Follow
John Lyle
John Lyle
Department of Computer Science, University of Oxford
Verified email at cs.ox.ac.uk - Homepage
Title
Cited by
Cited by
Year
Trusted computing and provenance: Better together
J Lyle, A Martin
TaPP’10: 2nd Workshop on the Theory and Practice of Provenance, 2010
792010
Challenges for provenance in cloud computing
IM Abbadi, J Lyle
3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP’11 …, 2011
642011
Here's Johnny: A Methodology for Developing Attacker Personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
522011
The webinos project
C Fuhrhop, J Lyle, S Faily
Proceedings of the 21st international conference on World Wide Web, 259-262, 2012
402012
On the challenges of building a web-based ubiquitous application platform
H Desruelle, J Lyle, S Isenberg, F Gielen
Proceedings of the 2012 ACM conference on ubiquitous computing, 733-736, 2012
342012
Cross-platform access control for mobile web applications
J Lyle, S Monteleone, S Faily, D Patti, F Ricciato
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
302012
Trustworthy Services Through Attestation
J Lyle
30*2011
Guidelines for integrating personas into software engineering tools
S Faily, J Lyle
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013
272013
Requirements sensemaking using concept maps
S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore
Human-Centered Software Engineering: 4th International Conference, HCSE 2012 …, 2012
262012
On the feasibility of remote attestation for web services
J Lyle, A Martin
2009 International Conference on Computational Science and Engineering 3 …, 2009
262009
Provenance as a security control
A Martin, J Lyle, C Namilkuo
Proceedings of the 4th USENIX conference on Theory and Practice of …, 2012
222012
Trustable remote verification of web services
J Lyle
International Conference on Trusted Computing, 153-168, 2009
222009
Usability and security by design: a case study in research and development
S Faily, J Lyle, I Fléchais, A Simpson
Internet Society, 2015
202015
On the Design and Development of webinos: A Distributed Mobile Application Middleware
J Lyle, S Faily, I Fléchais, A Paul, A Göker, H Myrhaug, H Desruelle, ...
Distributed Applications and Interoperable Systems: 12th IFIP WG 6.1 …, 2012
172012
Managing application whitelists in trusted distributed systems
JH Huh, J Lyle, C Namiluko, A Martin
Future Generation Computer Systems 27 (2), 211-226, 2011
17*2011
Model-driven architectural risk analysis using architectural and contextualised attack patterns
S Faily, J Lyle, C Namiluko, A Atzeni, C Cameroni
Proceedings of the Workshop on Model-Driven Security, 1-6, 2012
142012
Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project
T Su, J Lyle, A Atzeni, S Faily, H Virji, C Ntanos, C Botsikas
Hardware and Software: Verification and Testing: 9th International Haifa …, 2013
102013
Personal PKI for the Smart Device Era
J Lyle, A Paverd, J King-Lacroix, A Atzeni, H Virji, I Flechais, S Faily
Public Key Infrastructures, Services and Applications: 9th European Workshop …, 2013
102013
Trustworthy log reconciliation for distributed virtual organisations
JH Huh, J Lyle
TRUST, Lecture Notes in Computer Science, Springer, 169-182, 2009
92009
Engineering attestable services
J Lyle, A Martin
Trust and Trustworthy Computing: Third International Conference, TRUST 2010 …, 2010
72010
The system can't perform the operation now. Try again later.
Articles 1–20