Simon Shiu

According to our database1, Simon Shiu authored at least 26 papers between 1996 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Economic Methods and Decision Making by Security Professionals.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

Economic Methods and Decision Making by Security Professionals.
Proceedings of the Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, 2011

Migration to Cloud as Real Option: Investment Decision under Uncertainty.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Information Stewardship in Cloud Ecosystems: Towards Models, Economics, and Delivery.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Assurance for federated identity management.
J. Comput. Secur., 2010

Privacy Aware Access Controls for Medical Data Disclosure on European Healthgrids.
Proceedings of the Healthgrid Applications and Core Technologies, 2010

2009
Providing secure services for a virtual infrastructure.
ACM SIGOPS Oper. Syst. Rev., 2009

Using Modelling and Simulation for Policy Decision Support in Identity Management.
Proceedings of the POLICY 2009, 2009

Modelling and Enforcing Privacy for Medical Data Disclosure across Europe.
Proceedings of the Medical Informatics in a United and Healthy Europe - Proceedings of MIE 2009, The XXIInd International Congress of the European Federation for Medical Informatics, Sarajevo, Bosnia and Herzegovina, August 30, 2009

Ontology-Based Privacy Compliance on European Healthgrid Domains.
Proceedings of the Healthgrid Research, Innovation and Business Case - Proceedings of HealthGrid 2009, Berlin, Germany, 29 June, 2009

Using security metrics coupled with predictive modeling and simulation to assess security processes.
Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, 2009

Privacy compliance in european healthgrid domains: An ontology-based approach.
Proceedings of the Twenty-Second IEEE International Symposium on Computer-Based Medical Systems, 2009

2008
Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
On identity assurance in the presence of federated identity management systems.
Proceedings of the 2007 Workshop on Digital Identity Management, 2007

Model-based assurance of security controls.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

2005
Enabling shared audit data.
Int. J. Inf. Sec., 2005

Trust Record: High-Level Assurance and Compliance.
Proceedings of the Trust Management, Third International Conference, 2005

2003
Hardware Security Appliances for Trust.
Proceedings of the Trust Management, First International Conference, 2003

Hardware Encapsulation of Security Services.
Proceedings of the Computer Security, 2003

Towards Accountability for Electronic Patient Records.
Proceedings of the 16th IEEE Symposium on Computer-Based Medical Systems (CBMS 2003), 2003

2002
Encryption and Key management in a SAN.
Proceedings of the First International IEEE Security in Storage Workshop, 2002

Reducing Risks of Widespread Faults and Attacks for Commercial Software Applications: Towards Diversity of Software Components.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

Trust Services: A Framework for Service-Based Solutions.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

1996
Type theoretic semantics for semantic networks : an application to natural language engineering.
PhD thesis, 1996

Type Theoretic Semantics for SemNet.
Proceedings of the Practical Reasoning, 1996

Distributedness and Non-Linearity of LOLITA's Semantic Network.
Proceedings of the 16th International Conference on Computational Linguistics, 1996


  Loading...