Trusted computing and provenance: Better together J Lyle, A Martin TaPP’10: 2nd Workshop on the Theory and Practice of Provenance, 2010 | 84 | 2010 |
Challenges for provenance in cloud computing IM Abbadi, J Lyle 3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP’11 …, 2011 | 64 | 2011 |
Here's Johnny: A Methodology for Developing Attacker Personas A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011 | 56 | 2011 |
The webinos project C Fuhrhop, J Lyle, S Faily Proceedings of the 21st international conference on World Wide Web, 259-262, 2012 | 42 | 2012 |
On the challenges of building a web-based ubiquitous application platform H Desruelle, J Lyle, S Isenberg, F Gielen Proceedings of the 2012 ACM conference on ubiquitous computing, 733-736, 2012 | 34 | 2012 |
Guidelines for integrating personas into software engineering tools S Faily, J Lyle Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013 | 32 | 2013 |
Cross-platform access control for mobile web applications J Lyle, S Monteleone, S Faily, D Patti, F Ricciato 2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012 | 31 | 2012 |
Trustworthy Services Through Attestation J Lyle | 31* | 2011 |
Requirements sensemaking using concept maps S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore Human-Centered Software Engineering: 4th International Conference, HCSE 2012 …, 2012 | 27 | 2012 |
Usability and security by design: a case study in research and development S Faily, J Lyle, I Fléchais, A Simpson Internet Society, 2015 | 24 | 2015 |
Managing application whitelists in trusted distributed systems JH Huh, J Lyle, C Namiluko, A Martin Future Generation Computer Systems 27 (2), 211-226, 2011 | 23* | 2011 |
Provenance as a security control A Martin, J Lyle, C Namilkuo Proceedings of the 4th USENIX conference on Theory and Practice of …, 2012 | 22 | 2012 |
Trustable remote verification of web services J Lyle International Conference on Trusted Computing, 153-168, 2009 | 22 | 2009 |
On the Design and Development of webinos: A Distributed Mobile Application Middleware J Lyle, S Faily, I Fléchais, A Paul, A Göker, H Myrhaug, H Desruelle, ... Distributed Applications and Interoperable Systems: 12th IFIP WG 6.1 …, 2012 | 17 | 2012 |
Model-driven architectural risk analysis using architectural and contextualised attack patterns S Faily, J Lyle, C Namiluko, A Atzeni, C Cameroni Proceedings of the Workshop on Model-Driven Security, 1-6, 2012 | 14 | 2012 |
Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project T Su, J Lyle, A Atzeni, S Faily, H Virji, C Ntanos, C Botsikas Hardware and Software: Verification and Testing: 9th International Haifa …, 2013 | 12 | 2013 |
Personal PKI for the Smart Device Era J Lyle, A Paverd, J King-Lacroix, A Atzeni, H Virji, I Flechais, S Faily Public Key Infrastructures, Services and Applications: 9th European Workshop …, 2013 | 12 | 2013 |
Trustworthy log reconciliation for distributed virtual organisations JH Huh, J Lyle TRUST, Lecture Notes in Computer Science, Springer, 169-182, 2009 | 9 | 2009 |
Multi-device application middleware: leveraging the ubiquity of the Web with webinos H Desruelle, S Isenberg, J Lyle, F Gielen The Journal of Supercomputing 66, 4-20, 2013 | 7 | 2013 |
Engineering attestable services J Lyle, A Martin Trust and Trustworthy Computing: Third International Conference, TRUST 2010 …, 2010 | 7 | 2010 |