The calculus of context-aware ambients F Siewe, H Zedan, A Cau Journal of Computer and System Sciences 77 (4), 597-620, 2011 | 137 | 2011 |
Augmenting semantic web service descriptions with compositional specification M Solanki, A Cau, H Zedan Proceedings of the 13th international conference on World Wide Web, 544-552, 2004 | 112 | 2004 |
The ITL homepage A Cau, B Moszkowski, H Zedan online.[Online]. Available: http://www. cse. dmu. ac. uk/STRL/ITL, 2005 | 84* | 2005 |
Refining interval temporal logic specifications A Cau, H Zedan Transformation-Based Reactive Systems Development: 4th International AMAST …, 1997 | 76 | 1997 |
A compositional framework for access control policies enforcement F Siewe, A Cau, H Zedan Proceedings of the 2003 ACM workshop on Formal methods in security …, 2003 | 70 | 2003 |
Runtime-monitoring for industrial control systems H Janicke, A Nicholson, S Webber, A Cau Electronics 4 (4), 995-1017, 2015 | 59 | 2015 |
Parallel composition of assumption-commitment specifications A Cau, P Collette Acta Informatica 33 (2), 153-176, 1996 | 46 | 1996 |
Dynamic access control policies: Specification and verification H Janicke, A Cau, F Siewe, H Zedan The Computer Journal 56 (4), 440-463, 2013 | 42 | 2013 |
On Unifying Assumption—Commitment Style Proof Rules for Concurrency Q Xu, A Cau, P Collette CONCUR’94: Concurrency Theory: 5th International Conference, Uppsala, Sweden …, 1994 | 38 | 1994 |
A note on the formalisation of UCON H Janicke, A Cau, H Zedan Proceedings of the 12th ACM symposium on Access control models and …, 2007 | 37 | 2007 |
Using ITL and Tempura for large-scale specification and simulation A Cau, H Zedan, N Coleman, B Moszkowski Proceedings of 4th Euromicro Workshop on Parallel and Distributed Processing …, 1996 | 36 | 1996 |
Verification and enforcement of access control policies A Cau, H Janicke, B Moszkowski Formal Methods in System Design 43, 450-492, 2013 | 31 | 2013 |
Asdl: A wide spectrum language for designing web services M Solanki, A Cau, H Zedan Proceedings of the 15th international conference on World Wide Web, 687-696, 2006 | 31 | 2006 |
Analysis and run-time verification of dynamic security policies H Janicke, F Siewe, K Jones, A Cau, H Zedan International Workshop on Defence Applications of Multi-Agent Systems, 92-103, 2005 | 30 | 2005 |
Concurrent enforcement of usage control policies H Janicke, A Cau, F Siewe, H Zedan 2008 IEEE Workshop on Policies for Distributed Systems and Networks, 111-118, 2008 | 28 | 2008 |
A compositional event & time-based policy model H Janicke, A Cau, F Siewe, H Zedan, K Jones Seventh IEEE International Workshop on Policies for Distributed Systems and …, 2006 | 25 | 2006 |
Position paper: Safety and security monitoring in ics/scada systems A Nicholson, H Janicke, A Cau 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 …, 2014 | 24 | 2014 |
Deriving enforcement mechanisms from policies H Janicke, A Cau, F Siewe, H Zedan Policies for Distributed Systems and Networks, 2007. POLICY'07. Eighth IEEE …, 2007 | 24 | 2007 |
Introducing compositionality in web service descriptions M Solanki, A Cau, H Zedan Proceedings. 10th IEEE International Workshop on Future Trends of …, 2004 | 20 | 2004 |
A framework for analysing the effect ofchange'in legacy code S Zhou, H Zedan, A Cau Software Maintenance, 1999.(ICSM'99) Proceedings. IEEE International …, 1999 | 20 | 1999 |