Michael Hitchens
Orcid: 0000-0001-6320-9184
According to our database1,
Michael Hitchens
authored at least 119 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Blockchain-Based Approach for Parametric Insurance Under Multiple Sources of Truth.
IEEE Trans. Serv. Comput., 2024
Poster: Zero Trust Driven Architecture for Blockchain-Based Access Control Delegation.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024
Experiential Learning or Direct Training: Fostering Ethical Cybersecurity Decision-Making via Serious Games.
Proceedings of the Persuasive Technology - 19th International Conference, 2024
2023
Comput. Networks, December, 2023
Entertain. Comput., August, 2023
A Blockchain-Based Interoperable Architecture for IoT with Selective Disclosure of Information.
Proceedings of the 28th IEEE Pacific Rim International Symposium on Dependable Computing, 2023
2022
Toward a Trust Aware Network Slice-Based Service Provision in Virtualized Infrastructures.
IEEE Trans. Netw. Serv. Manag., 2022
SDPM: A Secure Smart Device Provisioning and Monitoring Service Architecture for Smart Network Infrastructure.
IEEE Internet Things J., 2022
VeriBlock: A Blockchain-Based Verifiable Trust Management Architecture with Provable Interactions.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022
Proceedings of the Australasian Conference on Information Systems, 2022
2021
A Graph-Based Fault-Tolerant Approach to Modeling QoS for IoT-Based Surveillance Applications.
IEEE Internet Things J., 2021
Comput. Networks, 2021
QoS-Aware Energy Management and Node Scheduling Schemes for Sensor Network-Based Surveillance Applications.
IEEE Access, 2021
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021
2020
On the Design of a Flexible Delegation Model for the Internet of Things Using Blockchain.
IEEE Trans. Ind. Informatics, 2020
Sensors, 2020
On the Integration of Blockchain to the Internet of Things for Enabling Access Right Delegation.
IEEE Internet Things J., 2020
Towards a Trust Aware Network Slice based End to End Services for Virtualised Infrastructures.
CoRR, 2020
Design for Empowerment: Empowering Sri Lankan Farmers through Mobile-based Information System.
Commun. Assoc. Inf. Syst., 2020
Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure.
Proceedings of the NOMS 2020, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Policy-based access control for constrained healthcare resources in the context of the Internet of Things.
J. Netw. Comput. Appl., 2019
Design and implementation of a secure and flexible access-right delegation for resource constrained environments.
Future Gener. Comput. Syst., 2019
Proceedings of the 13th International Conference on Sensing Technology, 2019
Towards a method for creating personas with knowledge and cognitive process for user centered design of a learning application.
Proceedings of the 12th International Workshop on Cooperative and Human Aspects of Software Engineering, 2019
Teaching user centered conceptual design using cross-cultural personas and peer reviews for a large cohort of students.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering Education and Training, 2019
2018
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2018
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018
Proceedings of the Knowledge Management and Acquisition for Intelligent Systems, 2018
Proceedings of the 12th International Conference on Sensing Technology, 2018
Proceedings of the Australasian Computer Science Week Multiconference, 2018
2017
An empirical investigation of the influence of persona with personality traits on conceptual design.
J. Syst. Softw., 2017
On Design of A Fine-Grained Access Control Architecture for Securing IoT-Enabled Smart Healthcare Systems.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the Eleventh International Conference on Sensing Technology, 2017
Proceedings of the Advances in Computer Entertainment Technology, 2017
2016
Comput. Hum. Behav., 2016
Predicting player churn in destiny: A Hidden Markov models approach to predicting player departure in a major online game.
Proceedings of the IEEE Conference on Computational Intelligence and Games, 2016
2015
Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage.
IEEE Trans. Inf. Forensics Secur., 2015
Provenance Based Classification Access Policy System Based on Encrypted Search for Cloud Data Storage.
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Secure administration of cryptographic role-based access control for large-scale cloud storage systems.
J. Comput. Syst. Sci., 2014
Games Cult., 2014
Cultivation Planning Application to Enhance Decision Making among Sri Lankan Farmers.
Proceedings of the Knowledge Management and Acquisition for Smart Systems and Services, 2014
Proceedings of the 2014 Conference on Interactive Entertainment, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the SECRYPT 2013, 2013
Evaluating the Impact of the Human-Agent Teamwork Communication Model (HAT-CoM) on the Development of a Shared Mental Model.
Proceedings of the PRIMA 2013: Principles and Practice of Multi-Agent Systems, 2013
Proceedings of the 9th Australasian Conference on Interactive Entertainment, 2013
A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013
2012
A flexible cryptographic approach for secure data storage in the cloud using role-based access control.
Int. J. Cloud Comput., 2012
Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 8th Australasian Conference on Interactive Entertainment, 2012
Proceedings of the 8th Australasian Conference on Interactive Entertainment, 2012
An investigation of Vladimir Propp's 31 functions and 8 broad character types and how they apply to the analysis of video games.
Proceedings of the 8th Australasian Conference on Interactive Entertainment, 2012
2011
Comput. J., 2011
2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
2009
Game Time: Modeling and Analyzing Time in Multiplayer and Massively Multiplayer Games.
Games Cult., 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009
Proceedings of the 2009 DiGRA International Conference: Breaking New Ground: Innovation in Games, 2009
Proceedings of the 2009 DiGRA International Conference: Breaking New Ground: Innovation in Games, 2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009
Proceedings of the Intelligent Narrative Technologies II, 2009
Proceedings of the Intelligent Narrative Technologies II, 2009
2008
Character play: the use of game characters in multi-player role-playing games across platforms.
Comput. Entertain., 2008
Proceedings of the 2nd International Conference on INtelligent TEchnologies for interactive enterTAINment, 2008
Proceedings of the Interactive Storytelling, 2008
Proceedings of the 2008 Conference on Future Play: Research, Play, Share, 2008
On the Applicability of Trusted Computing in Distributed Authorization Using Web Services.
Proceedings of the Data and Applications Security XXII, 2008
2007
Group play: determining factors on the gaming experience in multiplayer role-playing games.
Comput. Entertain., 2007
Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007
Proceedings of the 2007 DiGRA International Conference: Situated Play, 2007
Proceedings of the 2007 DiGRA International Conference: Situated Play, 2007
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007
2006
Live Action Role-Playing Games: Control, Communication, Storytelling, and MMORPG Similarities.
Games Cult., 2006
Proceedings of the Technologies for Interactive Digital Storytelling and Entertainment, 2006
Proceedings of the Technologies for Interactive Digital Storytelling and Entertainment, 2006
2005
Int. J. Web Serv. Res., 2005
Architectural Framework for Web Services Authorization.
Proceedings of the Web Services and Model-Driven Enterprise Information Services, 2005
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005
Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture.
Proceedings of The 2005 International Symposium on Web Services and Applications, 2005
Proceedings of the International Conference on Pervasive Services 2005, 2005
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
2004
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004
Securing the Ad-Hoc On-demand Distance Vector Protocol.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004
2003
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
2002
Secure Multicast Support for Mobile IP with Hierarchical Registration Approach.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002
Security Policy Management in Distributed Systems.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
ACM SIGOPS Oper. Syst. Rev., 2001
Proceedings of the Policies for Distributed Systems and Networks, 2001
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
2000
IEE Proc. Softw., 2000
Elements of a Language for Role-Based Access Control.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1999
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1997
Proceedings of the TOOLS 1997: 24th International Conference on Technology of Object-Oriented Languages and Systems, 1997
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
1994
Proceedings of the IEEE Computer Society 1994 International Conference on Computer Languages, 1994
1993
Linguistic Support for Persistent Modules and Capabilities.
Proceedings of the Database Programming Languages (DBPL-4), Proceedings of the Fourth International Workshop on Database Programming Languages - Object Models and Languages, Manhattan, New York City, USA, 30 August, 1993