default search action
John Lyle
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [c20]Shamal Faily, John Lyle, Ivan Flechais, Andrea S. Atzeni, Cesare Cameroni, Hans I. Myrhaug, Ayse Göker, Robert Kleinfeld:
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework. BCS HCI 2014 - [p1]Shamal Faily, Simon Parkin, John Lyle:
Evaluating the Implications of Attack and Security Patterns with Premortems. Cyberpatterns 2014: 199-209 - 2013
- [j2]Heiko Desruelle, Simon Isenberg, John Lyle, Frank Gielen:
Multi-device application middleware: leveraging the ubiquity of the Web with webinos. J. Supercomput. 66(1): 4-20 (2013) - [c19]Shamal Faily, John Lyle:
Guidelines for integrating personas into software engineering tools. EICS 2013: 69-74 - [c18]Tao Su, John Lyle, Andrea S. Atzeni, Shamal Faily, Habib Virji, Christos Ntanos, Christos Botsikas:
Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project. Haifa Verification Conference 2013: 145-150 - [c17]John Lyle, Claes Nilsson, Anders Isberg, Shamal Faily:
Extending the web to support personal network services. SAC 2013: 711-716 - [e1]John Lyle, Shamal Faily, Marcel Winandy:
Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), Co-located with the 6th International Conference on Trust and Trustworthy Computing (TRUST 2013), London, United Kingdom, June 20, 2013. CEUR Workshop Proceedings 1011, CEUR-WS.org 2013 [contents] - 2012
- [c16]John Lyle, Shamal Faily, Ivan Flechais, André Paul, Ayse Göker, Hans I. Myrhaug, Heiko Desruelle, Andrew P. Martin:
On the Design and Development of webinos: A Distributed Mobile Application Middleware. DAIS 2012: 140-147 - [c15]John Lyle, Andrew J. Paverd, Justin King-Lacroix, Andrea S. Atzeni, Habib Virji, Ivan Flechais, Shamal Faily:
Personal PKI for the Smart Device Era. EuroPKI 2012: 69-84 - [c14]Shamal Faily, John Lyle, André Paul, Andrea S. Atzeni, Dieter Blomme, Heiko Desruelle, Krishna Bangalore:
Requirements Sensemaking Using Concept Maps. HCSE 2012: 217-232 - [c13]Heiko Desruelle, John Lyle, Simon Isenberg, Frank Gielen:
On the challenges of building a web-based ubiquitous application platform. UbiComp 2012: 733-736 - [c12]Shamal Faily, John Lyle, Cornelius Namiluko, Andrea S. Atzeni, Cesare Cameroni:
Model-driven architectural risk analysis using architectural and contextualised attack patterns. MDsec@MoDELS 2012: 3 - [c11]John Lyle, Salvatore Monteleone, Shamal Faily, Davide Patti, Fabio Ricciato:
Cross-Platform Access Control for Mobile Web Applications. POLICY 2012: 37-44 - [c10]Andrew P. Martin, John Lyle, Cornelius Namiluko:
Provenance as a Security Control. TaPP 2012 - [c9]Christian Fuhrhop, John Lyle, Shamal Faily:
The webinos project. WWW (Companion Volume) 2012: 259-262 - 2011
- [b1]John Lyle:
Trustworthy services through attestation. University of Oxford, UK, 2011 - [j1]Jun Ho Huh, John Lyle, Cornelius Namiluko, Andrew P. Martin:
Managing application whitelists in trusted distributed systems. Future Gener. Comput. Syst. 27(2): 211-226 (2011) - [c8]Andrea S. Atzeni, Cesare Cameroni, Shamal Faily, John Lyle, Ivan Flechais:
Here's Johnny: A Methodology for Developing Attacker Personas. ARES 2011: 722-727 - [c7]Jun Ho Huh, Hyoungshick Kim, John Lyle, Andrew P. Martin:
Achieving attestation with less effort: an indirect and configurable approach to integrity reporting. STC@CCS 2011: 31-36 - [c6]Imad M. Abbadi, John Lyle:
Challenges for Provenance in Cloud Computing. TaPP 2011 - 2010
- [c5]John Lyle, Andrew P. Martin:
Trusted Computing and Provenance: Better Together. TaPP 2010 - [c4]John Lyle, Andrew P. Martin:
Engineering Attestable Services. TRUST 2010: 257-264
2000 – 2009
- 2009
- [c3]John Lyle, Andrew P. Martin:
On the Feasibility of Remote Attestation for Web Services. CSE (3) 2009: 283-288 - [c2]John Lyle:
Trustable Remote Verification of Web Services. TRUST 2009: 153-168 - [c1]Jun Ho Huh, John Lyle:
Trustworthy Log Reconciliation for Distributed Virtual Organisations. TRUST 2009: 169-182
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint