Naranker Dulay
Naranker Dulay
Reader in Computing, Imperial College London
Verified email at imperial.ac.uk
Title
Cited by
Cited by
Year
The ponder policy specification language
N Damianou, N Dulay, E Lupu, M Sloman
International Workshop on Policies for Distributed Systems and Networks, 18-38, 2001
18182001
Specifying distributed software architectures
J Magee, N Dulay, S Eisenbach, J Kramer
European Software Engineering Conference, 137-153, 1995
12521995
Regis: A constructive development environment for distributed programs
J Magee, N Dulay, J Kramer
Distributed Systems Engineering 1 (5), 304, 1994
425*1994
Shared and searchable encrypted data for untrusted servers
C Dong, G Russello, N Dulay
Journal of Computer Security 19 (3), 367-397, 2011
2522011
Ponder: A language for specifying security and management policies for distributed systems
N Damianou, N Dulay, EC Lupu, MS Sloman
Imperial College, Department of Computing, 2000
2412000
Structuring parallel and distributed programs
J Magee, N Dulay, J Kramer
Software Engineering Journal 8 (2), 73-82, 1993
2401993
The neurotrophins BDNF, NT‐3 and NT‐4/5, but not NGF, up‐regulate the cholinergic phenotype of developing motor neurons
V Wong, R Arriaga, NY Ip, RM Lindsay
European Journal of Neuroscience 5 (5), 466-474, 1993
2121993
A policy deployment model for the ponder language
N Dulay, E Lupu, M Sloman, N Damianou
2001 IEEE/IFIP International Symposium on Integrated Network Management …, 2001
1942001
Ponder2: A policy system for autonomous pervasive environments
K Twidle, N Dulay, E Lupu, M Sloman
2009 Fifth International Conference on Autonomic and Autonomous Systems, 330-335, 2009
1342009
Shared and searchable encrypted data for untrusted servers
C Dong, G Russello, N Dulay
IFIP Annual Conference on Data and Applications Security and Privacy, 127-143, 2008
1312008
AMUSE: autonomic management of ubiquitous e‐Health systems
E Lupu, N Dulay, M Sloman, J Sventek, S Heeps, S Strowes, K Twidle, ...
Concurrency and Computation: Practice and Experience 20 (3), 277-295, 2008
1292008
Tools for domain-based policy management of distributed systems
N Damianou, N Dulay, E Lupu, M Sloman, T Tonouchi
NOMS 2002. IEEE/IFIP Network Operations and Management Symposium.'Management …, 2002
1192002
Policy conflict analysis for quality of service management
M Charalambides, P Flegkas, G Pavlou, AK Bandara, EC Lupu, A Russo, ...
Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005
912005
Ponder2-a policy environment for autonomous pervasive systems
K Twidle, E Lupu, N Dulay, M Sloman
2008 IEEE Workshop on Policies for Distributed Systems and Networks, 245-246, 2008
882008
Configuring object-based distributed programs in REX
J Kramer, J Magee, M Sloman, N Dulay
Software Engineering Journal 7 (2), 139-149, 1992
861992
Authorisation and conflict resolution for hierarchical domains
G Russello, C Dong, N Dulay
Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007
822007
Ponder: A language for Specifying Security and Management Policies for Distributed Systems. The Language Specification Version 2.3
N Damianou, N Dulay, E Lupu, M Sloman
Research Report DoC 2000/1, 2000
782000
A survey of bots used for distributed denial of service attacks
VL Thing, M Sloman, N Dulay
IFIP International Information Security Conference, 229-240, 2007
702007
Putting pressure on elusive polymorphs and solvates
IDH Oswald, I Chataigner, S Elphick, FPA Fabbiani, AR Lennie, ...
CrystEngComm 11 (2), 359-366, 2009
62*2009
Rumpole: a flexible break-glass access control model
S Marinovic, R Craven, J Ma, N Dulay
Proceedings of the 16th ACM symposium on Access control models and …, 2011
612011
The system can't perform the operation now. Try again later.
Articles 1–20