Department of Computer Science and Technology

2003

@INPROCEEDINGS{2003-ICDCS-MCM,
  author = {Eiko Yoneki and Jean Bacon},
  title = {{Gateway: a Message Hub with Store-and-forward Messaging in Mobile Networks}},
  booktitle = {{Proc. 23rd IEEE International Conference on Distributed Computing Systems, Workshop on Mobile Computing Middleware (ICDCS - MCM03)}},
  year = 2003,
  month = {May},
  pages = {348-353},
  address = {Rhode Island},
  pdf = {papers/ey204/2003_ICDCS_MCM.pdf}
}
@INPROCEEDINGS{2003-DOA-WRSM,
  author = {Eiko Yoneki},
  title = {{Many Aspects of Reliabilities in a Distributed Mobile Messaging Middleware over JMS}},
  booktitle = {{International Symposium on Distributed Objects and Applications, Workshop on Reliable and Secure Middleware, LNCS 2889}},
  year = 2003,
  month = {November},
  pages = {934-949},
  address = {Catania, Italy},
  pdf = {papers/ey204/2003_DOA_WRSM.pdf}
}
@INPROCEEDINGS{2003-ASWN,
  author = {Eiko Yoneki},
  title = {{Mobile Applications with a Middleware System in Publish-Subscribe Paradigm}},
  booktitle = {{Proc. 3rd Workshop on Applications and Services in Wireless Networks}},
  year = 2003,
  month = {July},
  pages = {263-274},
  address = {Bern, Switzerland},
  pdf = {papers/ey204/2003_ASWN.pdf}
}
@INPROCEEDINGS{2003-MW-WIP,
  author = {Eiko Yoneki and Jean Bacon},
  title = {{Pronto: Mobile Gateway with Publish-Subscribe
                  Paradigm over Wireless Networks}},
  booktitle = {4th ACM/IFIP/USENIX International Conference on
                  Middleware (Middleware'03 - Work in Progress), Rio
                  de Janeiro, Brazil, June 2003, IEEE Distributed
                  Systems Online Vol.4 No.5, May 2003.},
  year = 2003,
  note = {(Full version: Technical Report UCAM-CL-TR559,
                  University of Cambridge,
                  2003. http://www.cl.cam.ac.uk/TechReports.)},
  pdf = {papers/ey204/2003_MW_WIP.pdf}
}
@ARTICLE{Bacon:03,
  author = {Jean Bacon and Ken Moody and Walt Yao},
  title = {Access control and trust in the use of widely
                  distributed services},
  journal = {Software - Practice and Experience},
  year = 2003,
  volume = 33,
  number = 4,
  pages = {375--394},
  month = APR
}
@INPROCEEDINGS{AM2003,
  author = {Alan S. Abrahams and Naila K. Mimouni},
  title = {Semi-Automated Analysis of Electronic Commerce
                  Application Specifications},
  booktitle = {{Proceedings of the 6th International Conference on
                  Electronic Commerce Research ({ICECR6})}},
  year = 2003,
  month = {October},
  pages = {245--256},
  address = {Dallas, Texas},
  volume = {},
  url = {papers/abrahams_mimouni_icecr6_paper.rtf},
  pdf = {papers/abrahams_mimouni_icecr6_paper.pdf},
  ps = {papers/abrahams_mimouni_icecr6_paper.ps}
}
@INPROCEEDINGS{Abrahams:2003,
  author = {Alan S. Abrahams and David M. Eyers and Jean
                  M. Bacon},
  title = {Compliance Checking for Regulated Communities},
  booktitle = {Proceedings of the 5th CaberNet Plenary Workshop},
  address = {Porto Santo, Madeira Archipelago, Portugal},
  year = 2003,
  month = NOV,
  url = {http://www.newcastle.research.ec.org/cabernet/workshops/plenary/5th-plenary-papers/abrahams_eyers_bacon_cabernet.pdf}
}
@INPROCEEDINGS{IngramITrust03,
  author = {D. Ingram},
  title = {Trust-based Filtering for Augmented Reality},
  booktitle = {Proceedings of the First International Conference on
                  Trust Management},
  year = 2003,
  month = {May},
  publisher = {Springer},
  series = {LNCS},
  volume = 2692,
  pages = {108--122},
  pdf = {http://www.srcf.ucam.org/~dmi1000/papers/augcity.pdf},
  ps = {http://www.srcf.ucam.org/~dmi1000/papers/augcity.ps}
}
@INPROCEEDINGS{TwiggITrust03a,
  author = {Andrew Twigg},
  title = {A Subjective Approach to Routing in P2P and Ad Hoc
Networks},
  booktitle = {Proceedings of the First International Conference on
                  Trust Management},
  year = 2003,
  month = {May},
  publisher = {Springer},
  series = {LNCS},
  pages = {225--238},
  volume = 2692
}
@INPROCEEDINGS{TwiggITrust03b,
  author = {Boris Dragovic and Steven Hand and Timothy L. Harris and
                  Evangelos Kotsovinos and Andrew Twigg},
  title = {Managing Trust and Reputation in the XenoServer Open
                  Platform},
  booktitle = {Proceedings of the First International Conference on
                  Trust Management},
  year = 2003,
  month = {May},
  publisher = {LNCS},
  pages = {59--74},
  volume = 2692
}
@INPROCEEDINGS{pietzuch:03,
  author = {Peter R. Pietzuch and Brian Shand and Jean Bacon},
  title = {{A Framework for Event Composition in Distributed
                  Systems}},
  booktitle = {Proc. of the 4th ACM/IFIP/USENIX Int. Conf. on
                  Middleware (Middleware '03)},
  year = 2003,
  address = {Rio de Janeiro, Brazil},
  editor = {M. Endler and D. Schmidt},
  publisher = {Springer},
  pages = {62--82},
  month = JUN,
  note = {Best paper award.},
  pdf = {papers/mw2003_ced_paper.pdf},
  ps = {papers/mw2003_ced_paper.ps}
}
@INPROCEEDINGS{pietzuch:03b,
  author = {Peter R. Pietzuch and Sumeer Bhola},
  title = {{Congestion Control in a Reliable Scalable
                  Message-Oriented Middleware}},
  booktitle = {Proc. of the 4th Int. Conf. on Middleware
                  (Middleware '03)},
  year = 2003,
  editor = {M. Endler and D. Schmidt},
  publisher = {Springer},
  pages = {202--221},
  address = {Rio de Janeiro, Brazil},
  month = JUN,
  pdf = {papers/mw2003_cc_gryphon.pdf}
}
@INPROCEEDINGS{bepbm03role,
  author = {Andr\'as Belokosztolszki and David M. Eyers and
                  Peter R. Pietzuch and Jean Bacon and Ken Moody},
  title = {Role-Based Access Control for Publish/Subscribe
                  Middleware Architectures},
  booktitle = {International Workshop on Distributed Event-Based
                  Systems (DEBS03)},
  series = {ACM SIGMOD},
  address = {San Diego, CA, USA},
  organization = {ACM},
  year = 2003,
  pdf = {papers/bepbm03role.pdf},
  ps = {papers/bepbm03role.ps}
}
@INPROCEEDINGS{belokosztolszki03policystorage,
  author = {Andr\'as Belokosztolszki and David M. Eyers and Wei Wang and Ken Moody},
  title = {Policy Storage for Role-Based Access Control Systems},
  booktitle = {Proceedings of the Twelvth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'03)},
  pages = {196--201},
  month = JUN,
  year = {2003},
  location = {Linz, Austria},
  pdf = {papers/bewm03policy.pdf},
  ps = {papers/bewm03policy.ps}
}
@INPROCEEDINGS{belokosztolszki03policy,
  author = {Andr\'as Belokosztolszki and David M. Eyers and Ken Moody},
  title = {Policy Contexts: Controlling Information Flow in Parameterised {RBAC}},
  booktitle = {Policy 2003: {IEEE} 4th {I}nternational {W}orkshop on {P}olicies
for {D}istributed {S}ystems and {N}etworks},
  month = JUN,
  year = 2003,
  pages = {99-110},
  location = {Como, Italy},
  pdf = {papers/bem-policy-2003.pdf},
  ps = {papers/bem-policy-2003.ps}
}
@INPROCEEDINGS{belokosztolszki03xml,
  author = {Andr\'as Belokosztolszki and Erich Schikuta},
  title = {An {XML} based framework for self-describing {I/O} data},
  booktitle = {Proceedings of the Eleventh Euromicro Conference on Parallel, Distributed and Network-Based Processing ({PDP} '03)},
  year = 2003,
  pages = {324-332},
  location = {Genoa, Italy},
  pdf = {papers/bs03pdp.pdf},
  ps = {papers/bs03pdp.ps}
}
@INPROCEEDINGS{belokosztolszki02shielding,
  author = {Andr\'as Belokosztolszki and David Eyers},
  title = {Shielding {RBAC} infrastructures from
                  cyberterrorism},
  booktitle = {Research Directions in Data and Applications
                  Security},
  pages = {3-14},
  year = 2003,
  volume = {256},
  series = {IFIP Information Processing},
  isbn = {1-4020-7541-3},
  publisher = {Kluwer Academic Publishers},
  editors = {E. Gudes and S. Shenoi},
  pdf = {papers/ifip02final.pdf},
  ps = {papers/ifip02final.ps}
}
@INPROCEEDINGS{Shan:2003,
  author = {Brian Shand and Nathan Dimmock and Jean Bacon},
  title = {Trust for Transparent, Ubiquitous Collaboration},
  booktitle = {First IEEE Annual Conference on Pervasive Computing
                  and Communications (PerCom 2003)},
  pages = {153--160},
  month = MAR,
  year = 2003,
  address = {Dallas-Ft.~Worth, TX, USA},
  pdf = {papers/percom03.pdf}
}
@INPROCEEDINGS{wetice:03,
  author = {Nathan Dimmock},
  title = {How much is 'enough'? {R}isk in Trust-based Access
                  Control},
  booktitle = {IEEE International Workshops on Enabling
                  Technologies: Infrastructure for Collaborative
                  Enterprises: Enterprise Security (Special Session on
                  Trust Management) },
  year = 2003,
  month = {June},
  pages = {281--282},
  ps = {papers/ned21-wetice03.ps.gz},
  pdf = {papers/ned21-wetice03.pdf}
}
@INPROCEEDINGS{Twigg_Comp_Trust:03,
  author = {Andrew Twigg and Nathan Dimmock},
  title = {Attack-Resistance of Computational Trust Models},
  booktitle = {IEEE International Workshops on Enabling
                  Technologies: Infrastructure for Collaborative
                  Enterprises(WETICE '03): Enterprise Security (Special Session on
                  Trust Management) },
  year = 2003,
  month = {June},
  pages = {275--280}
}
@INPROCEEDINGS{Kotsovinos:03,
  author = {Evangelos Kotsovinos and Boris Dragovic and Steven
                  Hand and Peter R. Pietzuch},
  title = {{XenoTrust: Event-Based Distributed Trust
                  Management}},
  booktitle = {Proceedings of Trust and Privacy in Digital Business
                  (TrustBus'03). In conjunction with the 14th
                  International Conference on Database and Expert
                  Systems Applications (DEXA'03)},
  year = 2003,
  address = {Prague, Czech Republic},
  month = SEP
}
@INPROCEEDINGS{Pietzuch:03c,
  author = {Peter R. Pietzuch and Jean Bacon},
  title = {{Peer-to-Peer Overlay Broker Networks in an
                  Event-Based Middleware}},
  booktitle = {Proceedings of the 2nd International Workshop on
                  Distributed Event-Based Systems (DEBS'03)},
  year = 2003,
  editor = {H. Arno Jacobsen},
  series = {ACM SIGMOD},
  address = {San Diego, USA},
  month = JUN,
  organization = {ACM}
}
@TECHREPORT{BS03,
  author = {G. M. Bierman and P. Sewell},
  title = {Iota: A concurrent {XML} scripting language with
                  applications to Home Area Networking},
  institution = {Computer Laboratory, University of Cambridge},
  year = 2003,
  number = 557,
  month = JAN,
  pdf = {32pp. http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-557.pdf}
}
@INPROCEEDINGS{BHSS03,
  author = {Gavin Bierman and Michael Hicks and Peter Sewell and
                  Gareth Stoyle},
  title = {Formalizing Dynamic Software Updating},
  booktitle = {Proceedings of USE 2003: the Second International
                  Workshop on Unanticipated Software Evolution},
  year = 2003,
  month = APR,
  url = {http://www.cl.cam.ac.uk/users/pes20/formalUpdate.ps}
}
@INPROCEEDINGS{BHSSW03,
  author = {Gavin Bierman and Michael Hicks and Peter Sewell and
                  Gareth Stoyle and Keith Wansbrough},
  title = {Dynamic Rebinding for Marshalling and Update, with
                  Destruct-time lambda},
  booktitle = {Proceedings of ICFP 2003},
  year = 2003,
  month = AUG
}
@INPROCEEDINGS{LPSW03,
  author = {James Leifer and Gilles Peskine and Peter Sewell and
                  Keith Wansbrough},
  title = {Global abstraction-safe marshalling with hash types},
  booktitle = {Proc. ICFP 2003},
  year = 2003,
  month = AUG,
  url = {http://www.cl.cam.ac.uk/users/pes20/hashtypes.ps}
}
@TECHREPORT{LPSW03-tr,
  author = {James Leifer and Gilles Peskine and Peter Sewell and
                  Keith Wansbrough},
  title = {Global abstraction-safe marshalling with hash types},
  institution = {University of Cambridge Computer Laboratory},
  year = 2003,
  number = {UCAM-CL-TR-569},
  month = JUN,
  note = {Also published as INRIA Rocquencourt report
                  RR-4851.},
  url = {http://www.cl.cam.ac.uk/users/pes20/hashtypes-tr-cam.pdf}
}
@INPROCEEDINGS{SN03,
  author = {Andrei Serjantov and Richard E. Newman},
  title = {On the Anonymity of Timed Pool Mixes},
  booktitle = {Security and Privacy in the Age of Uncertainty},
  pages = {427--434},
  year = 2003,
  address = {Athens, Greece},
  month = {May},
  publisher = {Kluwer},
  note = {(Workshop on Privacy and Anonymity Issues in
                  Networked and Distributed Systems)}
}
@INPROCEEDINGS{NMSS03,
  title = {Metrics for Traffic Analysis Prevention},
  author = {Richard E. Newman and Ira S. Moskowitz and Paul
                  Syverson and Andrei Serjantov},
  booktitle = {Proceedings of Privacy Enhancing Technologies
                  workshop (PET 2003)},
  year = 2003,
  month = {March},
  editor = {Roger Dingledine},
  publisher = {Springer-Verlag, LNCS 2760},
  ps = {http://www.cise.ufl.edu/~nemo/papers/PET2003.ps}
}
@INPROCEEDINGS{CS03,
  title = {Generalising Mixes},
  author = {Claudia Diaz and Andrei Serjantov},
  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2003)},
  year = {2003},
  month = {March},
  editor = {Roger Dingledine},
  publisher = {Springer-Verlag, LNCS 2760},
  url = {http://www.esat.kuleuven.ac.be/~cdiaz/DS03.ps.gz}
}
@INPROCEEDINGS{SS03,
  author = {Andrei Serjantov and Peter Sewell},
  title = {Passive Attack Analysis for Connection-Based
                  Anonymity Systems},
  booktitle = {Proc. ESORICS 2003},
  year = 2003,
  month = OCT
}
@INPROCEEDINGS{IFIP:03,
  author = {J. Bacon and  K. Moody and  D. Chadwick and O. Otenko},
  title = {Persistent versus dynamic role membership},
  booktitle = {17th IFIP WG3 Annual Working Conference on Data and Application Security },
  year = 2003,
  number = 17,
  month = AUG,
  organization = {IFIP},
  pages = {344--357},
  publisher = {Kluwer, 2004},
  address = {Estes park, Colorado, USA},
  ps = {papers/ifip11-3-03.ps},
  pdf = {papers/ifip11-3-03.pdf}
}

This file has been generated by bibtex2html 1.87.