Siani Pearson

Orcid: 0000-0003-3576-9402

Affiliations:
  • Just Algorithm Action Group
  • Hewlett Packard Enterprise Labs, Bristol, UK


According to our database1, Siani Pearson authored at least 85 papers between 1997 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Towards An Ethics-Audit Bot.
CoRR, 2021

Automation: An Essential Component Of Ethical AI?
CoRR, 2021

2020
Enhancing accountability in the cloud.
Int. J. Inf. Manag., 2020

2017
Strong Accountability and Its Contribution to Trustworthy Data Handling in the Information Society.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

2015
A4Cloud Workshop: Accountability in the Cloud.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

Enhanced Assurance About Cloud Service Provision Promises.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

A Technique for Enhanced Provision of Appropriate Access to Evidence Across Service Provision Chains.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

Towards a Formalised Representation for the Technical Enforcement of Privacy Level Agreements.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

A Data Protection Impact Assessment Methodology for Cloud.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

2014
Guest Editorial: Cloud Security.
IEEE Trans. Cloud Comput., 2014

Taking the Creative Commons beyond copyright: developing Smart Notices as user centric consent management systems for the cloud.
Int. J. Cloud Comput., 2014

A toolkit for automating compliance in cloud computing services.
Int. J. Cloud Comput., 2014

End-to-end policy based encryption techniques for multi-party data management.
Comput. Stand. Interfaces, 2014

Accountability, Risk, and Trust in Cloud Services: Towards an Accountability-Based Approach to Risk and Trust Governance.
Proceedings of the 2014 IEEE World Congress on Services, 2014

Accountability in Cloud Service Provision Ecosystems.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

Interoperability Analysis of Accountable Data Governance in the Cloud.
Proceedings of the Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, 2014

Towards Strong Accountability for Cloud Service Providers.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

COAT: Cloud Offerings Advisory Tool.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Accountability for Data Governance in the Cloud.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
An interdisciplinary approach to accountability for future internet service provision.
Int. J. Trust. Manag. Comput. Commun., 2013

Mechanisms for Protecting Sensitive Information in Cloud Computing.
Comput. Syst. Sci. Eng., 2013

Editorial.
Comput. Syst. Sci. Eng., 2013

Mapping legal requirements to IT controls.
Proceedings of the Sixth International Workshop on Requirements Engineering and Law, 2013

Privacy Management and Accountability in Global Organisations.
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013

On the Relationship between the Different Methods to Address Privacy Issues in the Cloud.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013

Privacy Risk, Security, Accountability in the Cloud.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

A Metamodel for Measuring Accountability Attributes in the Cloud.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Accountability for Data Governance in Cloud Ecosystems.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
Enhancing privacy in cloud computing via policy-based obfuscation.
J. Supercomput., 2012

Protecting Personal Information in Cloud Computing.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012, 2012

DOA-SVI 2012 PC Co-Chairs Message.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012, 2012

Privacy Management in Global Organisations.
Proceedings of the Communications and Multimedia Security, 2012

Accountability for cloud and other future Internet services.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

From Creative Commons to Smart Notices - Designing user Centric Consent Management Systems for the Cloud.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

Automating Compliance for Cloud Computing Services.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

Security and Privacy Governance in Cloud Computing via SLAs and a Policy Orchestration Service.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

2011
Privacy Assurance Checking.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Privacy Models and Languages: Assurance Checking Policies.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Human-Computer Interaction.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Introduction: Privacy, Trust, and Identity Management.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Security/Trustworthiness Assessment of Platforms.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Toward Accountability in the Cloud.
IEEE Internet Comput., 2011

Sticky Policies: An Approach for Managing Privacy across Multiple Parties.
Computer, 2011

Enhancing Accountability in the Cloud via Sticky Policies.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

TrustCloud: A Framework for Accountability and Trust in Cloud Computing.
Proceedings of the World Congress on Services, 2011

End-to-End Policy-Based Encryption and Management of Data in the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Towards Achieving Accountability, Auditability and Trust in Cloud Computing.
Proceedings of the Advances in Computing and Communications, 2011

2010
Context-Aware Privacy Design Pattern Selection.
Proceedings of the Trust, 2010

EnCoRe: Towards a Holistic Approach to Privacy.
Proceedings of the SECRYPT 2010, 2010

Analysis of Privacy Impact Assessments within Major jurisdictions.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

A Decision Support System for Design for Privacy.
Proceedings of the Privacy and Identity Management for Life, 2010

A Conceptual Model for Privacy Policies with Consent and Revocation Requirements.
Proceedings of the Privacy and Identity Management for Life, 2010

A Mechanism for Policy-Driven Selection of Service Providers in SOA and Cloud Environments.
Proceedings of the NOTERE 2010, Annual International Conference on New Technologies of Distributed Systems, Touzeur, Tunisia, May 31, 2010

Addressing Complexity in a Privacy Expert System.
Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications, 2010

A Privacy Impact Assessment Tool for Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

Privacy, Security and Trust Issues Arising from Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
A Model-Based Privacy Compliance Checker.
Int. J. E Bus. Res., 2009

Privacy Management for Global Organizations.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

Scalable, accountable privacy management for large organizations.
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009

A client-based privacy manager for cloud computing.
Proceedings of the 4th International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2009), 2009

A Privacy Manager for Cloud Computing.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

Accountability as a Way Forward for Privacy Protection in the Cloud.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

Data Protection-Aware Design for Cloud Services.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

2008
Securing Information Transfer in Distributed Computing Environments.
IEEE Secur. Priv., 2008

2007
Privacy Assurance: Bridging the Gap Between Preference and Practice.
Proceedings of the Trust, 2007

2006
A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

How ordinary internet users can have a chance to influence privacy policies.
Proceedings of the 4th Nordic Conference on Human-Computer Interaction 2006, Oslo, 2006

Provision of Trusted Identity Management Using Trust Credentials.
Proceedings of the Trust Management, 4th International Conference, 2006

Towards Automated Evaluation of Trust Constraints.
Proceedings of the Trust Management, 4th International Conference, 2006

2005
How Trusted Computers can Enhance for Privacy Preserving Mobile Applications.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

Position paper: Rule Language Requirement for Privacy-Enabled Identity Management.
Proceedings of the W3C Workshop on Rule Languages for Interoperability, 2005

An Adaptive Privacy Management System for Data Repositories.
Proceedings of the Trust, 2005

Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms.
Proceedings of the Trust Management, Third International Conference, 2005

Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy.
Proceedings of the Trust Management, Third International Conference, 2005

2003
Towards Accountable Management of Privacy and Identity Information.
Proceedings of the Computer Security, 2003

A Privacy-Enhanced Peer-to-Peer Reputation System.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
An Adaptive Choice of Messaging Protocol in Multi Agent Systems.
Proceedings of the Foundations and Applications of Multi-Agent Systems, 2002

A Trusted Method for Self-profiling in e-Commerce.
Proceedings of the Trust, 2002

2000
Computing Platform Security in Cyberspace.
Inf. Secur. Tech. Rep., 2000

On enhancing biometric authentication with data protection.
Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Information Engineering Systems & Allied Technologies, 2000

Securing Intelligent Adjuncts Using Trusted Computing Platform Technology.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1997
An Agent-Based Approach to Task Allocation in a Computer Support Team.
Proceedings of the Second International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, 1997


  Loading...