John Lyle
John Lyle
Department of Computer Science, University of Oxford
Verified email at cs.ox.ac.uk - Homepage
Title
Cited by
Cited by
Year
Trusted computing and provenance: Better together
J Lyle, A Martin
TaPP’10: 2nd Workshop on the Theory and Practice of Provenance, 2010
732010
Challenges for provenance in cloud computing
IM Abbadi, J Lyle
3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP’11 …, 2011
582011
The webinos project
C Fuhrhop, J Lyle, S Faily
Proceedings of the 21st international conference on World Wide Web, 259-262, 2012
392012
Here's Johnny: A Methodology for Developing Attacker Personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
362011
On the challenges of building a web-based ubiquitous application platform
H Desruelle, J Lyle, S Isenberg, F Gielen
Proceedings of the 2012 ACM conference on ubiquitous computing, 733-736, 2012
302012
Cross-platform access control for mobile web applications
J Lyle, S Monteleone, S Faily, D Patti, F Ricciato
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
272012
Trustworthy Services Through Attestation
J Lyle
24*2011
On the feasibility of remote attestation for web services
J Lyle, A Martin
2009 International Conference on Computational Science and Engineering 3 …, 2009
222009
Trustable remote verification of web services
J Lyle
International Conference on Trusted Computing, 153-168, 2009
222009
Guidelines for integrating personas into software engineering tools
S Faily, J Lyle
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013
212013
Provenance as a security control
A Martin, J Lyle, C Namilkuo
Proceedings of the 4th USENIX conference on Theory and Practice of …, 2012
202012
Requirements sensemaking using concept maps
S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore
International conference on human-centred software engineering, 217-232, 2012
192012
Usability and security by design: a case study in research and development
S Faily, J Lyle, A Simpson
Internet Society, 2015
172015
On the Design and Development of webinos: A Distributed Mobile Application Middleware
J Lyle, S Faily, I Fléchais, A Paul, A Göker, H Myrhaug, H Desruelle, ...
IFIP International Conference on Distributed Applications and Interoperable …, 2012
152012
Managing application whitelists in trusted distributed systems
JH Huh, J Lyle, C Namiluko, A Martin
Future Generation Computer Systems 27 (2), 211-226, 2011
14*2011
Model-driven architectural risk analysis using architectural and contextualised attack patterns
S Faily, J Lyle, C Namiluko, A Atzeni, C Cameroni
Proceedings of the Workshop on Model-Driven Security, 1-6, 2012
122012
Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project
T Su, J Lyle, A Atzeni, S Faily, H Virji, C Ntanos, C Botsikas
Haifa Verification Conference, 145-150, 2013
102013
Trustworthy log reconciliation for distributed virtual organisations
JH Huh, J Lyle
TRUST, Lecture Notes in Computer Science, Springer, 169-182, 2009
82009
Personal PKI for the Smart Device Era
J Lyle, A Paverd, J King-Lacroix, A Atzeni, H Virji, I Flechais, S Faily
European Public Key Infrastructure Workshop, 69-84, 2012
72012
Bridging the parallelization gap: Automating parallelism discovery and planning
S Garcia, D Jeon, C Louie, SK Venkata, MB Taylor
HotPar’10: Proceedings of the USENIX workshop on Hot Topics in Parallelism, 2010
72010
The system can't perform the operation now. Try again later.
Articles 1–20