AC/DC: Adaptive Cutoffs and Disputable Cutoffs for Robust Critical Transactions in Smart-Contracts,
Khalil R, Dulay N,
IEEE Transactions on Network and Service Management, Vol: 19, Issue 4, Pages: 5383-5394, 2022

Towards Equity in Proof-of-Work Mining Rewards,
Khalil R, Dulay N, 2022,
(Best Paper) 3rd International Conference on Mathematical Research for Blockchain Economy, 2022

RANC: reward-all nakamoto consensus,
Khalil R, Dulay N,
SAC ’22: 37th ACM/SIGAPP Symposium on Applied Computing, ACM, Pages: 236-245, 2022

Adaptive layer-two dispute cutoffs in smart-contract blockchains,
Khalil R, Dulay N,
(Best Paper) 3rd Conference on Blockchain Research and Applications for Innovative Networks and Services (BRAINS), IEEE, Pages: 129-136, 2021

PoSH in Practice: Implementing Proof of Staked Hardware Consensus with Limited Storage,
Khalil R, Dulay N,
3rd IEEE International Conference on Blockchain and Cryptocurrency (ICBC), IEEE, 2021

Adaptive layer-two dispute periods in blockchains,
Khalil R, Dulay N,
Cryptology ePrint Archive, 2020

PoSH proof of staked hardware consensus,
Khalil R, Dulay N,
Cryptology ePrint Archive, 2020

XPC: fast and reliable synchronous transmission protocols for 2-phase commit and 3-phase commit,
Spina A, Breza M, Dulay N, McCann J,
International Conference on Embedded Wireless Systems and Networks (EWSN), ACM, Pages: 73-84, 2020

PICO-MP: De-Centralised Macro-Programming for Wireless Sensor and Actuator Networks (Best Paper)
Dulay N, Micheletti M, Mostarda L, Piermarteri A,
32nd IEEE International Configuration on Advanced Information Networking and Applications (AINA), 2018

DejaVu: Visual Diffing of Cyber-Physical Systems
Leahy F, Dulay N,
15th ACM International Conference on Embedded Wireless Systems and Networks (EWSN), 2018

DejaVu: Visual Diffing of Cyber-Physical Systems (Best Poster),
Leahy F, Dulay N,
4th ACM International Conference on Systems for Energy-Efficient Built Environments (BuildSys), 2017

Ardan: Using 3D Game Engines in Cyber-Physical Simulations,
Leahy F, Dulay N,
Cyber Physical Systems. Design, Modeling, and Evaluation, LNCS 10107, 2016

Integrating Privacy and Safety Criteria into Planning Tasks,
Lavygina A, Russo A, Dulay N
Security and Trust Management, Springer, 2015, Pages: 20-36

An Approach for Collective Adaptation in Socio-Technical Systems,
Bucchiarone A, Dulay N, Lavygina A, Marconi A, Raik H, Russo A,
2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW), 2015, Pages: 43-48

Rumpole – An Introspective Break-glass Access Control Language,
Marinovic S, Dulay N, Sloman M,
ACM Transactions on Information and System Security (TISSEC), 2014

When Did Your Smartphone Bother You Last?,
Smith J, Lavygina A, Russo A, Dulay N,
UbiComp-ISWC 2014 Programming Competition, 2014

Learning to Recognise Disruptive Smartphone Notifications,
Smith J, Lavygina A, Ma J, Russo, Dulay N,
6th International Conference on Human-Computer Interaction with Mobile Devices and Service (MobileHCI), September 2014

RingLearn: Long-term Mitigation of Disruptive Smartphone Interruptions,
Smith J, Dulay N,
Symposium on Activity and Context Modeling and Reasoning (ACOMORE),  2014

Exploring Concept Drift using Interactive Simulations,
Smith J, Dulay N, Tóth M A, Amft O, Zhang Y:
10th IEEE Workshop on Context Modeling and Reasoning (CoMoRea),  2013, Pages 49-54
| DOI

Self-Management Framework for Mobile Autonomous Systems,
Asmare E, Gopalan A, Sloman M, Dulay N, Lupu E,
Journal of Network and Systems Management, 2012, Vol:20, 1064-7570, Pages:244-275
|  DOI  |  Publisher Web Link

Enhancing Vehicle Navigation using Shared Monitoring and Estimation,
Ball R, Dulay N,
Unpublished, 2012.
|  Author Web Link

A Configuration Service for Home Networks,
Pediaditakis D, Gopalan A, Dulay N, Sloman M,
IEEE Network Operations and Management Symposium (NOMS), 2012, IEEE, Pages:1048-1053, 1542-1201
|  DOI  |  Publisher Web Link  |  Open Access Link

A policy-based publish/subscribe middleware for sense-and-react applications,
Russello G, Mostarda L, Dulay N
Journal of Systems and Software, 2011, Vol:84, ISSN:0164-1212, Pages:638-654
|  DOI  |  Author Web Link

Shared and searchable encrypted data for untrusted servers,
Dong C, Russello G, Dulay N,
Journal of Computer Security, 2011, Vol:19, ISSN:0926-227X, Pages:367-397
|  DOI

Argumentation-based Fault Diagnosis for Home Networks,
Dong C, Dulay N,
Proceedings of the 2nd ACM SIGCOMM Workshop on Home networks, 2011,  Pages 37-42
|  DOI

An Information Plane Architecture Supporting Home Network Management,
Sventek J, Koliousis A, Sharma O, Dulay N, Pediaditakis D, Sloman M, Rodden T, Lodge T, Bedwell B,
IEEE International Symposium on Integrated Network Management (IM), 2011. IEEE, Pages:1-8
|  DOI  |  Publisher Web Link  |  Open Access Link

Distributed Orchestration of Pervasive Services,
Mostarda L, Marinovic S, Dulay N,
24th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2011 IEEE COMPUTER SOC, Pages:166-173, ISSN:1550-445X
|  DOI  |  Publisher Web Link

Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications,
Dong C, Dulay N,
5th IFIP International Conference on Trust Management, 2011, Springer, Pages:133-148
|  DOI  |  Publisher Web Link

Rumpole: a flexible break-glass access control model,
Marinovic S, Craven R, Ma J, Dulay N,
16th ACM Symposium on Access Control Models and Technologies (SACMAT), 2011, ACM, New York, NY, USA, Pages:73-82
|  DOI  |  Publisher Web Link

Support Tasks for Pervasive Workflows,
Marinovic S, Unger T, Dulay N, Leymann F,
Unpublished, 2011
|  Author Web Link

Verifying home network bandwidth sharing plans,
Pediaditakis D, Dulay N,
7th International Conference on Network and Service Management (CNSM), 2011, IEEE, Pages:1-9
|  Publisher Web Link


Teleo-Reactive policies for managing human-centric pervasive services,
Marinovic S, Twidle K P, Dulay N, Sloman M,
6th IEEE Int. Conference on Network and Service Management, 2010 IEEE, Pages:80-87
|  DOI  |  Publisher Web Link  |  Open Access Link

An Architectural Framework for Analyzing Tradeoffs between Software Security and Performance,
Cortellessa V, Trubiani C, Mostarda L, Dulay N,
1st International Symposium on Architecting Critical Systems (ISARCS), 2010. Springer, Pages:1-18
|  DOI  |  Publisher Web Link

Coordinating Data Usage Control in Loosely-Connected Networks,
Russello G, Scalavino E, Dulay N, Lupu E,
2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2010, IEEE Computer Society, Pages:30-39
|  DOI  |  Publisher Web Link

Distributed Fault Tolerant Controllers,
Mostarda L, Ball R, Dulay N,
10th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), 2010 Springer-Verlag Berlin, Pages:141-154, ISSN:0302-9743
DOI  |  Publisher Web Link

Providing data confidentiality against malicious hosts in Shared Data Spaces,
Russello G, Dong C, Dulay N, Chaudron M, Van Steen M,
Science of Computer Programming, 2010, Vol:75, ISSN:0167-6423, Pages:426 – 439
|  DOI  |  Publisher Web Link

Predicting Human Behaviour from Selected Mobile Phone Data Points,
Choujaa D, Dulay N,
12th International Conference on Ubiquitous Computing, 2010, ACM, Pages:105-108
|  DOI  | Publisher Web Link

Shinren: Non-monotonic Trust Management for Distributed Systems,
Dong C, Dulay N,
4th IFIP WG 11 11 International Conference on Trust Management, Springer-Verlag Berlin, Pages:125-140, ISSN:1868-4238
|  DOI  |  Publisher Web Link

Teleo-Reactive Policies in Ponder2,
Twidle K, Marinovic S, Dulay N,
2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), IEEE Computer Society, Pages:57-60
|  DOI  |  Publisher Web Link

Teleo-Reactive workflows for pervasive healthcare,
Marinovic S, Twidle K, Dulay N,
2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 2010, IEEE, Pages:316-321
|  DOI  |  Publisher Web Link


Context-based Authentication and Transport of Cultural Assets,
Mostarda L, Dong C, Dulay N,
Personal and Ubiquitous Computing, 2009, Vol:14, 1617-4909, Pages:-
|  DOI  |  Author Web Link

Locating Network Domain Entry and Exit point/path for DDoS Attack Traffic,
Thing V, Sloman M, Dulay N,
IEEE Transactions on Network and Service Management, 2009, Vol:6, ISSN:1932-4537, Pages:163-174
|  DOI  |  Author Web Link  |  Open Access Link

Policy Conflict Analysis for DiffServ Quality of Service Management,
Charalambides M, Flegkas P, Pavlou G, Rubio-Loyola J, Bandara A, Lupu E, Russo A, Dulay N, Sloman M,
IEEE Transactions on Network and Service Management, 2009, Vol:6, 1932-4537, Pages:-
|  DOI  |  Author Web Link

Activity Recognition from Mobile Phone Data: State of the Art, Prospects and Open Problems,
Choujaa D, Dulay N,
Unpublished, 2009, 32 pages
|  Author Web Link

Policies for Self Tuning Home Networks,
Pediaditakis D, Mostarda L, Dong C, Dulay N,
IEEE International Symposium on Policies for Distributed Systems and Networks, 2009, IEEE, Pages:-
|  DOI  | Publisher Web Link

xDUCON: Cross Domain Usage Control through Shared Data Spaces,
Russello G, Dulay N,
IEEE Intl Symposium on Policies for Distributed Systems and Networks, 2009, IEEE Computer Society, Pages:-
|  DOI  |  Publisher Web Link

xDUCON: Coordinating Usage Control Policies in Distributed Domains,
Russello G, Dulay N,
IEEE Computer Society, Pages:246-253
|  DOI  |  Publisher Web Link

Adaptive response system for distributed denial-of-service attacks,
Thing V, Sloman M, Dulay N,
IFIP/IEEE International Symposium on Integrated Network Management (IM), 2009, IEEE, Pages:809-814
|  DOI  |  Publisher Web Link  |  Open Access Link

An Architectural Approach for Self-Managing Security Services,
Russello G, Dulay N,
23rd International Conference on Advanced Information Networking and Applications, 2009, IEEE, Pages:153-158
|  DOI  |  Publisher Web Link

Approximating Travel Times using Opportunistic Networking,
Ball R, Dulay N,
23rd International Conference on Advanced Information Networking and Applications, 2009, IEEE, Pages:844-849
|  DOI  |  Publisher Web Link

Ponder2: A Policy System for Autonomous Pervasive Environments,
Twidle K, Lupu E, Sloman M, Dulay N,
The Fifth International Conference on Autonomic and Autonomous Systems, 2009. IEEE, Pages:-
|  DOI  |  Publisher Web Link  |  Open Access Link

A Mission Management Framework for Unmanned Autonomous Vehicles,
Asmare E, Gopalan A, Sloman M, Dulay N, Lupu E,
2nd International Mobilware Conference, 2009, Springer, Pages:222-235, ISSN:1867-8211
|  DOI  |  Publisher Web Link  |  Open Access Link

A Policy Based Management Architecture for Mobile Collaborative Teams,
Asmare E, Gopalan A, Sloman M, Dulay N, Lupu E,
2009 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2009, IEEE Computer Society, Pages:169-174
|  DOI  |  Publisher Web Link  |  Open Access Link

Activity Inference through Sequence Alignment,
Choujaa D, Dulay N,
4th International Workshop on Location and Context-Awareness (LOCA), Springer-Verlag Berlin, Pages:19-36, ISSN:0302-9743
|  DOI  |  Publisher Web Link

Aligning Activity Sequences for Continuous Tracking of Cellphone Users,
Choujaa D, Dulay N,
7th IEEE International Conference on Pervasive Computing and Communications, 2009, IEEE, Pages:465-470, Pages:1-6
|  DOI  | Publisher Web Link |  Author Web Link

Routine classification through sequence alignment,
Choujaa D, Dulay N,
Proceedings of the 17th ACM international conference on Multimedia (MM), 2009, ACM, Pages:737-740
|  DOI  |  Publisher Web Link

A Framework for Capturing Patient Consent in Pervasive Healthcare Applications.
Russello G , Dong C, Dulay, N,
In P. Olla, & J. Tan (Eds.) Mobile Health Solutions for Biomedical Applications, 2009, Hershey, PA: Medical Information Science Reference. Pages 245-259
|  DOI


Adaptive self-management of teams of autonomous vehicles,
Sloman M, Asmare E, Gopalan A, Lupu E, Dulay N,
6th International Workshop on Middleware for Pervasive and Ad-Hoc Computing, 2008, ACM, Pages:1-
|  DOI  |  Publisher Web Link  |  Open Access Link

AMUSE: autonomic management of ubiquitous e-Health systems,
Lupu E, Dulay N, Sloman M, Sventek J, Heeps S, Strowes S, Twidle K, Keoh S-L, Schaeffer-Filho A,
Concurrency and Computation-Practice & Experience, 2008, Vol:20, ISSN:1532-0626, Pages:277-295
|  DOI  |  Author Web Link  |  Open Access Link

Reconfigurable architecture for network flow analysis,
Yusuf S, Luk W, Sloman M, Dulay N, Lupu E, Brown G,
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2008, Vol:16, ISSN:1063-8210, Pages:57-65
|  DOI  |  Publisher Web Link  |  Open Access Link

An Efficient Policy System for Body Sensor Networks,
Zhu Y, Keoh S L, Sloman M, Lupu E, Dulay N, Pryce N,
14th IEEE International Conference on Parallel and Distributed Systems (ICPADS’08), 2008, IEEE, Pages:383-390
|  DOI  |  Publisher Web Link  |  Open Access Link

Towards Context-aware Face Anonymisation,
Choujaa D, Dulay N,
7th International ACM Conference on Mobile and Ubiquitous Multimedia, 2008, ACM, Pages:-
|  DOI  |  Publisher Web Link

Adaptable Pervasive Flows – An Emerging Technology for Pervasive Adaptation,
Herrmann K, Rothermel K, Kortuem G, Dulay N,
Workshop on Pervasive Adaptation (PerAda), 2008, IEEE Computer Society, Pages:-
|  DOI  |  Publisher Web Link

GSpace: An Architectural Approach for Self-Managing Extra-Functional Concerns,
Russello G, Dulay N, Chaudron M, Van Steen M,
Workshop on Autonomous & Autonomic Software-based Systems, 2008 ACM, Pages:-
|  DOI  |  Publisher Web Link

Using Screenplays as a Source of Context Data,
Choujaa D, Dulay N
2nd ACM Workshop on Story Representation, Mechanism and Context, 2008, ACM, Pages:-
|  DOI  |  Publisher Web Link

A Consent-based Workflow System for Healthcare Systems,
Russello G, Dong C, Dulay N,
Policies for Distributed Systems and Networks (Policy), 2008

Secure Distributed Self Management Framework for UXVs,
Dulay N, Sloman M, Lupu E, Asmare E, Gopalan A,
Systems Engineering for Autonomous Systems Defence Technology Centre Conference, 2008
|  Author Web Link  | Open Access Link

A Workflow-based Access Control Framework for e-Health Applications,
Russello G, Dong C, Dulay N,
22nd International Workshops on Advanced Information Networking and Applications, 2008, IEEE, Pages:111-120
|  DOI  |  Publisher Web Link

A Policy System to Support Adaptability and Security on Body Sensors,
Zhu Y, Keoh S L, Sloman M, Lupu E, Dulay N, Pryce N,
5th International Summer School and Symposium on Medical Devices and Biosensors, 2008, IEEE, Pages:97-100
|  DOI  |  Publisher Web Link  |  Open Access Link

Consent-based workflows for healthcare management,
Russello G, Dong C, Dulay N,
IEEE International Workshop on Policies for Distributed Systems and Networks, 2008, IEEE COMPUTER SOC, Pages:153-161
|  DOI  |  Publisher Web Link

Encrypted Shared Data Spaces,
Russello G, Dong C, Dulay N, Chaudron M, van Steen M,
10th International Conference on Coordination Models and Languages (COORDINATION), 2008, Springer-Verlag Berlin, Pages:264-279, ISSN:0302-9743
|  DOI  |  Publisher Web Link

ESCAPE: A Component-Based Policy Framework for Sense and React Applications,
Russello G, Mostarda L, Dulay N,
11th International Symposium on Component-Based Software Engineering, 2008, SPRINGER-VERLAG BERLIN, Pages:212-229, ISSN:0302-9743
|  DOI  |  Publisher Web Link

Finger: An Efficient Policy System for Body Sensor Networks,
Zhu Y, Keoh S  L, Sloman M, Lupu E, Zhang Y, Dulay N, Pryce N,
5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2008, IEEE, Pages:428-433
|  DOI  | Publisher Web Link  |  Open Access Link

Flexible Resolution of Authorisation Conflicts in Distributed Systems,
Dong C, Russello G, Dulay N,
19th IFIP/IEEE International Workshop on Distributed Systems, Operations and Management (DSOM), 2008, Springer-Verlag, Pages:95-108, ISSN:0302-9743
|  DOI  |  Publisher Web Link

Network domain entrypoint/path determination for DDoS attacks,
Thing V, Sloman M, Dulay N,
IEEE Network Operations and Management Symposium (NOMS), 2008, IEEE, Pages:57-64, 1542-1201
|  DOI  |  Publisher Web Link  |  Open Access Link

Personalising Situated Workflow Systems for Pervasive Healthcare Applications,
Russello G, Dong C, Dulay N,
2nd International Conference on Pervasive Computing Technologies for Healthcare, 2008, IEEE, Pages:173-177
|  Author Web Link

Place and time authentication of cultural assets,
Mostarda L, Dong C, Dulay N,
IFIPTM 2008/Joint iTrust and PST Conference on Privacy, Trust Management and Security, 2008, Springer, Pages:279-294, ISSN:1868-4238
|  DOI  |  Author Web Link

Ponder2 – A policy environment for autonomous pervasive systems,
Twidle K, Lupu E, Dulay N, Sloman M,
IEEE International Workshop on Policies for Distributed Systems and Networks, 2008, IEEE COMPUTER SOC, Pages:245-246
|  DOI  |  Publisher Web Link  |  Open Access Link

Reconfigurable architecture for network flow analysis,
Yusuf S, Luk W, Sloman M, Dulay N, Lupu E,
International Conference on Engineering of Reconfigurable Systems and Algorithms, 2008, Pages:57-65

Shared and searchable encrypted data for untrusted servers,
Dong C, Russello G, Dulay N,
22nd Annual Conference on Data and Applications Security, 2008, Springer-Verlag Berlin Pages:127-143, ISSN:0302-9743
|  DOI  |  Publisher Web Link

TRAcME: Temporal Activity Recognition using Mobile Phone Data,
Choujaa D, Dulay N,
5th International Conference on Embedded and Ubiquitous Computing, 2008, IEEE, Pages:119-126
|  DOI  |  Publisher Web Link


Policy Based Management,
Bandara A, Damianou N, Lupu E, Sloman M, Dulay N,
Handbook of Network and System Administration, 2007, Editor(s): Burgess, Bergstra, Elsevier, ISBN:978-0-444-52198-9
|  Author Web Link

Enhanced TCP SYN Attack Detection,
Thing V, Sloman M, Dulay N,
IEEE Workshop on Monitoring Attack Detection and Mitigation (MonAM), 2007
|  Author Web Link  |  Open Access Link

Towards Self-managing Unmanned Autonomous Vehicles,
Lupu E, Asmare E, Dulay N, Sloman M,
Systems Engineering for Autonomous Systems Defence Technology Centre Conference, 2007 Edinburgh, UK
|  Author Web Link

Authorisation and conflict resolution for hierarchical domains,
Russello G, Dong C, Dulay N,
8th IEEE International Workshop on Policies for Distributed Systems and Networks, 2007, IEEE, Pages:201-210
|  DOI  |  Publisher Web Link

Enforcing Fine-grained Authorization Policies for Java Mobile Agents,
Russello G, Dong C, Dulay N,
Security in Networks and Distributed Systems, 2007, IEEE Computer Society, Pages:-
|  DOI  |  Publisher Web Link

Non-intrusive IP Traceback for DDoS Attacks,
Thing V, Sloman M, Dulay N,
ACM Symposium on Information, Computer and Communications Security, 2007, Singapore, ACM, Pages:371-373
|  DOI  |  Publisher Web Link  |  Open Access Link

A survey of bots used for distributed denial of service attacks,
Thing V, Sloman M, Dulay N,
22nd International Information Security Conference,  2007, Springer, Pages:229-240, ISSN:1571-5736
|  DOI  |  Publisher Web Link  |  Open Access Link

Autonomous pervasive systems and the policy challenges of a small world!,
Lupu E, Dulay N, Sventek J, Sloman M,
8th IEEE International Workshop on Policies for Distributed Systems and Networks, 2007, IEEE, Pages:3-7
|  DOI  |  Publisher Web Link

Dynamic ontology mapping for interacting autonomous systems,
Heeps S, Sventek J, Dulay N, Filho A, Lupu E, Sloman M, Strowes S,
2nd International Workshop on Self-Organizing Systems, 2007, Springer, Pages:255-263, 0302-9743
|  DOI  |  Publisher Web Link

Policy-based management for body-sensor networks,
Keoh S L, Twidle K, Pryce N, Schaeffer A, Lupu E, Dulay N, Sloman M, Heeps S, Strowes S, Sventek J, Katsiri E,
4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN), 2007, Springer, Pages:92-98, 1680-0737
|  DOI  |  Publisher Web Link  |  Open Access Link

Privacy-preserving credential verification for non-monotonic trust management systems,
Dong C, Russello G, Dulay N,
4th Intl Conf on Mathematical Methods, Models and Architectures for Computer Network Security, 2007, Springer, Pages:171-186, ISSN:1865-0929
|  DOI  |  Author Web Link

Secure dynamic community establishment in coalitions,
Asmare E, Dulay N, Lupu E, Sloman M, Calo S, Lobo J,
IEEE Military Communications Conference (MILCOM), 2007, IEEE, Pages:3105-3111, 2155-7578
|  Author Web Link  |  Open Access Link

Self-Managed Cell: A Middleware for Managing Body-Sensor Networks,
Keoh S L, Dulay N, Lupu E, Twidle K, Filho A, Sloman M, Heeps S, Strowes S, Sventek J,
4th Annual International Conference on Mobile and Ubiquitous Systems – Networking and Services, 2007, IEEE, Pages:1-5
|  DOI  | Publisher Web Link

Towards supporting interactions between self-managed cells,
Schaeffer A, Lupu E, Dulay N, Keoh SL, Twidle K, Sloman M, Heeps S, Strowes S, Sventek J,
1st IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO), 2007, IEEE, Pages:224-233
|  DOI  |  Publisher Web Link  | Open Access Link

Trust transfer in distributed systems,
Dong C, Russello G, Dulay N ,
Joint iTrust and PST Conference on Privacy, Trust Management and Security, 2007, SPRINGER, Pages:17-29, 1571-5736
|  Author Web Link


Policy Refinement for DiffServ Quality of Service Management,
Bandara A , Lupu EC , Russo A , Dulay N , Sloman M , Flegkas P , Charalambides M , Pavlou G,
IEEE Transactions on Network and Service Management, 2006, Vol:3, 1932-4537, Pages:2-13
|  DOI  |  Author Web Link  | Publisher Web Link

Privacy Preserving Trust Negotiation for Pervasive Healthcare,
Dong C, Dulay N,
Pervasive Computing Technologies for Healthcare, 2006

Issues in Developing Ubicomp Applications on Symbian Phones,
Pryce N, Huebscher M, Dulay N,
System Support for Future Mobile Computing Applications, 2006

An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health,
Strowes S, Badr N, Dulay N, Heeps S , Lupu E , Sloman M, Sventek J,
Intl. Workshop on Distributed Event-Based Systems (DEBS), 2006
Author Web Link

Management Architecture and Mission Specification for Unmanned Autonomous Vehicles,
Asmare E , Dulay N , Kim H , Lupu E , Sloman M,
Systems Engineering for Autonomous Systems Defence Technology Centre Conference, 2006, Edinburgh, UK
|  Author Web Link

Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management,
Charalambides M , Flegkas P , Pavlou G , Bandara A , Dulay N , Lupu E , Rubio-Loyola J , Russo A , Sloman M,
IFIP/IEEE Network Operations and Management Symposium (NOMS), 2006, IEEE Computer Society, Pages:-, 1542-1201
|  DOI  |  Publisher Web Link  |  Author Web Link

Fusing multiple sources of context data of the same context type,
Huebscher M, McCann J, Dulay N,
1st International Conference on Hybrid Information Technology, 2006,  IEEE COMPUTER SOC, Pages:406-415
|  Author Web Link  |  Open Access Link


Autonomic Management for Ubiquitous e-Health Systems,
Dulay N , Heeps S , Lupu E , Sharma O , Sloman M , Sventek J,
UK e-Science Programme All Hands Meeting (AHM), 2005
|  Author Web Link

Combined Hardware-Software Architecture for Network Flow,
Luk W , Yusuf S , Sloman M , Brown A , Lupu C , Dulay N,
Intl Conf on Engineering of Reconfigurable Systems and Algorithms (ERSA), 2005, Pages:149-155
|  Author Web Link  |  Publisher Web Link

Policy conflict analysis for quality of service management,
Charalambides M, Flegkas P, Pavlou G, Bandara A, Lupu E, Russo A, Dulay N, Sloman M, Rubio-Loyola J,
6th IEEE International Workshop on Policies for Distributed Systems and Networks, 2005, IEEE, Pages:99-108
|  DOI  |  Publisher Web Link  |  Author Web Link

Self-Managed Cells and their Federation,
Sventek J , Badr N , Dulay N , Heeps S , Lupu E , Sloman M,
Intl. Workshop on Adaptive and Self-Managing Enterprise Applications (ASEA), 2005
|  Author Web Link  |  Publisher Web Link

Policy Refinement for DiffServ Quality of Service Management,
Bandara A, Lupu E, Russo A , Dulay N, Sloman M, Flegkas P, Charalambides M, Pavlou G,
9th IFIP/IEEE Intl. Symp. on Integrated Management (IM), 2005
|  Author Web Link

A combined hardware-software architecture for network flow analysis,
Yusuf S, Luk W, Sloman M, Dulay N, Lupu E,
International Conference on Engineering of Reconfigurable Systems and Algorithms, C S R e A Press, Pages:149-155
|  Author Web Link

Policy refinement for DiffServ quality of service management,
Bandara A, Lupu E, Russo A, Dulay N, Sloman M, Flegkas P, Charalambides M, Pavlou G,
9th IFIP/IEEE International Symposium on Integrated Network Management (IM), 2005 IEEE, Pages:469-482
|  DOI  |  Publisher Web Link

Self-managed cells for ubiquitous systems,
Dulay N, Lupu E, Sloman M, Sventek J, Badr N, Heeps S,
3rd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 2005, SPRINGER-VERLAG BERLIN, Berlin, Pages:1-6, ISSN:0302-9743
|  DOI  |  Publisher Web Link

CareGrid: Autonomous Trust Domains for Healthcare Applications,
Dulay N , Lupu E, Sloman M , Bacon J , Ingram D, Moody K,
ERCIM Special Issue, 2005
|  Author Web Link


A framework for contextual mediation in mobile and ubiquitous computing applied to the context-aware adaptation of maps,
Chalmers D, Dulay N, Sloman M,
Personal and Ubiquitous Computing, 2004, Vol:8, ISSN:1617-4909, Pages:1-18
|  DOI  |  Publisher Web Link

Towards reasoning about context in the presence of uncertainty,
Chalmers D, Dulay N, Sloman M,
1st international workshop on advanced context modelling, reasoning and management, 2004, Nottingham, UK, Pages:1-6
|  Open Access Link

Meta data to support context aware mobile applications,
Chalmers D, Dulay N, Sloman M,
IEEE international conference on mobile data management (MDM), 2004, IEEE Computer Soc, Los Alamitos, Pages:199-210
|  DOI  |  Publisher Web Link  |  Open Access Link

Compiling policy descriptions into reconfigurable firewall processors,
Lee T, Yusuf S, Luk W, Sloman M, Lupu E, Dulay N,
11th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), 2003, IEEE, Los Alamitos, Pages:39-48
|  DOI  |  Publisher Web Link

Irregular reconfigurable CAM structures for firewall applications,
Lee T, Yusuf S, Luk W, Sloman M, Lupu E, Dulay N,
13th international conference on field-programmable logic and applications (FPL), 2003, Lisbon, Portugal, Springer-Verlag, Berlin, Pages:890-899
|  DOI  |  Publisher Web Link  |  Author Web Link

Structuring devolved responsibility in network and systems management,
Lupu E, Dulay N, Damianou N, Sloman M,
Multimedia management, 2003, Editor(s): Neuman de Souza, Agoulmine, Kogan Page Science, Pages:34-49, ISBN:9781903996232

Contextual mediation enables appropriate data selection,
Chalmers D, Sloman M, Dulay N,
ERCIM News, 2003, Vol:54, Pages:15-16
|  Publisher Web Link


Development framework for firewall processors,
Lee T, Yusuf S, Luk W, Sloman M, Lupu E, Dulay N,
IEEE International Conference on Field-Programmable Technology (FPT), Chinese University of Hong Kong, New Territories, Peoples Republic of China, 2002, IEEE, New York, Pages:352-355
|  DOI  |  Author Web Link

Tools for domain-based policy management of distributed systems,
Damianou N, Dulay N, Lupu E, Sloman A, Tonouchi T,
8th IEEE/IFIP Network Operations and Management Symposium (NOMS), 2002, IEEE, New York, Pages:203-217
|  DOI  |  Publisher Web Link

Flexible security policies for mobile agent systems,
Montanari R, Stefanelli C, Dulay N,
Microprocessors and Microsystems, 2001, Vol:25, ISSN:0141-9331, Pages:93-99
|  DOI  |  Author Web Link

A policy language for the management of distributed agents,
Dulay N, Damianou N, Lupu E, Sloman M,
Agent-oriented software engineering, AOSE 2001, Springer, Berlin, Pages:84-100, ISSN:0302-9743
|  DOI  |  Publisher Web Link

A policy deployment model for the Ponder language,
Dulay N, Lupu E, Sloman M, Damianou N,
Integrated network management (IM): 2001 IEEE/IFIP integrated management strategies for the new millennium, IEEE, Piscataway, NJ, Pages:529-544
|  DOI  |  Publisher Web Link  |  Author Web Link

Context-based specifications for data mediation to support mobile systems,
Chalmers D, Dulay N, Sloman M,
CaberNet workshop, Pisa, October 2001
|  Author Web Link

Map adaptation for mobile systems,
Chalmers D, Sloman M, Dulay N,
10th international world-wide conference (WWW), 2001, Hong Kong, Pages:735-744
|  DOI  |  Publisher Web Link

Policy-driven management of agent systems,
Corradi A, Dulay N, Montanari R, Stefanelli C,
International Workshop on Policies for Distributed Systems and Networks (POLICY), 2001, Springer-Verlag Berlin, Pages:214-229, 0302-9743
|  DOI  |  Publisher Web Link  |  Author Web Link

The Ponder policy specification language,
Damianou N, Dulay N, Lupu E, Sloman M,
International Workshop on Policies for Distributed Systems and Networks (POLICY), 2001, Springer Verlag, Berlin, Pages:18-38, ISSN:0302-9743
|  DOI  | Publisher Web Link


Software Architecture Description,
Kramer J, Magee J , Ng K, Dulay N,
Software Architecture for Product Families: Principles and Practice, 2000, Editor(s): Van Der Linden, Jazayeri, Addison Wesley

Structuring Devolved Responsibilities in Network and Systems Management,
Lupu E, Dulay N, Damianou N, Sloman M,
Networking and Information Systems Journal, 2000, Vol:3, Pages:261-277

Ponder: A Language for Specifying Security and Management Policies for Distributed Systems,
Damianou N, Dulay N, Lupu E, Sloman M,
The Language Specification – Version 2.2, 2000, Imperial College, Department of Computing
|  Open Access Link

Managing Security in Object-Based Systems Using Ponder,
Damianou N, Dulay N, Lupu E, Sloman M,
6th EUNICE Open European Summer School, 2000, Enschede, The Netherlands

Ponder: An Object-oriented Language for Specifying Security and Management Policies,
Damianou N, Dulay N, Lupu E, Sloman M,
10th Workshop for PhD Students in Object-Oriented Systems (PhDOOS), 2000, Sophia Antipolis, France
Ponder: Realising enterprise viewpoint concepts,
Lupu E, Sloman M, Dulay N, Damianou N,
4th International Conference on Enterprise Distributed Object Computing (EDOC), 2000, IEEE COMPUTER SOC, Pages:66-75
|  DOI  |  Publisher Web Link  | Open Access Link

Towards a Runtime Object Model for the Ponder Policy Language,
Dulay N, Lupu E , Sloman M, Damianou N,
7th Workshop of the Open View University Association (OVUA), 2000, Santorini, Greece

Architectural Support for Managing Nomadic Applications and Services,
Dulay N, Pryce N,
HP OUVA Workshop, 1999, Bologna, Italy

Dynamic Architectures and Architectural Styles for Distributed Programs,
Pryce N, Dulay N,
IEEE Workshop on Future Trends in Distributed Computing Systems (FTDCS), 1999, South Africa, IEEE Computer Society, Pages:-
|  DOI  |  Publisher Web Link

A Configurable Protocol Architecture for CORBA Environments,
Crane S, Dulay N,
3rd International Symposium on Autonomous Decentralized Systems (ISADS),
1997, IEEE, Pages:187-194
|  Author Web Link


A Visual Approach to Distributed Programming,
Magee J, Kramer J, Dulay N, Ng K,
Tools and Environments for Distributed Systems, 1996, Kluwer

Configuration Management for Distributed Software Services,
Crane S, Dulay N, Fossa H, Kramer J, Magee J, Sloman M, Twidle K,
IFIP/IEEE International. Symposium on Integrated Network Management (ISINM), 1995, Chapman & Hall Ltd, Pages:29-42
|  Author Web Link  |  Open Access Link  |  Publisher Web Link

 Specifying Distributed Software Architectures,
Magee J, Dulay N, Eisenbach S, Kramer J,
Fifth European Software Engineering Conference (ESEC), 1995 , Barcelona, Springer, Pages:-
|  DOI  |  Publisher Web Link

Ng K, Kramer J, Magee J, Dulay N,
The Software Architect’s Assistant – A Visual Environment for Distributed Programming,
Proceedings of 28th HICSS,
 1995, Hawaii, Pages:254-263
|  DOI

The Regis Toolkit for Distributed Object-Oriented Programming,
Dulay N,
OOPS Newsletter, 1995, Pages:10-13

Regis: A Constructive Development Environment for Distributed Programs,
Magee J, Dulay N, Kramer J,
Distributed Systems Engineering Journal, 1994, Vol:1, 0967-1846, Pages:304-312
|  DOI

Structuring Parallel and Distributed Programs,

Magee J, Dulay N, Kramer J,
Software Engineering Journal, 1993, Vol:8, ISSN:0268-6961, Pages:73-82
|  Author Web Link

Configuring Object Based Distributed Programs in REX,
Magee J, Kramer J, Sloman M, Dulay N,
Distributed Computing Systems, 1994, IEEE Computer Society Press, Pages:187-205

Configuring Object Oriented Programs in REX,
Kramer J, Magee J, Sloman M, Dulay N,
Software Engineering Journal, 1992,  Vol:7, ISSN:0268-6961, Pages:139-149
|  Publisher Web Link

A Constructive Development Environment for Parallel and Distributed Programs,
Magee J, Dulay N, Kramer J.,
Proceedings 2nd IEEE International Workshop on Configurable Distributed Systems (IWCDS-2), 1992, IEEE Computer Society Press, Pages:4-14
|  DOI  |  Publisher Web Link

MP: A Programming Environment for Multicomputers,
Magee J, Dulay N,
Programming Environments for Parallel Computing (PEPC), 1992, North-Holland, Pages:1-16
|  Publisher Web Link

Structuring parallel and distributed programs,
Magee J, Dulay N, Kramer J,
International Workshop on Configurable Distributed Systems (CDS), 1992, IEEE, Pages:102-117
Publisher Web Link

A configuration approach to parallel programming,
Magee J, Dulay N,
Parallel Architectures and Languages Europe (PARLE), Lecture Notes in Computer Science Volume 506, 1991, pp 313-330
|  DOI  |  Publisher Web Link |  Author Web Link

Distributed system construction: Experience with the conic toolkit,
Dulay N, Kramer J, Magee J, Sloman M, Twidle K,
Proceedings of the International Workshop on Experiences with Distributed Systems, 1988,  LNCS 309, Springer-Verlag, Pages:189-212, ISSN:0302-9743
|  DOI  |  Publisher Web Link

Delicious Twitter Digg this StumbleUpon Facebook