John Lyle
According to our database1,
John Lyle
authored at least 24 papers
between 2009 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2014
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework.
Proceedings of the BCS-HCI 2014 Proceedings of the 28th International BCS Human Computer Interaction Conference, 2014
Proceedings of the Cyberpatterns, 2014
2013
Multi-device application middleware: leveraging the ubiquity of the Web with webinos.
J. Supercomput., 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project.
Proceedings of the Hardware and Software: Verification and Testing, 2013
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2013
2012
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012
Model-driven architectural risk analysis using architectural and contextualised attack patterns.
Proceedings of the Model-Driven Security Workshop, 2012
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012
Proceedings of the Human-Centered Software Engineering - 4th International Conference, 2012
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
On the Design and Development of webinos: A Distributed Mobile Application Middleware.
Proceedings of the Distributed Applications and Interoperable Systems, 2012
2011
Future Gener. Comput. Syst., 2011
Proceedings of the 3rd Workshop on the Theory and Practice of Provenance, 2011
Achieving attestation with less effort: an indirect and configurable approach to integrity reporting.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010
2009
Proceedings of the Trusted Computing, 2009
Proceedings of the Trusted Computing, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009