI EA '13",
}
@inproceedings{sac13-extending-web,
  title = "Extending the web to support personal network services",
  author = "John Lyle and Shamal Faily and Claes Nilsson and Anders Isberg",
  year = "2013",
  booktitle = "(To appear) In the Proceedings of the 28th ACM Symposium On Applied Computing (SAC '13)",
}
@inproceedings{failymdsec2012,
  title = "Model-driven architectural risk analysis using architectural and contextualised attack patterns",
  author = "Shamal Faily and John Lyle and Cornelius Namiluko and Andrea Atzeni and Cesare Cameroni",
  year = "2012",
  booktitle = "Proceedings of the Workshop on Model-Driven Security",
  pages = "3:1--3:6",
  publisher = "ACM",
}
@inproceedings{falyhcse12,
  title = "Requirements Sensemaking using Concept Maps",
  author = "Shamal Faily and John Lyle and Andre Paul and Andrea Atzeni and Dieter Blomme and Heiko Desruelle and Krishna Bangalore",
  year = "2012",
  booktitle = "HCSE'2012: Proceedings of the 4th International Conference on Human-Centered Software Engineering",
  pages = "217--232",
  publisher = "Springer",
}
@inproceedings{fafldiss2012,
  title = "Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS",
  author = "Shamal Faily and Ivan Flechais",
  year = "2012",
  booktitle = "Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems",
  pages = "3:1--3:4",
}
@inproceedings{falpdiss2012,
  title = "Secure System? Challenge Accepted: Finding and Resolving Security Failures Using Security Premortems",
  author = "Shamal Faily and John Lyle and Simon Parkin",
  year = "2012",
  booktitle = "Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems",
  pages = "5:1--5:4",
}
@inproceedings{lypaepki12,
  title = "Personal PKI for the smart device era",
  author = "John Lyle and Andrew Paverd and Justin King-Lacroix and Andrea Atzeni and Habib Virji and Ivan Flechais and Shamal Faily",
  year = "2012",
  booktitle = "9th European PKI Workshop: Research and Applications",
}
@inproceedings{lyfadais12,
  title = "On the design and development of webinos: a distributed mobile application middleware",
  author = "John Lyle and Shamal Faily and Ivan Flechais and Andre Paul and Ayse Goker and Hans Myrhaug and Heiko Desruelle and Andrew Martin",
  year = "2012",
  booktitle = "Proceedings of the 12th IFIP WG 6.1 international conference on Distributed applications and interoperable systems",
  pages = "140--147",
  series = "DAIS' 12",
}
@inproceedings{lymo12,
  title = "Cross-platform access control for mobile web applications",
  author = "John Lyle and Salvatore Monteleone and Shamal Faily and Davide Patti and Fabio Ricciato",
  year = "2012",
  booktitle = "Policies for Distributed Systems and Networks (POLICY), 2012 IEEE International Symposium on",
  pages = "37--44",
}
@inproceedings{failydefam2012,
  title = "Analysing Chindogu: Applying Defamiliarisation to Security Design",
  author = "Shamal Faily",
  year = "2012",
  booktitle = "CHI 2012 Workshop on Defamiliarisation in Innovation and Usability",
}
@inproceedings{lyfa12,
  title = "The webinos project",
  author = "Christian Fuhrhop and John Lyle and Shamal Faily",
  year = "2012",
  booktitle = "Proceedings of the 21st international conference companion on World Wide Web",
  location = "Lyon, France",
  pages = "259--262",
  publisher = "ACM",
  series = "WWW '12 Companion",
}
@incollection{falp12,
  title = "Tool-support Premortems with Attack and Security Patterns",
  author = "Shamal Faily and John Lyle and Simon Parkin",
  year = "2012",
  booktitle = "First International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns",
  pages = "10--11",
}
@inproceedings{fswec11-webinos,
  title = "“Do we know each other or is it just our Devices?”: A Federated Context Model for Describing Social Activity Across Devices",
  author = "George Gionis and Heiko Desruelle and Dieter Blomme and John Lyle and Shamal Faily and Louay Bassbouss",
  year = "2011",
  booktitle = "W3C/PrimeLife Federated Social Web Europe Conference 2011",
  month = "June",
  url = "http://d-cent.org/fsw2011/wp-content/uploads/fsw2011-A-Federated-Context-Model-for-Describing-Social-Activity-Across-Devices.pdf",
}
@inproceedings{failyistar11,
  title = "Bridging User-Centered Design and Requirements Engineering with GRL and Persona Cases",
  author = "Shamal Faily",
  year = "2011",
  booktitle = "Proceedings of the 5th International i* Workshop",
  pages = "114--119",
}
@inproceedings{faflre11,
  title = "Eliciting Usable Security Requirements with Misusability Cases",
  author = "Shamal Faily and Ivan Flechais",
  year = "2011",
  booktitle = "Proceedings of the 19th IEEE International Requirements Engineering Conference",
  note = "Pre-print available at http://www.cs.ox.ac.uk/files/4125/PID1921187.pdf",
  pages = "339--340",
  publisher = "IEEE Computer Society",
  doi = "10.1109/RE.2011.6051665",
}
@inproceedings{atfasecse2011,
  title = "Here's Johnny: a Methodology for Developing Attacker Personas",
  author = "Andrea Atzeni and Shamal Faily and John Lyle and Cesare Cameroni and Ivan Flechais",
  year = "2011",
  booktitle = "Proceedings of the 6th International Conference on Availability, Reliability and Security",
  pages = "722--727",
}