Andrew C. Simpson

Orcid: 0000-0003-3597-2232

Affiliations:
  • University of Oxford, UK


According to our database1, Andrew C. Simpson authored at least 111 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Formalizing Attack Trees To Support Economic Analysis.
Comput. J., January, 2024

2023
Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning.
Comput. J., March, 2023

Towards a Greater Understanding of Coordinated Vulnerability Disclosure Policy Documents.
DTRAP, 2023

The aesthetics of cyber security: How do users perceive them?
CoRR, 2023

The efficacy potential of cyber security advice as presented in news articles.
CoRR, 2023

2022
Threat Intelligence Quality Dimensions for Research and Practice.
DTRAP, 2022

Coordinated Vulnerability Disclosure programme effectiveness: Issues and recommendations.
Comput. Secur., 2022

A longitudinal study of hacker behaviour.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

2021
The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices.
DTRAP, 2021

A success model for cyber threat intelligence management platforms.
Comput. Secur., 2021

Topic Modelling for Risk Identification in Data Protection Act Judgements.
Proceedings of the New Frontiers in Artificial Intelligence, 2021

2020
Towards Models for Privacy Preservation in the Face of Metadata Exploitation.
Proceedings of the Privacy and Identity Management: 15th IFIP WG 9.2, 2020

2019
Multiobjective feature selection for microarray data via distributed parallel algorithms.
Future Gener. Comput. Syst., 2019

Analysing and Evaluating Syntactic Privacy Games via a Recommender Systems Case Study.
Proceedings of the 2019 IEEE SmartWorld, 2019

Abstracting Syntactic Privacy Notions via Privacy Games.
Proceedings of the 2019 IEEE SmartWorld, 2019

Teaching Introductory Formal Methods and Discrete Mathematics to Software Engineers: Reflections on a Modelling-Focussed Approach.
Proceedings of the Formal Methods Teaching - Third International Workshop and Tutorial, 2019

Connected Vehicles: A Privacy Analysis.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

On the Trade-Off Between Privacy and Utility in Mobile Services: A Qualitative Study.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Experimental Analysis of Artificial Neural Networks Performance for Physical Activity Recognition Using Belt and Wristband Devices.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

Towards Better Understanding of Cyber Security Information Sharing.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

Cyber Threat Information Sharing: Perceived Benefits and Barriers.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
A model-based approach to support privacy compliance.
Inf. Comput. Secur., 2018

Risk and the Small-Scale Cyber Security Decision Making Dialogue - a UK Case Study.
Comput. J., 2018

Privacy Architectural Strategies: An Approach for Achieving Various Levels of Privacy Protection.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Analysis and Evaluation of Syntactic Privacy Notions and Games.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Rethinking the Proposition of Privacy Engineering.
Proceedings of the New Security Paradigms Workshop, 2018

Development of Ground Truth Data for Automatic Lumbar Spine MRI Image Segmentation.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Cyber-Warranties as a Quality Signal for Information Security Products.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Analysis.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Can We Evaluate the Impact of Cyber Security Information Sharing?
Proceedings of the International Conference On Cyber Situational Awareness, 2018

Towards Integrating Insurance Data into Information Security Investment Decision Making.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

2017
On the formal interpretation and behavioural consistency checking of SysML blocks.
Softw. Syst. Model., 2017

Privacy Games for Syntactic Privacy Notions.
IACR Cryptol. ePrint Arch., 2017

A Formal Model to Facilitate Security Testing in Modern Automotive Systems.
Proceedings of the Proceedings Joint Workshop on Handling IMPlicit and EXplicit knowledge in formal system development (IMPEX) and Formal and Model-Driven Techniques for Developing Trustworthy Systems (FM&MDD), 2017

On small-scale IT users' system architectures and cyber security: A UK case study.
Comput. Secur., 2017

AdSelector: A Privacy-Preserving Advertisement Selection Mechanism for Mobile Devices.
Comput. J., 2017

On the Performance of a Trustworthy Remote Entity in Comparison to Secure Multi-party Computation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

The Use of Data Protection Regulatory Actions as a Data Source for Privacy Economics.
Proceedings of the Computer Safety, Reliability, and Security, 2017

A UML Profile for Privacy-Aware Data Lifecycle Models.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

Personal Data Management: An Abstract Personal Data Lifecycle Model.
Proceedings of the Business Process Management Workshops, 2017

Towards a Principled Approach for Engineering Privacy by Design.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017

2016
Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation.
Softw. Pract. Exp., 2016

Policy, statistics and questions: Reflections on UK cyber security disclosures.
J. Cybersecur., 2016

On Safety and Security Requirements in Emerging Ubiquitous Computing Models.
Comput. J., 2016

Formal models for automotive systems and vehicular networks: Benefits and challenges.
Proceedings of the 2016 IEEE Vehicular Networking Conference, 2016

Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Software Security Investment: The Right Amount of a Good Thing.
Proceedings of the IEEE Cybersecurity Development, 2016

Motivating Security Engineering with Economics: A Utility Function Approach.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

A case for the economics of secure software development.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

Exploring the use of Intel SGX for Secure Many-Party Applications.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Privacy-Preserving Targeted Mobile Advertising: Formal Models and Analysis.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Formal Models for Privacy.
Proceedings of the Workshops of the EDBT/ICDT 2016 Joint Conference, 2016

Misuse, Abuse and Reuse: Economic Utility Functions for Characterising Security Requirements.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

When the Winning Move is Not to Play: Games of Deterrence in Cyber Security.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Small-Scale Cyber Security.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Formal relational database design: an exercise in extending the formal template language.
Formal Aspects Comput., 2014

On a Process Algebraic Representation of Sequence Diagrams.
Proceedings of the Software Engineering and Formal Methods, 2014

On the Formal Interpretation of SysML Blocks Using a Safety Critical Case Study.
Proceedings of the Eighth Brazilian Symposium on Software Components, 2014

A Formal Model of SysML Blocks Using CSP for Assured Systems Engineering.
Proceedings of the Formal Techniques for Safety-Critical Systems, 2014

2013
Towards a Process Algebra Framework for Supporting Behavioural Consistency and Requirements Traceability in SysML.
Proceedings of the Formal Methods and Software Engineering, 2013

On the Cloud-Enabled Refinement Checking of Railway Signalling Interlockings.
Proceedings of the Formal Techniques for Safety-Critical Systems, 2013

2011
On Privacy and Public Data: a Study of data.gov.uk.
J. Priv. Confidentiality, 2011

Conformance Checking of Dynamic Access Control Policies.
Proceedings of the Formal Methods and Software Engineering, 2011

Automatic Conformance Checking of Role-Based Access Control Policies via Alloy.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

2010
On the Secure Sharing and Aggregation of Data to Support Systems Biology Research.
Proceedings of the Data Integration in the Life Sciences, 7th International Conference, 2010

Towards Formally Templated Relational Database Representations in Z.
Proceedings of the Abstract State Machines, 2010

Formalising and Validating RBAC-to-XACML Translation Using Lightweight Formal Methods.
Proceedings of the Abstract State Machines, 2010

On the Modelling and Analysis of Amazon Web Services Access Policies.
Proceedings of the Abstract State Machines, 2010

2009
On Formalizing and Normalizing Role-Based Access Control Systems.
Comput. J., 2009

On the Construction and Verification of Self-modifying Access Control Policies.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

On the Secure Sharing of Legacy Data.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

On the utilisation of a service-oriented infrastructure to support radiologist training.
Proceedings of the Twenty-Second IEEE International Symposium on Computer-Based Medical Systems, 2009

2008
Towards a Formal Framework for Workflow Interoperability.
Proceedings of the Web Services and Formal Methods, 5th International Workshop, 2008

On the need for user-defined fine-grained access control policies for social networking applications.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

On the Facilitation of Fine-Grained Access to Distributed Healthcare Data.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

Accessing and aggregating legacy data sources for healthcare research, delivery and training.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

On Formal Description of Synchronization Requirements in Multimedia Systems.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

A healthcare-driven framework for facilitating the secure sharing of data across organisational boundaries.
Proceedings of the Global Healthgrid: e-Science Meets Biomedical Informatics, 2008

2007
On The Development of Secure Service-Oriented Architectures to Support Medical Research.
Int. J. Heal. Inf. Syst. Informatics, 2007

Integrative Biology - the challenges of developing a collaborative research environment for heart and cancer modelling.
Future Gener. Comput. Syst., 2007

Towards Build-Time Interoperability of Workflow Definition Languages.
Proceedings of the Ninth International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2007

Developing collaborative technology for neuro-science.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

Switched Lightpaths for e-Health Applications: Issues and Challenges.
Proceedings of the 20th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2007), 2007

2006
Securing web services for deployment in health grids.
Future Gener. Comput. Syst., 2006

On tracker attacks in health grids.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Delegation in a Distributed Healthcare Context: A Survey of Current Approaches.
Proceedings of the Information Security, 9th International Conference, 2006

Towards a Fully Generic Theory of Data.
Proceedings of the Formal Methods and Software Engineering, 2006


A Prototype Infrastructure for the Secure Aggregation of Imaging and Pathology Data for Colorectal Cancer Care.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

Switched Lightpaths for e-Health Applications: a Feasibility Study.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

The Challenges of Developing a Collaborative Data and Compute Grid for Neurosciences.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

2005
Towards secure Grid-enabled healthcare.
Softw. Pract. Exp., 2005

Collaboration and Trust in Healthcare Innovation: The eDiaMoND Case Study.
Comput. Support. Cooperative Work., 2005

On Deducibility and Anonymisation in Medical Databases.
Proceedings of the Secure Data Management, 2005

Protecting sensitive patient data via query modification.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

A Secure Wrapper for OGSA-DAI.
Proceedings of the Advances in Grid Computing, 2005

GIMI: Generic Infrastructure for Medical Informatics.
Proceedings of the 18th IEEE Symposium on Computer-Based Medical Systems (CBMS 2005), 2005

NeuroGrid: Using Grid Technology to Advance Neuroscience.
Proceedings of the 18th IEEE Symposium on Computer-Based Medical Systems (CBMS 2005), 2005

2004
Security Principles for Public-Resource Modeling Research.
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004

Teaching Formal Methods in Context.
Proceedings of the Teaching Formal Methods, CoLogNET/FME Symposium, 2004

A relational approach to the capture of DICOM files for Grid-enabled medical imaging databases.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

2003
On The Supervision and Assessment Of Part-Time Postgraduate Software Engineering Projects.
Proceedings of the 25th International Conference on Software Engineering, 2003

Generalising the Z Schema Calculus: Database Schemas and Beyond.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

2002
Climateprediction.net: Design Principles for Publicresource Modeling Research.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

1999
BSP in CSP: Easy as ABC.
Proceedings of the Parallel and Distributed Processing, 1999

1998
Safety through Security.
Proceedings of the 9th International Workshop on Software Specification and Design, 1998

1996
Safety through security.
PhD thesis, 1996

A novel data mining tool for ATM networks.
Proceedings of the First International Conference on Practical Aspects of Knowledge Management, 1996

1994
A Formal Specification of an Automatic Train Protection System.
Proceedings of the FME '94: Industrial Benefit of Formal Methods, 1994


  Loading...