Robert John Walters

According to our database1, Robert John Walters authored at least 90 papers between 1998 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Fuzzy Logic with Expert Judgment to Implement an Adaptive Risk-Based Access Control Model for IoT.
Mob. Networks Appl., 2021

2019
Corrigendum to: "An exploratory study for investigating the critical success factors for cloud migration in the Saudi Arabian higher education context" [Telematics and Informatics, 34 (2017) 664-678].
Telematics Informatics, 2019

Corrigendum to: "A framework for critical security factors that influence the decision of cloud adoption by Saudi government agencies" [Telematics and Informatics, 34 (2017) 996-1010].
Telematics Informatics, 2019

Towards a framework for the successful implementation of a government cloud in Saudi Arabia.
Int. J. Bus. Process. Integr. Manag., 2019

A Security Framework to Protect Data in Cloud Storage.
Proceedings of the 4th International Conference on Internet of Things, 2019

2018
An empirical study of factors influencing cloud adoption among private sector organisations.
Telematics Informatics, 2018

How to Analyze Data from Unlisted but Rich Firms: From the Perspective of Data and Analysis.
IT Prof., 2018

A Multi-core architecture for a hybrid information system.
Comput. Electr. Eng., 2018

Fog Computing and the Internet of Things: A Review.
Big Data Cogn. Comput., 2018

XACML for Building Access Control Policies in Internet of Things.
Proceedings of the 3rd International Conference on Internet of Things, 2018

Internet of Nano Things: Security Issues and Applications.
Proceedings of the 2018 2nd International Conference on Cloud and Big Data Computing, 2018

Intelligence of Things: Opportunities & Challenges.
Proceedings of the 3rd Cloudification of the Internet of Things, 2018

2017
An exploratory study for investigating the critical success factors for cloud migration in the Saudi Arabian higher education context.
Telematics Informatics, 2017

A framework for critical security factors that influence the decision of cloud adoption by Saudi government agencies.
Telematics Informatics, 2017

A Framework for Cloud Forensic Readiness in Organizations.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

Developing an Adaptive Risk-Based Access Control Model for the Internet of Things.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Integration of Cloud Computing with Internet of Things: Challenges and Open Issues.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

A Proposed Best-practice Framework for Information Security Governance.
Proceedings of the 2nd International Conference on Internet of Things, 2017

An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things.
Proceedings of the 2nd International Conference on Internet of Things, 2017

An Integrated Model to Investigate an Individual's Behavioural Towards using Cloud Computing.
Proceedings of the 2nd International Conference on Internet of Things, 2017

Factors affecting the implementation of information assurance for eGovernment in Indonesia.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Clustering Goal-Driven Security Factors for Protecting Data in Cloud Storage using Exploratory Factor Analysis (EFA): An Empirical Study.
Proceedings of the CLOSER 2017, 2017

The Impact of Cloud Forensic Readiness on Security.
Proceedings of the CLOSER 2017, 2017

2016
Understanding the Impact of the Interconnection Network Performance of Multi-core Cluster Architectures.
J. Comput., 2016

Model and experimental development for Business Data Science.
Int. J. Inf. Manag., 2016

Web 2.0 - The past and the future.
Int. J. Inf. Manag., 2016

Organisational sustainability modelling - An emerging service and analytics model for evaluating Cloud Computing adoption with two case studies.
Int. J. Inf. Manag., 2016

Review of economic bubbles.
Int. J. Inf. Manag., 2016

Critical success factors (CSFs) for information technology governance (ITG).
Int. J. Inf. Manag., 2016

Editorial for FGCS special issue: Big Data in the cloud.
Future Gener. Comput. Syst., 2016

A Framework to Secure the Virtual Machine Image in Cloud Computing.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

A framework for cloud computing adoption by Saudi government overseas agencies.
Proceedings of the Fifth International Conference on Future Communication Technologies, 2016

Data security in cloud computing.
Proceedings of the Fifth International Conference on Future Communication Technologies, 2016

Goal-based security components for cloud storage security framework: a preliminary study.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

2015
An Analytical Model of Multi-Core Multi-Cluster Architecture (MCMCA).
Open J. Cloud Comput., 2015

Emerging Software as a Service and Analytics.
Open J. Cloud Comput., 2015

Epilogue: Summary and Outlook.
Open J. Big Data, 2015

Introductory Editorial.
Open J. Big Data, 2015

Monte Carlo simulation as a service in the Cloud.
Int. J. Bus. Process. Integr. Manag., 2015

Analysing threats in cloud storage.
Proceedings of the 2015 World Congress on Internet Security, 2015

Simulation and Mathematical Analysis of Multi-core Cluster Architecture.
Proceedings of the UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, 2015

Success Factors for the Implementation of a Private Government Cloud in Saudi Arabia.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Factors Affecting an Organisation's Decision to Adopt Cloud Services in Saudi Arabia.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Using Goal-Question-Metric (GQM) Approach to Assess Security in Cloud Storage.
Proceedings of the Enterprise Security - Second International Workshop, 2015

Security in Organisations: Governance, Risks and Vulnerabilities in Moving to the Cloud.
Proceedings of the Enterprise Security - Second International Workshop, 2015

Evaluation Metrics for VM Allocation Mechanisms in Desktop Clouds.
Proceedings of the ESaaSA 2015, 2015

Factors Influencing the Implementation of a Private Government Cloud in Saudi Arabia.
Proceedings of the ESaaSA 2015, 2015

Towards an Integrated Conceptual Model for Cloud Adoption in Saudi Arabia.
Proceedings of the ESaaSA 2015, 2015

An Overview of Cloud Services Adoption Challenges in Higher Education Institutions.
Proceedings of the ESaaSA 2015, 2015

2014
Evaluation of Node Failures in Cloud Computing Using Empirical Data.
Open J. Cloud Comput., 2014

Security Challenges in Cloud Storages.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Factors Influencing an Organisation's Intention to Adopt Cloud Computing in Saudi Arabia.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Performance Evaluation of Multi-Core Multi-Cluster Architecture (MCMCA).
Proceedings of the ESaaSA 2014, 2014

A View at Desktop Clouds.
Proceedings of the ESaaSA 2014, 2014

2013
The development that leads to the Cloud Computing Business Framework.
Int. J. Inf. Manag., 2013

2012
Business Integration as a Service.
Int. J. Cloud Appl. Comput., 2012

Building Computational Grids Using Ubiquitous Web Technologies.
Proceedings of the Collaborative Networks in the Internet of Services, 2012

Towards a Volunteer Cloud Architecture.
Proceedings of the Computer Performance Engineering - 9th European Workshop, 2012

Cloud Storage and Bioinformatics in a Private Cloud Deployment: Lessons for Data Intensive Research.
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012

Cloud Storage in a Private Cloud Deployment - Lessons for Data Intensive Research.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

2011
Case Studies and Organisational Sustainability Modelling Presented by Cloud Computing Business Framework.
Int. J. Web Serv. Res., 2011

The Financial Clouds Review.
Int. J. Cloud Appl. Comput., 2011

Organisational Sustainability Modelling for Return on Investment (ROI): Case Studies Presented by a National Health Service (NHS) Trust UK.
J. Comput. Inf. Technol., 2011

Towards Business Integration as a Service 2.0 (BIaaS 2.0).
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

2010
NPE A Conceptual Model and Language for the Representation of Norms.
Proceedings of the 10th International Conference on Quality Software, 2010

2009
Pragmatic web service design: An agile approach with the service responsibility and interaction design method.
Comput. Sci. Res. Dev., 2009

2008
An Inquiry-led Personalised Navigation System (IPNS) using multi-dimensional linkbases.
New Rev. Hypermedia Multim., 2008

Utilising Located Functions to Model and Optimise Distributed Computations.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Selecting a distributed agreement algorithm.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007


The Service Responsibility and Interaction Design Method: Using an Agile Approach for Web Service Design.
Proceedings of the Fifth IEEE European Conference on Web Services (ECOWS 2007), 2007

DataWarp: Empowering Applications to Make Progress in the Face of Contradictory or Inconsistent Data.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

An Improved Approach to Secure Authentication and Signing.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2005
Checking of models built using a graphically based formal modelling language.
J. Syst. Softw., 2005

Effects of introducing survival behaviours into automated negotiators specified in an environmental and behavioural framework.
J. Syst. Softw., 2005

Building Applications Able to Cope with Problematic Data Using a Datawarp Approach.
Proceedings of the ICEIS 2005, 2005

M-Grid: Using Ubiquitous Web Technologies to Create a Computational Grid.
Proceedings of the Advances in Grid Computing, 2005

2004
Information Invasion in Enterprise Systems: Modelling, Simulating and Analysing System-Level Information Propagation.
Proceedings of the ICEIS 2004, 2004

Implementing Hierarchical Features in a Graphically Based Formal Modelling Language.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2003
DataWarp: Building Applications Which Make Progress in an Inconsistent World.
Proceedings of the Distributed Applications and Interoperable Systems, 2003

Automating Checking of Models Built Using a Graphically Based Formal Modelling Language.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

Effects of Introducing Survival Behaviours into Automated Negotiators.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
A graphically based language for constructing, executing and analysing models of software systems.
PhD thesis, 2002

Comparison of Some Negotiation Algorithms Using a Tournament-Based Approach.
Proceedings of the Agent Technologies, 2002

A Graphically Based Language for Constructing, Executing and Analysing Models of Software Systems.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
A tool for evaluation of the software development process.
J. Syst. Softw., 2001

Behavioural analysis of component-based systems.
Inf. Softw. Technol., 2001

1999
System Design Validation Using Formal Models.
Proceedings of the Tenth IEEE International Workshop on Rapid System Prototyping (RSP 1999), 1999

Component-based Systems as an Aid to Design Validation.
Proceedings of the 14th IEEE International Conference on Automated Software Engineering, 1999

1998
RolEnact: role-based enactable models of business processes.
Inf. Softw. Technol., 1998


  Loading...