2006 |
11 | EE | Wenjun Hu,
Miguel Castro,
Jon Crowcroft,
Greg O'Shea,
Antony I. T. Rowstron:
Network coding with traffic engineering.
CoNEXT 2006: 40 |
10 | EE | Matthew Caesar,
Miguel Castro,
Edmund B. Nightingale,
Greg O'Shea,
Antony I. T. Rowstron:
Virtual ring routing: network routing inspired by DHTs.
SIGCOMM 2006: 351-362 |
2005 |
9 | EE | Karthikeyan Bhargavan,
Cédric Fournet,
Andrew D. Gordon,
Greg O'Shea:
An advisor for web services security policies.
SWS 2005: 1-9 |
2001 |
8 | EE | Joe Finney,
Greg O'Shea:
Mobile 4-in-6: A Novel Mechanism for IPv4/v6 Transitioning.
IDMS 2001: 205-212 |
7 | EE | Jason Crampton,
George Loizou,
Greg O'Shea:
A Logic of Access Control.
Comput. J. 44(1): 54-66 (2001) |
6 | EE | Jason Crampton,
George Loizou,
Greg O'Shea:
A Logic of Access Control.
Comput. J. 44(2): 137-149 (2001) |
5 | EE | Greg O'Shea,
Michael Roe:
Child-proof authentication for MIPv6 (CAM).
Computer Communication Review 31(2): 4-8 (2001) |
1995 |
4 | EE | Greg O'Shea:
Redundant access rights.
Computers & Security 14(4): 323-348 (1995) |
1994 |
3 | | Greg O'Shea:
On the Specification, Validation and Verification of Security in Access Control Systems.
Comput. J. 37(5): 437-448 (1994) |
1992 |
2 | | Greg O'Shea:
Redundant Rights in Protection Systems.
Operating Systems Review 26(3): 27-30 (1992) |
1988 |
1 | | Greg O'Shea:
Controlling the Dependency of User Access Control Mechanisms on Correctness of User Identification.
Comput. J. 31(6): 503-509 (1988) |