Risk-based security decisions under uncertainty I Molloy, L Dickens, C Morisset, PC Cheng, J Lobo, A Russo Proceedings of the second ACM conference on Data and Application Security …, 2012 | 86 | 2012 |
PTaCL: A language for attribute-based access control in open systems J Crampton, C Morisset Principles of Security and Trust: First International Conference, POST 2012 …, 2012 | 80 | 2012 |
rCOS: Theory and tool for component-based model driven development Z Liu, C Morisset, V Stolz International Conference on Fundamentals of Software Engineering, 62-80, 2009 | 51 | 2009 |
Robustness testing for software components B Lei, X Li, Z Liu, C Morisset, V Stolz Science of Computer Programming 75 (10), 879-897, 2010 | 36 | 2010 |
State based robustness testing for components B Lei, Z Liu, C Morisset, X Li Electronic Notes in Theoretical Computer Science 260, 173-188, 2010 | 35 | 2010 |
Formalisation and implementation of access control models M Jaume, C Morisset International Conference on Information Technology: Coding and Computing …, 2005 | 34 | 2005 |
A formal approach to implement access control models M Jaume, C Morisset Journal of Information Assurance and Security 1 (2), 137-148, 2006 | 32 | 2006 |
Securing the electric vehicle charging infrastructure R Metere, M Neaimeh, C Morisset, C Maple, X Bellekens, RM Czekster arXiv preprint arXiv:2105.02905, 2021 | 31 | 2021 |
Design and verification of fault-tolerant components M Zhang, Z Liu, C Morisset, AP Ravn Methods, models and tools for fault tolerance, 57-84, 2009 | 31 | 2009 |
Quantitative workflow resiliency JC Mace, C Morisset, A Van Moorsel Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 29 | 2014 |
Modelling load-changing attacks in cyber-physical systems L Arnaboldi, RM Czekster, C Morisset, R Metere Electronic Notes in Theoretical Computer Science 353, 39-60, 2020 | 28 | 2020 |
An auto-delegation mechanism for access control systems J Crampton, C Morisset International Workshop on Security and Trust Management, 1-16, 2010 | 28 | 2010 |
Adversarial machine learning in network intrusion detection domain: A systematic review HA Alatwi, C Morisset arXiv preprint arXiv:2112.03315, 2021 | 25 | 2021 |
Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging I Yevseyeva, C Morisset, J Turland, L Coventry, T Groß, C Laing, ... Procedia Technology 16, 508-517, 2014 | 25 | 2014 |
Quantitative access control with partially-observable markov decision processes F Martinelli, C Morisset Proceedings of the second ACM conference on Data and Application Security …, 2012 | 24 | 2012 |
On missing attributes in access control: Non-deterministic and probabilistic attribute retrieval J Crampton, C Morisset, N Zannone Proceedings of the 20th ACM Symposium on Access Control Models and …, 2015 | 22 | 2015 |
Towards a formal specification of access control M Jaume, C Morisset Proceedings of the Joint Workshop on Foundations of Computer Security and …, 2006 | 22 | 2006 |
Formal definition and comparison of access control models L Habib, M Jaume, C Morisset Journal of information assurance and security (JIAS) 4 (4), 372-381, 2009 | 21 | 2009 |
From qualitative to quantitative enforcement of security policy F Martinelli, I Matteucci, C Morisset Computer Network Security: 6th International Conference on Mathematical …, 2012 | 19 | 2012 |
Cost-aware runtime enforcement of security policies P Drábik, F Martinelli, C Morisset International Workshop on Security and Trust Management, 1-16, 2012 | 18 | 2012 |