2021
Temporal Reasoning Through Automatic Translation of tock-CSP into Timed Automata.
Proceedings of the Formal Methods: Foundations and Applications - 24th Brazilian Symposium, 2021
2016
Providing Extensibility to Threat Modelling in Cloud-COVER's Underlying Analysis Model.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
2015
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015
2014
On integrating confidentiality and functionality in a formal method.
Formal Aspects Comput., 2014
Extending Hypervisor Architecture to Allow One Way Data Transfers from VMs to Hypervisors.
Proceedings of the CLOSER 2014, 2014
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2014
2013
A comparison of major issues for the development of forensics in cloud computing.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
2011
Specifying Confidentiality in Circus.
Proceedings of the FM 2011: Formal Methods, 2011
2010
Defending the weakest link: phishing websites detection by analysing user behaviours.
Telecommun. Syst., 2010
Unifying Theories of Confidentiality.
Proceedings of the Unifying Theories of Programming - Third International Symposium, 2010
On Modelling User Observations in the UTP.
Proceedings of the Unifying Theories of Programming - Third International Symposium, 2010
Trace Specifications in Alloy.
Proceedings of the Abstract State Machines, 2010
2008
The certification of the Mondex electronic purse to ITSEC Level E6.
Formal Aspects Comput., 2008
User behaviour based phishing websites detection.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008
Threat Modelling in User Performed Authentication.
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Searching for resource-efficient programs: low-power pseudorandom number generators.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
2007
Coordination with multicapabilities.
Sci. Comput. Program., 2007
A CSP model of Eiffel's SCOOP.
Formal Aspects Comput., 2007
2006
Human competitive security protocols synthesis.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006
2005
The Design of S-Boxes by Simulated Annealing.
New Gener. Comput., 2005
Specifying Information-Flow Controls.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
2004
Synthesising Efficient and Effective Security Protocols.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004
Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion.
Comput. Intell., 2004
Automated Design of Security Protocols.
Comput. Intell., 2004
Searching for cost functions.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004
2003
Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It.
Proceedings of the Genetic and Evolutionary Computation, 2003
2002
Evolving Boolean Functions Satisfying Multiple Criteria.
Proceedings of the Progress in Cryptology, 2002
Fault Injection and a Timing Channel on an Analysis Technique.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
2001
Protocols are programs too: the meta-heuristic search for security protocols.
Inf. Softw. Technol., 2001
The role-based access control system of a European bank: a case study and discussion.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Hazard Analysis for Security Protocol Requirements.
Proceedings of the Advances in Network and Distributed Systems Security, 2001
2000
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
A Principled Semantics for inp.
Proceedings of the Coordination Languages and Models, 4th International Conference, 2000
Two-Stage Optimisation in the Design of Boolean Functions.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1998
A practical language and toolkit for high-integrity tools.
J. Syst. Softw., 1998
1995
Specifying Security for Computer Supported Collaborative Working.
J. Comput. Secur., 1995
On the Security of Recent Protocols.
Inf. Process. Lett., 1995
Specifying security for CSCW systems.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
1992
Basic Theorems About Security.
J. Comput. Secur., 1992
A Model of Reconfiguration in Communicating Sequential Processes with a Notion of Transactions.
Inf. Process. Lett., 1992
1991
A Uniform Presentation of Confidentiality Properties.
IEEE Trans. Software Eng., 1991
The Basic Integrity Theorem.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
1990
A Model of Reconfiguration in Communicating Sequential Processes.
Inf. Process. Lett., 1990
Separability and the Detection of Hidden Channels.
Inf. Process. Lett., 1990
Categorizing non-interference.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990
1989
On the Derivation of Secure Components.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989
1988
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988
Proceedings of the First IEEE Computer Security Foundations Workshop, 1988