Computer Laboratory

2003

 
Alan S. Abrahams, David M. Eyers, and Jean M. Bacon. Compliance checking for regulated communities. In Proceedings of the 5th CaberNet Plenary Workshop, Porto Santo, Madeira Archipelago, Portugal, November 2003. [ bib | .pdf ]
 
Alan S. Abrahams and Naila K. Mimouni. Semi-automated analysis of electronic commerce application specifications. In Proceedings of the 6th International Conference on Electronic Commerce Research (ICECR6), pages 245-256, Dallas, Texas, October 2003. [ bib | .rtf | .ps | .pdf ]
 
J. Bacon, K. Moody, D. Chadwick, and O. Otenko. Persistent versus dynamic role membership. In 17th IFIP WG3 Annual Working Conference on Data and Application Security, number 17, pages 344-357, Estes park, Colorado, USA, August 2003. IFIP, Kluwer, 2004. [ bib | .ps | .pdf ]
 
Jean Bacon, Ken Moody, and Walt Yao. Access control and trust in the use of widely distributed services. Software - Practice and Experience, 33(4):375-394, April 2003. [ bib ]
 
András Belokosztolszki and David Eyers. Shielding RBAC infrastructures from cyberterrorism. In Research Directions in Data and Applications Security, volume 256 of IFIP Information Processing, pages 3-14. Kluwer Academic Publishers, 2003. [ bib | .ps | .pdf ]
 
András Belokosztolszki, David M. Eyers, and Ken Moody. Policy contexts: Controlling information flow in parameterised RBAC. In Policy 2003: IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pages 99-110, June 2003. [ bib | .ps | .pdf ]
 
András Belokosztolszki, David M. Eyers, Peter R. Pietzuch, Jean Bacon, and Ken Moody. Role-based access control for publish/subscribe middleware architectures. In International Workshop on Distributed Event-Based Systems (DEBS03), ACM SIGMOD, San Diego, CA, USA, 2003. ACM. [ bib | .ps | .pdf ]
 
András Belokosztolszki, David M. Eyers, Wei Wang, and Ken Moody. Policy storage for role-based access control systems. In Proceedings of the Twelvth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'03), pages 196-201, June 2003. [ bib | .ps | .pdf ]
 
András Belokosztolszki and Erich Schikuta. An XML based framework for self-describing I/O data. In Proceedings of the Eleventh Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP '03), pages 324-332, 2003. [ bib | .ps | .pdf ]
 
G. M. Bierman and P. Sewell. Iota: A concurrent XML scripting language with applications to home area networking. Technical Report 557, Computer Laboratory, University of Cambridge, January 2003. [ bib | .pdf ]
 
Gavin Bierman, Michael Hicks, Peter Sewell, and Gareth Stoyle. Formalizing dynamic software updating. In Proceedings of USE 2003: the Second International Workshop on Unanticipated Software Evolution, April 2003. [ bib | .ps ]
 
Gavin Bierman, Michael Hicks, Peter Sewell, Gareth Stoyle, and Keith Wansbrough. Dynamic rebinding for marshalling and update, with destruct-time lambda. In Proceedings of ICFP 2003, August 2003. [ bib ]
 
Claudia Diaz and Andrei Serjantov. Generalising mixes. In Roger Dingledine, editor, Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760, March 2003. [ bib | .ps.gz ]
 
Nathan Dimmock. How much is 'enough'? Risk in trust-based access control. In IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises: Enterprise Security (Special Session on Trust Management), pages 281-282, June 2003. [ bib | .ps.gz | .pdf ]
 
Boris Dragovic, Steven Hand, Timothy L. Harris, Evangelos Kotsovinos, and Andrew Twigg. Managing trust and reputation in the xenoserver open platform. In Proceedings of the First International Conference on Trust Management, volume 2692, pages 59-74. LNCS, May 2003. [ bib ]
 
D. Ingram. Trust-based filtering for augmented reality. In Proceedings of the First International Conference on Trust Management, volume 2692 of LNCS, pages 108-122. Springer, May 2003. [ bib | .ps | .pdf ]
 
Evangelos Kotsovinos, Boris Dragovic, Steven Hand, and Peter R. Pietzuch. XenoTrust: Event-Based Distributed Trust Management. In Proceedings of Trust and Privacy in Digital Business (TrustBus'03). In conjunction with the 14th International Conference on Database and Expert Systems Applications (DEXA'03), Prague, Czech Republic, September 2003. [ bib ]
 
James Leifer, Gilles Peskine, Peter Sewell, and Keith Wansbrough. Global abstraction-safe marshalling with hash types. In Proc. ICFP 2003, August 2003. [ bib | .ps ]
 
James Leifer, Gilles Peskine, Peter Sewell, and Keith Wansbrough. Global abstraction-safe marshalling with hash types. Technical Report UCAM-CL-TR-569, University of Cambridge Computer Laboratory, June 2003. Also published as INRIA Rocquencourt report RR-4851. [ bib | .pdf ]
 
Richard E. Newman, Ira S. Moskowitz, Paul Syverson, and Andrei Serjantov. Metrics for traffic analysis prevention. In Roger Dingledine, editor, Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760, March 2003. [ bib | .ps ]
 
Peter R. Pietzuch and Jean Bacon. Peer-to-Peer Overlay Broker Networks in an Event-Based Middleware. In H. Arno Jacobsen, editor, Proceedings of the 2nd International Workshop on Distributed Event-Based Systems (DEBS'03), ACM SIGMOD, San Diego, USA, June 2003. ACM. [ bib ]
 
Peter R. Pietzuch and Sumeer Bhola. Congestion Control in a Reliable Scalable Message-Oriented Middleware. In M. Endler and D. Schmidt, editors, Proc. of the 4th Int. Conf. on Middleware (Middleware '03), pages 202-221, Rio de Janeiro, Brazil, June 2003. Springer. [ bib | .pdf ]
 
Peter R. Pietzuch, Brian Shand, and Jean Bacon. A Framework for Event Composition in Distributed Systems. In M. Endler and D. Schmidt, editors, Proc. of the 4th ACM/IFIP/USENIX Int. Conf. on Middleware (Middleware '03), pages 62-82, Rio de Janeiro, Brazil, June 2003. Springer. Best paper award. [ bib | .ps | .pdf ]
 
Andrei Serjantov and Richard E. Newman. On the anonymity of timed pool mixes. In Security and Privacy in the Age of Uncertainty, pages 427-434, Athens, Greece, May 2003. Kluwer. (Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems). [ bib ]
 
Andrei Serjantov and Peter Sewell. Passive attack analysis for connection-based anonymity systems. In Proc. ESORICS 2003, October 2003. [ bib ]
 
Brian Shand, Nathan Dimmock, and Jean Bacon. Trust for transparent, ubiquitous collaboration. In First IEEE Annual Conference on Pervasive Computing and Communications (PerCom 2003), pages 153-160, Dallas-Ft. Worth, TX, USA, March 2003. [ bib | .pdf ]
 
Andrew Twigg. A subjective approach to routing in p2p and ad hoc networks. In Proceedings of the First International Conference on Trust Management, volume 2692 of LNCS, pages 225-238. Springer, May 2003. [ bib ]
 
Andrew Twigg and Nathan Dimmock. Attack-resistance of computational trust models. In IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises(WETICE '03): Enterprise Security (Special Session on Trust Management), pages 275-280, June 2003. [ bib ]
 
Eiko Yoneki. Many Aspects of Reliabilities in a Distributed Mobile Messaging Middleware over JMS. In International Symposium on Distributed Objects and Applications, Workshop on Reliable and Secure Middleware, LNCS 2889, pages 934-949, Catania, Italy, November 2003. [ bib | .pdf ]
 
Eiko Yoneki. Mobile Applications with a Middleware System in Publish-Subscribe Paradigm. In Proc. 3rd Workshop on Applications and Services in Wireless Networks, pages 263-274, Bern, Switzerland, July 2003. [ bib | .pdf ]
 
Eiko Yoneki and Jean Bacon. Gateway: a Message Hub with Store-and-forward Messaging in Mobile Networks. In Proc. 23rd IEEE International Conference on Distributed Computing Systems, Workshop on Mobile Computing Middleware (ICDCS - MCM03), pages 348-353, Rhode Island, May 2003. [ bib | .pdf ]
 
Eiko Yoneki and Jean Bacon. Pronto: Mobile Gateway with Publish-Subscribe Paradigm over Wireless Networks. In 4th ACM/IFIP/USENIX International Conference on Middleware (Middleware'03 - Work in Progress), Rio de Janeiro, Brazil, June 2003, IEEE Distributed Systems Online Vol.4 No.5, May 2003., 2003. (Full version: Technical Report UCAM-CL-TR559, University of Cambridge, 2003. http://www.cl.cam.ac.uk/TechReports.). [ bib | .pdf ]

This file has been generated by bibtex2html 1.87.