2008 |
22 | EE | Jean Bacon,
David M. Eyers,
Jatinder Singh,
Peter R. Pietzuch:
Access control in publish/subscribe systems.
DEBS 2008: 23-34 |
21 | EE | David Evans,
David M. Eyers:
Deontic logic for modelling data flow and use compliance.
MPAC 2008: 19-24 |
20 | EE | Jatinder Singh,
David M. Eyers,
Jean Bacon:
Credential management in event-driven healthcare systems.
Middleware (Companion) 2008: 48-53 |
19 | EE | Jatinder Singh,
David M. Eyers,
Jean Bacon:
Controlling historical information dissemination in publish/subscribe.
Middleware Security 2008: 34-39 |
18 | EE | David M. Eyers,
Sriram Srinivasan,
Ken Moody,
Jean Bacon:
Compile-Time Enforcement of Dynamic Security Policies.
POLICY 2008: 119-126 |
2007 |
17 | EE | Lauri I. W. Pesonen,
David M. Eyers,
Jean Bacon:
Encryption-enforced access control in dynamic multi-domain publish/subscribe networks.
DEBS 2007: 104-115 |
16 | EE | Peter R. Pietzuch,
David M. Eyers,
Samuel Kounev,
Brian Shand:
Towards a common API for publish/subscribe.
DEBS 2007: 152-157 |
15 | EE | Lauri I. W. Pesonen,
David M. Eyers,
Jean Bacon:
Access Control in Decentralised Publish/Subscribe Systems.
JNW 2(2): 57-67 (2007) |
2006 |
14 | EE | Lauri I. W. Pesonen,
David M. Eyers,
Jean Bacon:
A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems.
SAINT 2006: 222-228 |
2005 |
13 | EE | Jean Bacon,
David M. Eyers,
Ken Moody,
Lauri I. W. Pesonen:
Securing Publish/Subscribe for Multi-domain Systems.
Middleware 2005: 1-20 |
2004 |
12 | EE | András Belokosztolszki,
Ken Moody,
David M. Eyers:
A Formal Model for Hierarchical Policy Contexts.
POLICY 2004: 127-136 |
11 | EE | Steve Neely,
Helen Lowe,
David M. Eyers,
Jean Bacon,
Julian Newman,
Xiaofeng Gong:
An architecture for supporting vicarious learning in a distributed environment.
SAC 2004: 963-970 |
10 | EE | Nathan Dimmock,
András Belokosztolszki,
David M. Eyers,
Jean Bacon,
Ken Moody:
Using trust and risk in role-based access control policies.
SACMAT 2004: 156-162 |
2003 |
9 | EE | David M. Eyers:
'Ambiguous Live' - Exploring Collaborative, Dynamic Control of MIDI Sequencers.
CMMR 2003: 54-63 |
8 | EE | András Belokosztolszki,
David M. Eyers,
Peter R. Pietzuch,
Jean Bacon,
Ken Moody:
Role-based access control for publish/subscribe middleware architectures.
DEBS 2003 |
7 | EE | David M. Eyers,
Ken Moody:
Credential negotiation with limited disclosure via iterative range refinement in an unordered space.
DEXA Workshops 2003: 427-431 |
6 | EE | András Belokosztolszki,
David M. Eyers,
Ken Moody:
Policy Contexts: Controlling Information Flow in Parameterised RBAC.
POLICY 2003: 99-110 |
5 | EE | András Belokosztolszki,
David M. Eyers,
Wei Wang,
Ken Moody:
Policy Storage for Role-Based Access Control Systems.
WETICE 2003: 196-201 |
2002 |
4 | EE | Alan S. Abrahams,
David M. Eyers,
Jean Bacon:
An asynchronous rule-based approach for business process automation using obligations.
ACM SIGPLAN Workshop on Rule-Based Programming 2002: 93-103 |
3 | EE | David M. Eyers,
John Shepherd,
Raymond K. Wong:
PoX: Merging Prolog and XML databases.
ADCS 2002 |
2 | | András Belokosztolszki,
David M. Eyers:
Shielding RBAC Infrastructures from Cyberterrorism.
DBSec 2002: 3-14 |
1 | EE | Alan S. Abrahams,
David M. Eyers,
Jean Bacon:
A Coverage-Determination Mechanism for Checking Business Contracts against Organizational Policies.
TES 2002: 97-106 |