| 2008 |
| 46 | EE | Luis Vargas,
Jean Bacon,
Ken Moody:
Event-Driven Database Information Sharing.
BNCOD 2008: 113-125 |
| 45 | EE | David M. Eyers,
Sriram Srinivasan,
Ken Moody,
Jean Bacon:
Compile-Time Enforcement of Dynamic Security Policies.
POLICY 2008: 119-126 |
| 44 | EE | Jatinder Singh,
Luis Vargas,
Jean Bacon,
Ken Moody:
Policy-Based Information Sharing in Publish/Subscribe Middleware.
POLICY 2008: 137-144 |
| 2007 |
| 43 | EE | Jatinder Singh,
Jean Bacon,
Ken Moody:
Dynamic trust domains for secure, private, technology-assisted living.
ARES 2007: 27-34 |
| 2006 |
| 42 | EE | Luis Vargas,
Jean Bacon,
Ken Moody:
Transactions in Distributed Event-Based Middleware.
CEC/EEE 2006: 53 |
| 2005 |
| 41 | EE | Luis Vargas,
Jean Bacon,
Ken Moody:
Integrating Databases with Publish/Subscribe.
ICDCS Workshops 2005: 392-397 |
| 40 | EE | Jean Bacon,
David M. Eyers,
Ken Moody,
Lauri I. W. Pesonen:
Securing Publish/Subscribe for Multi-domain Systems.
Middleware 2005: 1-20 |
| 39 | EE | Nathan Dimmock,
Jean Bacon,
David Ingram,
Ken Moody:
Risk Models for Trust-Based Access Control(TBAC).
iTrust 2005: 364-371 |
| 38 | EE | Daniel Cvrcek,
Ken Moody:
Combining Trust and Risk to Reduce the Cost of Attacks.
iTrust 2005: 372-383 |
| 2004 |
| 37 | EE | András Belokosztolszki,
Ken Moody,
David M. Eyers:
A Formal Model for Hierarchical Policy Contexts.
POLICY 2004: 127-136 |
| 36 | EE | Nathan Dimmock,
András Belokosztolszki,
David M. Eyers,
Jean Bacon,
Ken Moody:
Using trust and risk in role-based access control policies.
SACMAT 2004: 156-162 |
| 2003 |
| 35 | | Jean Bacon,
David W. Chadwick,
Alexander Otenko,
Ken Moody:
Persistent versus Dynamic Role Membership.
DBSec 2003: 344-357 |
| 34 | EE | András Belokosztolszki,
David M. Eyers,
Peter R. Pietzuch,
Jean Bacon,
Ken Moody:
Role-based access control for publish/subscribe middleware architectures.
DEBS 2003 |
| 33 | EE | David M. Eyers,
Ken Moody:
Credential negotiation with limited disclosure via iterative range refinement in an unordered space.
DEXA Workshops 2003: 427-431 |
| 32 | EE | Ken Moody,
Marco A. Palomino:
SharpSpider: Spidering the Web through Web Services.
LA-WEB 2003: 219-221 |
| 31 | EE | András Belokosztolszki,
David M. Eyers,
Ken Moody:
Policy Contexts: Controlling Information Flow in Parameterised RBAC.
POLICY 2003: 99-110 |
| 30 | EE | András Belokosztolszki,
David M. Eyers,
Wei Wang,
Ken Moody:
Policy Storage for Role-Based Access Control Systems.
WETICE 2003: 196-201 |
| 29 | | Jean Bacon,
Ken Moody,
Walt Yao:
Access control and trust in the use of widely distributed services.
Softw., Pract. Exper. 33(4): 375-394 (2003) |
| 2002 |
| 28 | EE | András Belokosztolszki,
Ken Moody:
Meta-Policies for Distributed Role-Based Access Control Systems.
POLICY 2002: 106-115 |
| 27 | EE | Jean Bacon,
Ken Moody,
Walt Yao:
A model of OASIS role-based access control and its support for active security.
ACM Trans. Inf. Syst. Secur. 5(4): 492-540 (2002) |
| 26 | EE | Jean Bacon,
Ken Moody:
Toward open, secure, widely distributed services.
Commun. ACM 45(6): 59-64 (2002) |
| 2001 |
| 25 | EE | Jean Bacon,
Ken Moody,
Walt Yao:
Access Control and Trust in the Use of Widely Distributed Services.
Middleware 2001: 295-310 |
| 24 | EE | Jean Bacon,
Michael Lloyd,
Ken Moody:
Translating Role-Based Access Control Policy within Context.
POLICY 2001: 107-119 |
| 23 | EE | Walt Yao,
Ken Moody,
Jean Bacon:
A model of OASIS role-based access control and its support for active security.
SACMAT 2001: 171-181 |
| 22 | | Agathoniki Trigoni,
Ken Moody:
Using Association Rules to Add or Eliminate Query Constraints Automatically.
SSDBM 2001: 124-133 |
| 2000 |
| 21 | | Ken Moody:
Coordinating Policy for Federated Applications.
DBSec 2000: 127-134 |
| 20 | EE | John H. Hine,
Walt Yao,
Jean Bacon,
Ken Moody:
An Architecture for Distributed OASIS Services.
Middleware 2000: 104-120 |
| 19 | EE | Jean Bacon,
Alexis Hombrecher,
Chaoying Ma,
Ken Moody,
Walt Yao:
Event Storage and Federation Using ODMG.
POS 2000: 265-281 |
| 18 | | Jean Bacon,
Ken Moody,
John Bates,
Richard Hayton,
Chaoying Ma,
Andrew McNeil,
Oliver Seidel,
Mark D. Spiteri:
Generic Support for Distributed Applications.
IEEE Computer 33(3): 68-76 (2000) |
| 1998 |
| 17 | EE | John Bates,
Jean Bacon,
Ken Moody,
Mark D. Spiteri:
Using events for the scalable federation of heterogeneous components.
ACM SIGOPS European Workshop 1998: 58-65 |
| 16 | EE | Richard Hayton,
Jean Bacon,
Ken Moody:
Access Control in an Open Distributed Environment.
IEEE Symposium on Security and Privacy 1998: 3-14 |
| 1997 |
| 15 | | Richard Hayton,
Ken Moody:
An Open Architecture for Secure Interworking Services.
ICDCS 1997: 0- |
| 14 | | Tim Mills,
Ken Moody,
Kerry Rodden:
Cobra: A new approach to IR System design.
RIAO 1997: 425-450 |
| 13 | EE | Tim Mills,
Ken Moody,
Kerry Rodden:
Providing World Wide Access to Historical Sources.
Computer Networks 29(8-13): 1317-1325 (1997) |
| 1996 |
| 12 | EE | Richard Hayton,
Ken Moody:
An open architecture for secure interworking services.
ACM SIGOPS European Workshop 1996: 233-240 |
| 11 | EE | Tim Mills,
Ken Moody:
Wide-area information access to multimedia historical sources.
ACM SIGOPS European Workshop 1996: 59-66 |
| 10 | EE | Richard Hayton,
Jean Bacon,
John Bates,
Ken Moody:
Using events to build large scale distributed applications.
ACM SIGOPS European Workshop 1996: 9-16 |
| 1995 |
| 9 | EE | Zhixue Wu,
Ken Moody,
Jean Bacon,
Robert J. Stroud:
Data consistency in a distributed persistent object system.
HICSS (2) 1995: 635-644 |
| 8 | EE | Zhixue Wu,
Robert J. Stroud,
Ken Moody,
Jean Bacon:
The design and implementation of a distributed transaction system based on atomic data types.
Distributed Systems Engineering 2(1): 50- (1995) |
| 1994 |
| 7 | | Jean Bacon,
Richard Hayton,
Sai Lai Lo,
Ken Moody:
Modular, Extensible Storage Services through Object Interfaces.
ACM SIGOPS European Workshop 1994: 141-146 |
| 6 | EE | Ken Moody:
Concurrency.
POS 1994: 127-128 |
| 5 | | Jean Bacon,
Richard Hayton,
Sai Lai Lo,
Ken Moody:
Extensible Access Control for a Hierarchy of Servers.
Operating Systems Review 28(3): 4-15 (1994) |
| 1991 |
| 4 | | Jean Bacon,
Ken Moody,
Sue Thomson,
Tim Wilson:
A Multi-Service Storage Architecture.
Operating Systems Review 25(4): 47-65 (1991) |
| 1988 |
| 3 | EE | Ken Moody:
Authentication in a distributed system during partition.
ACM SIGOPS European Workshop 1988 |
| 1983 |
| 2 | | T. J. King,
Ken Moody:
The Design and Implementation of CODD.
Softw., Pract. Exper. 13(1): 67-78 (1983) |
| 1980 |
| 1 | | Ken Moody,
Martin Richards:
A Coroutine Mechanism for BCPL.
Softw., Pract. Exper. 10(10): 765-771 (1980) |