Andrew P. Martin
Orcid: 0000-0002-8236-980XAffiliations:
- University of Oxford, UK
- University of Queensland, Department of Computer Science
According to our database1,
Andrew P. Martin
authored at least 103 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cs.ox.ac.uk
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Frontiers Comput. Sci., 2024
How Memory-Safe is IoT? Assessing the Impact of Memory-Protection Solutions for Securing Wireless Gateways.
CoRR, 2024
Proceedings of the Information Security Education - Challenges in the Digital Age, 2024
2023
But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade Routers.
Proceedings of the 2023 European Symposium on Usable Security, 2023
2022
Cybersecurity service level agreements: understanding government data confidentiality requirements.
J. Cybersecur., 2022
Proceedings of the 15th International Conference on Security of Information and Networks, 2022
Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, 2022
Proceedings of the International Conference on Cybersecurity, 2022
2021
Towards a framework for trustworthy data security level agreement in cloud procurement.
Comput. Secur., 2021
2020
Comput. Secur., 2020
Distributed Defence of Service (DiDoS): A Network-layer Reputation-based DDoS Mitigation Architecture.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
2019
Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks.
IEEE Trans. Smart Grid, 2019
Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves.
EURASIP J. Inf. Secur., 2019
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues.
IEEE Commun. Surv. Tutorials, 2019
Comput., 2019
Cyber risk assessment in cloud provider environments: Current models and future needs.
Comput. Secur., 2019
Assessing the Security Risks of Multicloud SaaS Applications: A Real-World Case Study.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019
2018
Open J. Cloud Comput., 2018
Proceedings of the Information Systems, 2018
2017
The reviews and analysis of the state-of-the-art service workflow specification languages.
J. Ind. Inf. Integr., 2017
Concurr. Comput. Pract. Exp., 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Architectures for Enhancing Authentication Privacy and Security using Trusted Computing.
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017
Investigating Security Capabilities in Service Level Agreements as Trust-Enhancing Instruments.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017
Towards the Classification of Confidentiality Capabilities in Trustworthy Service Level Agreements.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017
2016
Enabling Secure and Usable Mobile Application: Revealing the Nuts and Bolts of software TPM in todays Mobile Devices.
CoRR, 2016
CoRR, 2016
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016
Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
Breaking Down the Monarchy: Achieving Trustworthy and Open Cloud Ecosystem Governance with Separation-of-Powers.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
CoRR, 2015
On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
Proceedings of the Smart Grid Security - Second International Workshop, 2014
Proceedings of the Smart Grid Security - Second International Workshop, 2014
Privacy-enhanced bi-directional communication in the Smart Grid using trusted computing.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Proceedings of the 2014 International Workshop on Secure Internet of Things, 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
A Trust Domains Taxonomy for Securely Sharing Information: A Preliminary Investigation.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms.
Proceedings of the FM 2014: Formal Methods, 2014
2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
2012
IEEE Trans. Ind. Informatics, 2012
IEEE Trans. Ind. Informatics, 2012
IEEE Commun. Surv. Tutorials, 2012
myTrustedCloud: trusted cloud infrastructure for security-critical computation and data management.
Proceedings of the 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture, 2012
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012
Proceedings of the Smart Grid Security - First International Workshop, 2012
Proceedings of the Eighth IEEE World Congress on Services, 2012
On the Design and Development of webinos: A Distributed Mobile Application Middleware.
Proceedings of the Distributed Applications and Interoperable Systems, 2012
2011
Proceedings of the Guide to e-Science, Next Generation Scientific Research and Discovery, 2011
Future Gener. Comput. Syst., 2011
A multiple comparative study of test-with development product changes and their effects on team speed and product quality.
Empir. Softw. Eng., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Formalizing Trust Requirements and Specification in Service Workflow Environments.
Proceedings of the ICEIS 2011, 2011
myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
Achieving attestation with less effort: an indirect and configurable approach to integrity reporting.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
2010
ACM Trans. Softw. Eng. Methodol., 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the Sixth International Conference on e-Science, 2010
2009
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2007
2006
Proceedings of the Security Protocols, 2006
Proceedings of the Second International Conference on e-Science and Grid Technologies (e-Science 2006), 2006
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006
2005
Proceedings of the International Workshop on Web Languages and Formal Methods, 2005
Proceedings of the International Workshop on Web Languages and Formal Methods, 2005
2004
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004
Proceedings of the Teaching Formal Methods, CoLogNET/FME Symposium, 2004
2003
Proceedings of the ZB 2003: Formal Specification and Development in Z and B, 2003
On The Supervision and Assessment Of Part-Time Postgraduate Software Engineering Projects.
Proceedings of the 25th International Conference on Software Engineering, 2003
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003
2002
Climateprediction.net: Design Principles for Publicresource Modeling Research.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002
Proceedings of the 9th Asia-Pacific Software Engineering Conference (APSEC 2002), 2002
2001
2000
1998
Proceedings of the Mathematics of Program Construction, 1998
1997
Proceedings of the ZUM '97: The Z Formal Specification Notation, 1997
Proceedings of the Algebraic Methodology and Software Technology, 1997
1996
1993
Proceedings of the FME '93: Industrial-Strength Formal Methods, 1993