Andrew P. Martin

Orcid: 0000-0002-8236-980X

Affiliations:
  • University of Oxford, UK
  • University of Queensland, Department of Computer Science


According to our database1, Andrew P. Martin authored at least 103 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
XAI Human-Machine collaboration applied to network security.
Frontiers Comput. Sci., 2024

How Memory-Safe is IoT? Assessing the Impact of Memory-Protection Solutions for Securing Wireless Gateways.
CoRR, 2024

Assessing the Cross-Disciplinary Accessibility of CyBOK.
Proceedings of the Information Security Education - Challenges in the Digital Age, 2024

2023
But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade Routers.
Proceedings of the 2023 European Symposium on Usable Security, 2023

2022
Cybersecurity service level agreements: understanding government data confidentiality requirements.
J. Cybersecur., 2022

Towards Comparative Evaluation of DDoS Defences.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

SoK: How Not to Architect Your Next-Generation TEE Malware?
Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, 2022

Threats to Journalists from the Consumer Internet of Things.
Proceedings of the International Conference on Cybersecurity, 2022

2021
CRC: Fully General Model of Confidential Remote Computing.
CoRR, 2021

Towards a framework for trustworthy data security level agreement in cloud procurement.
Comput. Secur., 2021

2020
Exploring HTTPS security inconsistencies: A cross-regional perspective.
Comput. Secur., 2020

Distributed Defence of Service (DiDoS): A Network-layer Reputation-based DDoS Mitigation Architecture.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks.
IEEE Trans. Smart Grid, 2019

Does "www." Mean Better Transport Layer Security?
IACR Cryptol. ePrint Arch., 2019

Towards Forward Secure Internet Traffic.
IACR Cryptol. ePrint Arch., 2019

Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves.
EURASIP J. Inf. Secur., 2019

StreamNet: A DAG System with Streaming Graph Computing.
CoRR, 2019

Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues.
IEEE Commun. Surv. Tutorials, 2019

CSCCRA: A Novel Quantitative Risk Assessment Model for SaaS Cloud Service Providers.
Comput., 2019

Cyber risk assessment in cloud provider environments: Current models and future needs.
Comput. Secur., 2019

Assessing the Security Risks of Multicloud SaaS Applications: A Real-World Case Study.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

2018
Cyber Supply Chain Risks in Cloud Computing - Bridging the Risk Assessment Gap.
Open J. Cloud Comput., 2018

CSCCRA: A Novel Quantitative Risk Assessment Model for Cloud Service Providers.
Proceedings of the Information Systems, 2018

2017
RepCloud: Attesting to Cloud Service Dependency.
IEEE Trans. Serv. Comput., 2017

The reviews and analysis of the state-of-the-art service workflow specification languages.
J. Ind. Inf. Integr., 2017

A framework for application partitioning using trusted execution environments.
Concurr. Comput. Pract. Exp., 2017

White-Stingray: Evaluating IMSI Catchers Detection Applications.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Architectures for Enhancing Authentication Privacy and Security using Trusted Computing.
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017

Investigating Security Capabilities in Service Level Agreements as Trust-Enhancing Instruments.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

Towards the Classification of Confidentiality Capabilities in Trustworthy Service Level Agreements.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

2016
Enabling Secure and Usable Mobile Application: Revealing the Nuts and Bolts of software TPM in todays Mobile Devices.
CoRR, 2016

Trustworthy and Secure Service-Oriented Architecture for the Internet of Things.
CoRR, 2016

Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Exploring the use of Intel SGX for Secure Many-Party Applications.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Analysis of Trusted Execution Environment usage in Samsung KNOX.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

Breaking Down the Monarchy: Achieving Trustworthy and Open Cloud Ecosystem Governance with Separation-of-Powers.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Developing a Trust Domain Taxonomy for Securely Sharing Information Among Others.
CoRR, 2015

On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Securing Application with Software Partitioning: A Case Study Using SGX.
Proceedings of the Security and Privacy in Communication Networks, 2015

Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

An evolutionary game-theoretic framework for cyber-threat information sharing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Security and Privacy in Smart Grid Demand Response Systems.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

KEDS: Decentralised Network Security for the Smart Home Environment.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Privacy-enhanced bi-directional communication in the Smart Grid using trusted computing.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Threat-Based Security Analysis for the Internet of Things.
Proceedings of the 2014 International Workshop on Secure Internet of Things, 2014

NeuronVisor: Defining a Fine-Grained Cloud Root-of-Trust.
Proceedings of the Trusted Systems - 6th International Conference, 2014

A Trust Domains Taxonomy for Securely Sharing Information: A Preliminary Investigation.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms.
Proceedings of the FM 2014: Formal Methods, 2014

2013
A taxonomy for securely sharing information among others in a trust domain.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2012
Using Propositional Logic for Requirements Verification of Service Workflow.
IEEE Trans. Ind. Informatics, 2012

SWSpec: The Requirements Specification Language in Service Workflow Environments.
IEEE Trans. Ind. Informatics, 2012

A Survey of Trust in Workflows and Relevant Contexts.
IEEE Commun. Surv. Tutorials, 2012

myTrustedCloud: trusted cloud infrastructure for security-critical computation and data management.
Proceedings of the 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture, 2012

Provenance-Based Model for Verifying Trust-Properties.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Provenance as a Security Control.
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012

Hardware Security for Device Authentication in the Smart Grid.
Proceedings of the Smart Grid Security - First International Workshop, 2012

TMR: Towards a Trusted MapReduce Infrastructure.
Proceedings of the Eighth IEEE World Congress on Services, 2012

On the Design and Development of webinos: A Distributed Mobile Application Middleware.
Proceedings of the Distributed Applications and Interoperable Systems, 2012

2011
Trustworthy Distributed Systems Through Integrity-Reporting.
Proceedings of the Guide to e-Science, Next Generation Scientific Research and Discovery, 2011

Trust in the Cloud.
Inf. Secur. Tech. Rep., 2011

Managing application whitelists in trusted distributed systems.
Future Gener. Comput. Syst., 2011

A multiple comparative study of test-with development product changes and their effects on team speed and product quality.
Empir. Softw. Eng., 2011

Secure Virtual Layer Management in Clouds.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Verifying Trustworthiness of Virtual Appliances in Collaborative Environments.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Insiders analysis in Cloud computing focusing on home healthcare system.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Formalizing Trust Requirements and Specification in Service Workflow Environments.
Proceedings of the ICEIS 2011, 2011

myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

RepCloud: achieving fine-grained cloud TCB attestation with reputation systems.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

Achieving attestation with less effort: an indirect and configurable approach to integrity reporting.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

2010
A verification system for interval-based specification languages.
ACM Trans. Softw. Eng. Methodol., 2010

Engineering Attestable Services.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Trusted Computing and Provenance: Better Together.
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010

An Abstract Model of a Trusted Platform.
Proceedings of the Trusted Systems - Second International Conference, 2010

Formal Trust Specification in Service Workflows.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Towards a Framework for Security in eScience.
Proceedings of the Sixth International Conference on e-Science, 2010

2009
Towards a Trustable Virtual Organisation.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

On the Feasibility of Remote Attestation for Web Services.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2007
Grid security: Next steps.
Inf. Secur. Tech. Rep., 2007

2006
Innovations for Grid Security from Trusted Computing.
Proceedings of the Security Protocols, 2006

ShibGrid: Shibboleth Access for the UK National Grid Service.
Proceedings of the Second International Conference on e-Science and Grid Technologies (e-Science 2006), 2006

Towards an open, trusted digital rights management platform.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

Towards a Secure, Tamper-Proof Grid Platform.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

2005
Editorial.
Softw. Pract. Exp., 2005

A Taxonomy of Web Services Using CSP.
Proceedings of the International Workshop on Web Languages and Formal Methods, 2005

Preface.
Proceedings of the International Workshop on Web Languages and Formal Methods, 2005

2004
Security Principles for Public-Resource Modeling Research.
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004

Teaching Formal Methods in Context.
Proceedings of the Teaching Formal Methods, CoLogNET/FME Symposium, 2004

2003
ZML: XML Support for Standard Z.
Proceedings of the ZB 2003: Formal Specification and Development in Z and B, 2003

On The Supervision and Assessment Of Part-Time Postgraduate Software Engineering Projects.
Proceedings of the 25th International Conference on Software Engineering, 2003

Generalising the Z Schema Calculus: Database Schemas and Beyond.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

2002
Climateprediction.net: Design Principles for Publicresource Modeling Research.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

e-Science Experiences: Software Engineering Practice and the EU DataGrid.
Proceedings of the 9th Asia-Pacific Software Engineering Conference (APSEC 2002), 2002

2001
Lifting in Z.
Proceedings of the Computing: The Australasian Theory Symposium, 2001

2000
A Calculus for Schemas in Z.
J. Symb. Comput., 2000

Relating Z and First-Order Logic.
Formal Aspects Comput., 2000

1998
A Set-Theoretic Model for Real-Time Specification and Reasoning.
Proceedings of the Mathematics of Program Construction, 1998

1997
<i>W</i> Reconstructed.
Proceedings of the ZUM '97: The Z Formal Specification Notation, 1997

The Cogito Development System.
Proceedings of the Algebraic Methodology and Software Technology, 1997

1996
A Tactic Calculus-Abridged Version.
Formal Aspects Comput., 1996

1993
Encoding W: A Logic for Z in 2OBJ.
Proceedings of the FME '93: Industrial-Strength Formal Methods, 1993


  Loading...