John Lyle
John Lyle
Department of Computer Science, University of Oxford
Email verificata su - Home page
Citata da
Citata da
Trusted computing and provenance: Better together
J Lyle, A Martin
TaPP’10: 2nd Workshop on the Theory and Practice of Provenance, 2010
Challenges for provenance in cloud computing
IM Abbadi, J Lyle
3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP’11 …, 2011
Here's Johnny: A Methodology for Developing Attacker Personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
The webinos project
C Fuhrhop, J Lyle, S Faily
Proceedings of the 21st international conference on World Wide Web, 259-262, 2012
On the challenges of building a web-based ubiquitous application platform
H Desruelle, J Lyle, S Isenberg, F Gielen
Proceedings of the 2012 ACM conference on ubiquitous computing, 733-736, 2012
Cross-platform access control for mobile web applications
J Lyle, S Monteleone, S Faily, D Patti, F Ricciato
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
Guidelines for integrating personas into software engineering tools
S Faily, J Lyle
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013
Trustworthy Services Through Attestation
J Lyle
On the feasibility of remote attestation for web services
J Lyle, A Martin
2009 International Conference on Computational Science and Engineering 3 …, 2009
Trustable remote verification of web services
J Lyle
Trusted Computing: Second International Conference, Trust 2009, Oxford, UK …, 2009
Provenance as a security control
A Martin, J Lyle, C Namilkuo
Proceedings of the 4th USENIX conference on Theory and Practice of …, 2012
Requirements sensemaking using concept maps
S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore
Human-Centered Software Engineering: 4th International Conference, HCSE 2012 …, 2012
Usability and security by design: a case study in research and development
S Faily, J Lyle, A Simpson
Internet Society, 2015
On the Design and Development of webinos: A Distributed Mobile Application Middleware
J Lyle, S Faily, I Fléchais, A Paul, A Göker, H Myrhaug, H Desruelle, ...
Distributed Applications and Interoperable Systems: 12th IFIP WG 6.1 …, 2012
Model-driven architectural risk analysis using architectural and contextualised attack patterns
S Faily, J Lyle, C Namiluko, A Atzeni, C Cameroni
Proceedings of the Workshop on Model-Driven Security, 1-6, 2012
Managing application whitelists in trusted distributed systems
JH Huh, J Lyle, C Namiluko, A Martin
Future Generation Computer Systems 27 (2), 211-226, 2011
Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project
T Su, J Lyle, A Atzeni, S Faily, H Virji, C Ntanos, C Botsikas
Hardware and Software: Verification and Testing: 9th International Haifa …, 2013
Personal PKI for the Smart Device Era
J Lyle, A Paverd, J King-Lacroix, A Atzeni, H Virji, I Flechais, S Faily
Public Key Infrastructures, Services and Applications: 9th European Workshop …, 2013
Trustworthy log reconciliation for distributed virtual organisations
JH Huh, J Lyle
TRUST, Lecture Notes in Computer Science, Springer, 169-182, 2009
Multi-device application middleware: leveraging the ubiquity of the Web with webinos
H Desruelle, S Isenberg, J Lyle, F Gielen
The Journal of Supercomputing 66, 4-20, 2013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20