Security, Privacy, Trust

Integrating Privacy and Safety Criteria into Planning Tasks,
Lavygina A, Russo A, Dulay N
Security and Trust Management, Springer, Sept 2015, Pages: 20-36

Rumpole – An Introspective Break-glass Access Control Language,
Marinovic S, Dulay N, Sloman M,
ACM Transactions on Information and System Security (TISSEC), 2014

Shared and searchable encrypted data for untrusted servers,
Dong C, Russello G, Dulay N,
Journal of Computer Security, 2011, Vol:19, ISSN:0926-227X, Pages:367-397
|  DOI

Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications,
Dong C, Dulay N,
5th IFIP International Conference on Trust Management, 2011, Springer, Pages:133-148
|  DOI  |  Publisher Web Link

Rumpole: a flexible break-glass access control model,
Marinovic S, Craven R, Ma J, Dulay N,
16th ACM Symposium on Access Control Models and Technologies (SACMAT), 2011, ACM, New York, NY, USA, Pages:73-82
|  DOI  |  Publisher Web Link

Support Tasks for Pervasive Workflows,
Marinovic S, Unger T, Dulay N, Leymann F,
Unpublished, 2011
|  Author Web Link

Teleo-Reactive policies for managing human-centric pervasive services,
Marinovic S, Twidle K P, Dulay N, Sloman M,
6th IEEE Int. Conference on Network and Service Management, 2010 IEEE, Pages:80-87
|  DOI  |  Publisher Web Link  |  Open Access Link

An Architectural Framework for Analyzing Tradeoffs between Software Security and Performance,
Cortellessa V, Trubiani C, Mostarda L, Dulay N,
1st International Symposium on Architecting Critical Systems (ISARCS), 2010. Springer, Pages:1-18
|  DOI  |  Publisher Web Link

Coordinating Data Usage Control in Loosely-Connected Networks,
Russello G, Scalavino E, Dulay N, Lupu E,
2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2010, IEEE Computer Society, Pages:30-39
|  DOI  |  Publisher Web Link

Providing data confidentiality against malicious hosts in Shared Data Spaces,
Russello G, Dong C, Dulay N, Chaudron M, Van Steen M,
Science of Computer Programming, 2010, Vol:75, ISSN:0167-6423, Pages:426 – 439
|  DOI  |  Publisher Web Link

Shinren: Non-monotonic Trust Management for Distributed Systems,
Dong C, Dulay N,
4th IFIP WG 11 11 International Conference on Trust Management, Springer-Verlag Berlin, Pages:125-140, ISSN:1868-4238
|  DOI  |  Publisher Web Link

Teleo-Reactive Policies in Ponder2,
Twidle K, Marinovic S, Dulay N,
2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), IEEE Computer Society, Pages:57-60
|  DOI  |  Publisher Web Link

Teleo-Reactive workflows for pervasive healthcare,
Marinovic S, Twidle K, Dulay N,
2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 2010, IEEE, Pages:316-321
|  DOI  |  Publisher Web Link

Context-based Authentication and Transport of Cultural Assets,
Mostarda L, Dong C, Dulay N,
Personal and Ubiquitous Computing, 2009, Vol:14, 1617-4909, Pages:-
|  DOI  |  Author Web Link

Locating Network Domain Entry and Exit point/path for DDoS Attack Traffic,
Thing V, Sloman M, Dulay N,
IEEE Transactions on Network and Service Management, 2009, Vol:6, ISSN:1932-4537, Pages:163-174
|  DOI  |  Author Web Link  |  Open Access Link

Policy Conflict Analysis for DiffServ Quality of Service Management,
Charalambides M, Flegkas P, Pavlou G, Rubio-Loyola J, Bandara A, Lupu E, Russo A, Dulay N, Sloman M,
IEEE Transactions on Network and Service Management, 2009, Vol:6, 1932-4537, Pages:-
|  DOI  |  Author Web Link

Policies for Self Tuning Home Networks,
Pediaditakis D, Mostarda L, Dong C, Dulay N,
IEEE International Symposium on Policies for Distributed Systems and Networks, 2009, IEEE, Pages:-
|  DOI  | Publisher Web Link

xDUCON: Cross Domain Usage Control through Shared Data Spaces,
Russello G, Dulay N,
IEEE Intl Symposium on Policies for Distributed Systems and Networks, 2009, IEEE Computer Society, Pages:-
|  DOI  |  Publisher Web Link

xDUCON: Coordinating Usage Control Policies in Distributed Domains,
Russello G, Dulay N,
IEEE Computer Society, Pages:246-253
|  DOI  |  Publisher Web Link

Adaptive response system for distributed denial-of-service attacks,
Thing V, Sloman M, Dulay N,
IFIP/IEEE International Symposium on Integrated Network Management (IM), 2009, IEEE, Pages:809-814
|  DOI  |  Publisher Web Link  |  Open Access Link

An Architectural Approach for Self-Managing Security Services,
Russello G, Dulay N,
23rd International Conference on Advanced Information Networking and Applications, 2009, IEEE, Pages:153-158
|  DOI  |  Publisher Web Link

Ponder2: A Policy System for Autonomous Pervasive Environments,
Twidle K, Lupu E, Sloman M, Dulay N,
The Fifth International Conference on Autonomic and Autonomous Systems, 2009. IEEE, Pages:-
|  DOI  |  Publisher Web Link  |  Open Access Link

A Policy Based Management Architecture for Mobile Collaborative Teams,
Asmare E, Gopalan A, Sloman M, Dulay N, Lupu E,
2009 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2009, IEEE Computer Society, Pages:169-174
|  DOI  |  Publisher Web Link  |  Open Access Link

A Framework for Capturing Patient Consent in Pervasive Healthcare Applications.
Russello G , Dong C, Dulay, N,
In P. Olla, & J. Tan (Eds.) Mobile Health Solutions for Biomedical Applications, 2009, Hershey, PA: Medical Information Science Reference. Pages 245-259
|  DOI

An Efficient Policy System for Body Sensor Networks,
Zhu Y, Keoh S L, Sloman M, Lupu E, Dulay N, Pryce N,
14th IEEE International Conference on Parallel and Distributed Systems (ICPADS’08), 2008, IEEE, Pages:383-390
|  DOI  |  Publisher Web Link  |  Open Access Link

A Consent-based Workflow System for Healthcare Systems,
Russello G, Dong C, Dulay N,
Policies for Distributed Systems and Networks (Policy), 2008

Secure Distributed Self Management Framework for UXVs,
Dulay N, Sloman M, Lupu E, Asmare E, Gopalan A,
Systems Engineering for Autonomous Systems Defence Technology Centre Conference, 2008
|  Author Web Link  | Open Access Link

A Workflow-based Access Control Framework for e-Health Applications,
Russello G, Dong C, Dulay N,
22nd International Workshops on Advanced Information Networking and Applications, 2008, IEEE, Pages:111-120
|  DOI  |  Publisher Web Link

A Policy System to Support Adaptability and Security on Body Sensors,
Zhu Y, Keoh S L, Sloman M, Lupu E, Dulay N, Pryce N,
5th International Summer School and Symposium on Medical Devices and Biosensors, 2008, IEEE, Pages:97-100
|  DOI  |  Publisher Web Link  |  Open Access Link

Consent-based workflows for healthcare management,
Russello G, Dong C, Dulay N,
IEEE International Workshop on Policies for Distributed Systems and Networks, 2008, IEEE COMPUTER SOC, Pages:153-161
|  DOI  |  Publisher Web Link

Encrypted Shared Data Spaces,
Russello G, Dong C, Dulay N, Chaudron M, van Steen M,
10th International Conference on Coordination Models and Languages (COORDINATION), 2008, Springer-Verlag Berlin, Pages:264-279, ISSN:0302-9743
|  DOI  |  Publisher Web Link

ESCAPE: A Component-Based Policy Framework for Sense and React Applications,
Russello G, Mostarda L, Dulay N,
11th International Symposium on Component-Based Software Engineering, 2008, SPRINGER-VERLAG BERLIN, Pages:212-229, ISSN:0302-9743
|  DOI  |  Publisher Web Link

Finger: An Efficient Policy System for Body Sensor Networks,
Zhu Y, Keoh S  L, Sloman M, Lupu E, Zhang Y, Dulay N, Pryce N,
5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2008, IEEE, Pages:428-433
|  DOI  | Publisher Web Link  |  Open Access Link

Flexible Resolution of Authorisation Conflicts in Distributed Systems,
Dong C, Russello G, Dulay N,
19th IFIP/IEEE International Workshop on Distributed Systems, Operations and Management (DSOM), 2008, Springer-Verlag, Pages:95-108, ISSN:0302-9743
|  DOI  |  Publisher Web Link

Network domain entrypoint/path determination for DDoS attacks,
Thing V, Sloman M, Dulay N,
IEEE Network Operations and Management Symposium (NOMS), 2008, IEEE, Pages:57-64, 1542-1201
|  DOI  |  Publisher Web Link  |  Open Access Link

Place and time authentication of cultural assets,
Mostarda L, Dong C, Dulay N,
IFIPTM 2008/Joint iTrust and PST Conference on Privacy, Trust Management and Security, 2008, Springer, Pages:279-294, ISSN:1868-4238
|  DOI  |  Author Web Link

Ponder2 – A policy environment for autonomous pervasive systems,
Twidle K, Lupu E, Dulay N, Sloman M,
IEEE International Workshop on Policies for Distributed Systems and Networks, 2008, IEEE COMPUTER SOC, Pages:245-246
|  DOI  |  Publisher Web Link  |  Open Access Link

Shared and searchable encrypted data for untrusted servers,
Dong C, Russello G, Dulay N,
22nd Annual Conference on Data and Applications Security, 2008, Springer-Verlag Berlin Pages:127-143, ISSN:0302-9743
|  DOI  |  Publisher Web Link

Policy Based Management,
Bandara A, Damianou N, Lupu E, Sloman M, Dulay N,
Handbook of Network and System Administration, 2007, Editor(s): Burgess, Bergstra, Elsevier, ISBN:978-0-444-52198-9
|  Author Web Link

Enhanced TCP SYN Attack Detection,
Thing V, Sloman M, Dulay N,
IEEE Workshop on Monitoring Attack Detection and Mitigation (MonAM), 2007
|  Author Web Link  |  Open Access Link

Authorisation and conflict resolution for hierarchical domains,
Russello G, Dong C, Dulay N,
8th IEEE International Workshop on Policies for Distributed Systems and Networks, 2007, IEEE, Pages:201-210
|  DOI  |  Publisher Web Link

Enforcing Fine-grained Authorization Policies for Java Mobile Agents,
Russello G, Dong C, Dulay N,
Security in Networks and Distributed Systems, 2007, IEEE Computer Society, Pages:-
|  DOI  |  Publisher Web Link

Non-intrusive IP Traceback for DDoS Attacks,
Thing V, Sloman M, Dulay N,
ACM Symposium on Information, Computer and Communications Security, 2007, Singapore, ACM, Pages:371-373
|  DOI  |  Publisher Web Link  |  Open Access Link

A survey of bots used for distributed denial of service attacks,
Thing V, Sloman M, Dulay N,
22nd International Information Security Conference,  2007, Springer, Pages:229-240, ISSN:1571-5736
|  DOI  |  Publisher Web Link  |  Open Access Link

Autonomous pervasive systems and the policy challenges of a small world!,
Lupu E, Dulay N, Sventek J, Sloman M,
8th IEEE International Workshop on Policies for Distributed Systems and Networks, 2007, IEEE, Pages:3-7
|  DOI  |  Publisher Web Link

Policy-based management for body-sensor networks,
Keoh S L, Twidle K, Pryce N, Schaeffer A, Lupu E, Dulay N, Sloman M, Heeps S, Strowes S, Sventek J, Katsiri E,
4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN), 2007, Springer, Pages:92-98, 1680-0737
|  DOI  |  Publisher Web Link  |  Open Access Link

Privacy-preserving credential verification for non-monotonic trust management systems,
Dong C, Russello G, Dulay N,
4th Intl Conf on Mathematical Methods, Models and Architectures for Computer Network Security, 2007, Springer, Pages:171-186, ISSN:1865-0929
|  DOI  |  Author Web Link

Secure dynamic community establishment in coalitions,
Asmare E, Dulay N, Lupu E, Sloman M, Calo S, Lobo J,
IEEE Military Communications Conference (MILCOM), 2007, IEEE, Pages:3105-3111, 2155-7578
|  Author Web Link  |  Open Access Link

Trust transfer in distributed systems,
Dong C, Russello G, Dulay N ,
Joint iTrust and PST Conference on Privacy, Trust Management and Security, 2007, SPRINGER, Pages:17-29, 1571-5736
|  Author Web Link

Policy Refinement for DiffServ Quality of Service Management,
Bandara A , Lupu EC , Russo A , Dulay N , Sloman M , Flegkas P , Charalambides M , Pavlou G,
IEEE Transactions on Network and Service Management, 2006, Vol:3, 1932-4537, Pages:2-13
|  DOI  |  Author Web Link  | Publisher Web Link

Privacy Preserving Trust Negotiation for Pervasive Healthcare,
Dong C, Dulay N,
Pervasive Computing Technologies for Healthcare, 2006

An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health,
Strowes S, Badr N, Dulay N, Heeps S , Lupu E , Sloman M, Sventek J,
Intl. Workshop on Distributed Event-Based Systems (DEBS), 2006
Author Web Link

Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management,
Charalambides M , Flegkas P , Pavlou G , Bandara A , Dulay N , Lupu E , Rubio-Loyola J , Russo A , Sloman M,
IFIP/IEEE Network Operations and Management Symposium (NOMS), 2006, IEEE Computer Society, Pages:-, 1542-1201
|  DOI  |  Publisher Web Link  |  Author Web Link

Combined Hardware-Software Architecture for Network Flow,
Luk W , Yusuf S , Sloman M , Brown A , Lupu C , Dulay N,
Intl Conf on Engineering of Reconfigurable Systems and Algorithms (ERSA), 2005, Pages:149-155
|  Author Web Link  |  Publisher Web Link

Policy conflict analysis for quality of service management,
Charalambides M, Flegkas P, Pavlou G, Bandara A, Lupu E, Russo A, Dulay N, Sloman M, Rubio-Loyola J,
6th IEEE International Workshop on Policies for Distributed Systems and Networks, 2005, IEEE, Pages:99-108
|  DOI  |  Publisher Web Link  |  Author Web Link

Policy refinement for DiffServ quality of service management,
Bandara A, Lupu E, Russo A, Dulay N, Sloman M, Flegkas P, Charalambides M, Pavlou G,
9th IFIP/IEEE International Symposium on Integrated Network Management (IM), 2005 IEEE, Pages:469-482
|  DOI  |  Publisher Web Link |  Author Web Link

Self-managed cells for ubiquitous systems,
Dulay N, Lupu E, Sloman M, Sventek J, Badr N, Heeps S,
3rd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 2005, SPRINGER-VERLAG BERLIN, Berlin, Pages:1-6, ISSN:0302-9743
|  DOI  |  Publisher Web Link

CareGrid: Autonomous Trust Domains for Healthcare Applications,
Dulay N , Lupu E, Sloman M , Bacon J , Ingram D, Moody K,
ERCIM Special Issue, 2005
|  Author Web Link

Compiling policy descriptions into reconfigurable firewall processors,
Lee T, Yusuf S, Luk W, Sloman M, Lupu E, Dulay N,
11th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), 2003, IEEE, Los Alamitos, Pages:39-48
|  DOI  |  Publisher Web Link

Irregular reconfigurable CAM structures for firewall applications,
Lee T, Yusuf S, Luk W, Sloman M, Lupu E, Dulay N,
13th international conference on field-programmable logic and applications (FPL), 2003, Lisbon, Portugal, Springer-Verlag, Berlin, Pages:890-899
|  DOI  |  Publisher Web Link  |  Author Web Link

Structuring devolved responsibility in network and systems management,
Lupu E, Dulay N, Damianou N, Sloman M,
Multimedia management, 2003, Editor(s): Neuman de Souza, Agoulmine, Kogan Page Science, Pages:34-49, ISBN:9781903996232

Flexible security policies for mobile agent systems,
Montanari R, Stefanelli C, Dulay N,
Microprocessors and Microsystems, 2001, Vol:25, ISSN:0141-9331, Pages:93-99
|  DOI  |  Author Web Link

A policy language for the management of distributed agents,
Dulay N, Damianou N, Lupu E, Sloman M,
Agent-oriented software engineering, AOSE 2001, Springer, Berlin, Pages:84-100, ISSN:0302-9743
|  DOI  |  Publisher Web Link

Development framework for firewall processors,
Lee T, Yusuf S, Luk W, Sloman M, Lupu E, Dulay N,
IEEE International Conference on Field-Programmable Technology (FPT), Chinese University of Hong Kong, New Territories, Peoples Republic of China, 2002, IEEE, New York, Pages:352-355
|  DOI  |  Author Web Link

Tools for domain-based policy management of distributed systems,
Damianou N, Dulay N, Lupu E, Sloman A, Tonouchi T,
8th IEEE/IFIP Network Operations and Management Symposium (NOMS), 2002, IEEE, New York, Pages:203-217
|  DOI  |  Publisher Web Link

A policy deployment model for the ponder language,
Dulay N, Lupu E, Sloman M, Damianou N,
Integrated network management (IM): 2001 IEEE/IFIP integrated management strategies for the new millennium, IEEE, Piscataway, NJ, Pages:529-544
|  DOI  |  Publisher Web Link  |  Author Web Link

Map adaptation for mobile systems,
Chalmers D, Sloman M, Dulay N,
10th international world-wide conference (WWW), 2001, Hong Kong, Pages:735-744
|  DOI  |  Publisher Web Link

Policy-driven management of agent systems,
Corradi A, Dulay N, Montanari R, Stefanelli C,
International Workshop on Policies for Distributed Systems and Networks (POLICY), 2001, Springer-Verlag Berlin, Pages:214-229, 0302-9743
|  DOI  |  Publisher Web Link  |  Author Web Link

The Ponder policy specification language,
Damianou N, Dulay N, Lupu E, Sloman M,
International Workshop on Policies for Distributed Systems and Networks (POLICY), 2001, Springer Verlag, Berlin, Pages:18-38, ISSN:0302-9743
|  DOI  | Publisher Web Link

Structuring Devolved Responsibilities in Network and Systems Management,
Lupu E, Dulay N, Damianou N, Sloman M,
Networking and Information Systems Journal, 2000, Vol:3, Pages:261-277

Ponder: A Language for Specifying Security and Management Policies for Distributed Systems,
Damianou N, Dulay N, Lupu E, Sloman M,
The Language Specification – Version 2.2, 2000, Imperial College, Department of Computing
|  Open Access Link

Managing Security in Object-Based Systems Using Ponder,
Damianou N, Dulay N, Lupu E, Sloman M,
6th EUNICE Open European Summer School, 2000, Enschede, The Netherlands

Ponder: An Object-oriented Language for Specifying Security and Management Policies,
Damianou N, Dulay N, Lupu E, Sloman M,
10th Workshop for PhD Students in Object-Oriented Systems (PhDOOS), 2000, Sophia Antipolis, France

Ponder: Realising enterprise viewpoint concepts,
Lupu E, Sloman M, Dulay N, Damianou N,
4th International Conference on Enterprise Distributed Object Computing (EDOC), 2000, IEEE COMPUTER SOC, Pages:66-75
|  DOI  |  Publisher Web Link  | Open Access Link

Towards a Runtime Object Model for the Ponder Policy Language,
Dulay N, Lupu E , Sloman M, Damianou N,
7th Workshop of the Open View University Association (OVUA), 2000, Santorini, Greece