Integrating Privacy and Safety Criteria into Planning Tasks,
Lavygina A, Russo A, Dulay N
Security and Trust Management, Springer, Sept 2015, Pages: 20-36
Rumpole – An Introspective Break-glass Access Control Language,
Marinovic S, Dulay N, Sloman M,
ACM Transactions on Information and System Security (TISSEC), 2014
Shared and searchable encrypted data for untrusted servers,
Dong C, Russello G, Dulay N,
Journal of Computer Security, 2011, Vol:19, ISSN:0926-227X, Pages:367-397
| DOI
Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications,
Dong C, Dulay N,
5th IFIP International Conference on Trust Management, 2011, Springer, Pages:133-148
| DOI | Publisher Web Link
Rumpole: a flexible break-glass access control model,
Marinovic S, Craven R, Ma J, Dulay N,
16th ACM Symposium on Access Control Models and Technologies (SACMAT), 2011, ACM, New York, NY, USA, Pages:73-82
| DOI | Publisher Web Link
Support Tasks for Pervasive Workflows,
Marinovic S, Unger T, Dulay N, Leymann F,
Unpublished, 2011
| Author Web Link
Teleo-Reactive policies for managing human-centric pervasive services,
Marinovic S, Twidle K P, Dulay N, Sloman M,
6th IEEE Int. Conference on Network and Service Management, 2010 IEEE, Pages:80-87
| DOI | Publisher Web Link | Open Access Link
An Architectural Framework for Analyzing Tradeoffs between Software Security and Performance,
Cortellessa V, Trubiani C, Mostarda L, Dulay N,
1st International Symposium on Architecting Critical Systems (ISARCS), 2010. Springer, Pages:1-18
| DOI | Publisher Web Link
Coordinating Data Usage Control in Loosely-Connected Networks,
Russello G, Scalavino E, Dulay N, Lupu E,
2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2010, IEEE Computer Society, Pages:30-39
| DOI | Publisher Web Link
Providing data confidentiality against malicious hosts in Shared Data Spaces,
Russello G, Dong C, Dulay N, Chaudron M, Van Steen M,
Science of Computer Programming, 2010, Vol:75, ISSN:0167-6423, Pages:426 – 439
| DOI | Publisher Web Link
Shinren: Non-monotonic Trust Management for Distributed Systems,
Dong C, Dulay N,
4th IFIP WG 11 11 International Conference on Trust Management, Springer-Verlag Berlin, Pages:125-140, ISSN:1868-4238
| DOI | Publisher Web Link
Teleo-Reactive Policies in Ponder2,
Twidle K, Marinovic S, Dulay N,
2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), IEEE Computer Society, Pages:57-60
| DOI | Publisher Web Link
Teleo-Reactive workflows for pervasive healthcare,
Marinovic S, Twidle K, Dulay N,
2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 2010, IEEE, Pages:316-321
| DOI | Publisher Web Link
Context-based Authentication and Transport of Cultural Assets,
Mostarda L, Dong C, Dulay N,
Personal and Ubiquitous Computing, 2009, Vol:14, 1617-4909, Pages:-
| DOI | Author Web Link
Locating Network Domain Entry and Exit point/path for DDoS Attack Traffic,
Thing V, Sloman M, Dulay N,
IEEE Transactions on Network and Service Management, 2009, Vol:6, ISSN:1932-4537, Pages:163-174
| DOI | Author Web Link | Open Access Link
Policy Conflict Analysis for DiffServ Quality of Service Management,
Charalambides M, Flegkas P, Pavlou G, Rubio-Loyola J, Bandara A, Lupu E, Russo A, Dulay N, Sloman M,
IEEE Transactions on Network and Service Management, 2009, Vol:6, 1932-4537, Pages:-
| DOI | Author Web Link
Policies for Self Tuning Home Networks,
Pediaditakis D, Mostarda L, Dong C, Dulay N,
IEEE International Symposium on Policies for Distributed Systems and Networks, 2009, IEEE, Pages:-
| DOI | Publisher Web Link
xDUCON: Cross Domain Usage Control through Shared Data Spaces,
Russello G, Dulay N,
IEEE Intl Symposium on Policies for Distributed Systems and Networks, 2009, IEEE Computer Society, Pages:-
| DOI | Publisher Web Link
xDUCON: Coordinating Usage Control Policies in Distributed Domains,
Russello G, Dulay N,
IEEE Computer Society, Pages:246-253
| DOI | Publisher Web Link
Adaptive response system for distributed denial-of-service attacks,
Thing V, Sloman M, Dulay N,
IFIP/IEEE International Symposium on Integrated Network Management (IM), 2009, IEEE, Pages:809-814
| DOI | Publisher Web Link | Open Access Link
An Architectural Approach for Self-Managing Security Services,
Russello G, Dulay N,
23rd International Conference on Advanced Information Networking and Applications, 2009, IEEE, Pages:153-158
| DOI | Publisher Web Link
Ponder2: A Policy System for Autonomous Pervasive Environments,
Twidle K, Lupu E, Sloman M, Dulay N,
The Fifth International Conference on Autonomic and Autonomous Systems, 2009. IEEE, Pages:-
| DOI | Publisher Web Link | Open Access Link
A Policy Based Management Architecture for Mobile Collaborative Teams,
Asmare E, Gopalan A, Sloman M, Dulay N, Lupu E,
2009 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2009, IEEE Computer Society, Pages:169-174
| DOI | Publisher Web Link | Open Access Link
A Framework for Capturing Patient Consent in Pervasive Healthcare Applications.
Russello G , Dong C, Dulay, N,
In P. Olla, & J. Tan (Eds.) Mobile Health Solutions for Biomedical Applications, 2009, Hershey, PA: Medical Information Science Reference. Pages 245-259
| DOI
An Efficient Policy System for Body Sensor Networks,
Zhu Y, Keoh S L, Sloman M, Lupu E, Dulay N, Pryce N,
14th IEEE International Conference on Parallel and Distributed Systems (ICPADS’08), 2008, IEEE, Pages:383-390
| DOI | Publisher Web Link | Open Access Link
A Consent-based Workflow System for Healthcare Systems,
Russello G, Dong C, Dulay N,
Policies for Distributed Systems and Networks (Policy), 2008
Secure Distributed Self Management Framework for UXVs,
Dulay N, Sloman M, Lupu E, Asmare E, Gopalan A,
Systems Engineering for Autonomous Systems Defence Technology Centre Conference, 2008
| Author Web Link | Open Access Link
A Workflow-based Access Control Framework for e-Health Applications,
Russello G, Dong C, Dulay N,
22nd International Workshops on Advanced Information Networking and Applications, 2008, IEEE, Pages:111-120
| DOI | Publisher Web Link
A Policy System to Support Adaptability and Security on Body Sensors,
Zhu Y, Keoh S L, Sloman M, Lupu E, Dulay N, Pryce N,
5th International Summer School and Symposium on Medical Devices and Biosensors, 2008, IEEE, Pages:97-100
| DOI | Publisher Web Link | Open Access Link
Consent-based workflows for healthcare management,
Russello G, Dong C, Dulay N,
IEEE International Workshop on Policies for Distributed Systems and Networks, 2008, IEEE COMPUTER SOC, Pages:153-161
| DOI | Publisher Web Link
Encrypted Shared Data Spaces,
Russello G, Dong C, Dulay N, Chaudron M, van Steen M,
10th International Conference on Coordination Models and Languages (COORDINATION), 2008, Springer-Verlag Berlin, Pages:264-279, ISSN:0302-9743
| DOI | Publisher Web Link
ESCAPE: A Component-Based Policy Framework for Sense and React Applications,
Russello G, Mostarda L, Dulay N,
11th International Symposium on Component-Based Software Engineering, 2008, SPRINGER-VERLAG BERLIN, Pages:212-229, ISSN:0302-9743
| DOI | Publisher Web Link
Finger: An Efficient Policy System for Body Sensor Networks,
Zhu Y, Keoh S L, Sloman M, Lupu E, Zhang Y, Dulay N, Pryce N,
5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2008, IEEE, Pages:428-433
| DOI | Publisher Web Link | Open Access Link
Flexible Resolution of Authorisation Conflicts in Distributed Systems,
Dong C, Russello G, Dulay N,
19th IFIP/IEEE International Workshop on Distributed Systems, Operations and Management (DSOM), 2008, Springer-Verlag, Pages:95-108, ISSN:0302-9743
| DOI | Publisher Web Link
Network domain entrypoint/path determination for DDoS attacks,
Thing V, Sloman M, Dulay N,
IEEE Network Operations and Management Symposium (NOMS), 2008, IEEE, Pages:57-64, 1542-1201
| DOI | Publisher Web Link | Open Access Link
Place and time authentication of cultural assets,
Mostarda L, Dong C, Dulay N,
IFIPTM 2008/Joint iTrust and PST Conference on Privacy, Trust Management and Security, 2008, Springer, Pages:279-294, ISSN:1868-4238
| DOI | Author Web Link
Ponder2 – A policy environment for autonomous pervasive systems,
Twidle K, Lupu E, Dulay N, Sloman M,
IEEE International Workshop on Policies for Distributed Systems and Networks, 2008, IEEE COMPUTER SOC, Pages:245-246
| DOI | Publisher Web Link | Open Access Link
Shared and searchable encrypted data for untrusted servers,
Dong C, Russello G, Dulay N,
22nd Annual Conference on Data and Applications Security, 2008, Springer-Verlag Berlin Pages:127-143, ISSN:0302-9743
| DOI | Publisher Web Link
Policy Based Management,
Bandara A, Damianou N, Lupu E, Sloman M, Dulay N,
Handbook of Network and System Administration, 2007, Editor(s): Burgess, Bergstra, Elsevier, ISBN:978-0-444-52198-9
| Author Web Link
Enhanced TCP SYN Attack Detection,
Thing V, Sloman M, Dulay N,
IEEE Workshop on Monitoring Attack Detection and Mitigation (MonAM), 2007
| Author Web Link | Open Access Link
Authorisation and conflict resolution for hierarchical domains,
Russello G, Dong C, Dulay N,
8th IEEE International Workshop on Policies for Distributed Systems and Networks, 2007, IEEE, Pages:201-210
| DOI | Publisher Web Link
Enforcing Fine-grained Authorization Policies for Java Mobile Agents,
Russello G, Dong C, Dulay N,
Security in Networks and Distributed Systems, 2007, IEEE Computer Society, Pages:-
| DOI | Publisher Web Link
Non-intrusive IP Traceback for DDoS Attacks,
Thing V, Sloman M, Dulay N,
ACM Symposium on Information, Computer and Communications Security, 2007, Singapore, ACM, Pages:371-373
| DOI | Publisher Web Link | Open Access Link
A survey of bots used for distributed denial of service attacks,
Thing V, Sloman M, Dulay N,
22nd International Information Security Conference, 2007, Springer, Pages:229-240, ISSN:1571-5736
| DOI | Publisher Web Link | Open Access Link
Autonomous pervasive systems and the policy challenges of a small world!,
Lupu E, Dulay N, Sventek J, Sloman M,
8th IEEE International Workshop on Policies for Distributed Systems and Networks, 2007, IEEE, Pages:3-7
| DOI | Publisher Web Link
Policy-based management for body-sensor networks,
Keoh S L, Twidle K, Pryce N, Schaeffer A, Lupu E, Dulay N, Sloman M, Heeps S, Strowes S, Sventek J, Katsiri E,
4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN), 2007, Springer, Pages:92-98, 1680-0737
| DOI | Publisher Web Link | Open Access Link
Privacy-preserving credential verification for non-monotonic trust management systems,
Dong C, Russello G, Dulay N,
4th Intl Conf on Mathematical Methods, Models and Architectures for Computer Network Security, 2007, Springer, Pages:171-186, ISSN:1865-0929
| DOI | Author Web Link
Secure dynamic community establishment in coalitions,
Asmare E, Dulay N, Lupu E, Sloman M, Calo S, Lobo J,
IEEE Military Communications Conference (MILCOM), 2007, IEEE, Pages:3105-3111, 2155-7578
| Author Web Link | Open Access Link
Trust transfer in distributed systems,
Dong C, Russello G, Dulay N ,
Joint iTrust and PST Conference on Privacy, Trust Management and Security, 2007, SPRINGER, Pages:17-29, 1571-5736
| Author Web Link
Policy Refinement for DiffServ Quality of Service Management,
Bandara A , Lupu EC , Russo A , Dulay N , Sloman M , Flegkas P , Charalambides M , Pavlou G,
IEEE Transactions on Network and Service Management, 2006, Vol:3, 1932-4537, Pages:2-13
| DOI | Author Web Link | Publisher Web Link
Privacy Preserving Trust Negotiation for Pervasive Healthcare,
Dong C, Dulay N,
Pervasive Computing Technologies for Healthcare, 2006
An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health,
Strowes S, Badr N, Dulay N, Heeps S , Lupu E , Sloman M, Sventek J,
Intl. Workshop on Distributed Event-Based Systems (DEBS), 2006
| Author Web Link
Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management,
Charalambides M , Flegkas P , Pavlou G , Bandara A , Dulay N , Lupu E , Rubio-Loyola J , Russo A , Sloman M,
IFIP/IEEE Network Operations and Management Symposium (NOMS), 2006, IEEE Computer Society, Pages:-, 1542-1201
| DOI | Publisher Web Link | Author Web Link
Combined Hardware-Software Architecture for Network Flow,
Luk W , Yusuf S , Sloman M , Brown A , Lupu C , Dulay N,
Intl Conf on Engineering of Reconfigurable Systems and Algorithms (ERSA), 2005, Pages:149-155
| Author Web Link | Publisher Web Link
Policy conflict analysis for quality of service management,
Charalambides M, Flegkas P, Pavlou G, Bandara A, Lupu E, Russo A, Dulay N, Sloman M, Rubio-Loyola J,
6th IEEE International Workshop on Policies for Distributed Systems and Networks, 2005, IEEE, Pages:99-108
| DOI | Publisher Web Link | Author Web Link
Policy refinement for DiffServ quality of service management,
Bandara A, Lupu E, Russo A, Dulay N, Sloman M, Flegkas P, Charalambides M, Pavlou G,
9th IFIP/IEEE International Symposium on Integrated Network Management (IM), 2005 IEEE, Pages:469-482
| DOI | Publisher Web Link | Author Web Link
Self-managed cells for ubiquitous systems,
Dulay N, Lupu E, Sloman M, Sventek J, Badr N, Heeps S,
3rd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 2005, SPRINGER-VERLAG BERLIN, Berlin, Pages:1-6, ISSN:0302-9743
| DOI | Publisher Web Link
CareGrid: Autonomous Trust Domains for Healthcare Applications,
Dulay N , Lupu E, Sloman M , Bacon J , Ingram D, Moody K,
ERCIM Special Issue, 2005
| Author Web Link
Compiling policy descriptions into reconfigurable firewall processors,
Lee T, Yusuf S, Luk W, Sloman M, Lupu E, Dulay N,
11th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), 2003, IEEE, Los Alamitos, Pages:39-48
| DOI | Publisher Web Link
Irregular reconfigurable CAM structures for firewall applications,
Lee T, Yusuf S, Luk W, Sloman M, Lupu E, Dulay N,
13th international conference on field-programmable logic and applications (FPL), 2003, Lisbon, Portugal, Springer-Verlag, Berlin, Pages:890-899
| DOI | Publisher Web Link | Author Web Link
Structuring devolved responsibility in network and systems management,
Lupu E, Dulay N, Damianou N, Sloman M,
Multimedia management, 2003, Editor(s): Neuman de Souza, Agoulmine, Kogan Page Science, Pages:34-49, ISBN:9781903996232
Flexible security policies for mobile agent systems,
Montanari R, Stefanelli C, Dulay N,
Microprocessors and Microsystems, 2001, Vol:25, ISSN:0141-9331, Pages:93-99
| DOI | Author Web Link
A policy language for the management of distributed agents,
Dulay N, Damianou N, Lupu E, Sloman M,
Agent-oriented software engineering, AOSE 2001, Springer, Berlin, Pages:84-100, ISSN:0302-9743
| DOI | Publisher Web Link
Development framework for firewall processors,
Lee T, Yusuf S, Luk W, Sloman M, Lupu E, Dulay N,
IEEE International Conference on Field-Programmable Technology (FPT), Chinese University of Hong Kong, New Territories, Peoples Republic of China, 2002, IEEE, New York, Pages:352-355
| DOI | Author Web Link
Tools for domain-based policy management of distributed systems,
Damianou N, Dulay N, Lupu E, Sloman A, Tonouchi T,
8th IEEE/IFIP Network Operations and Management Symposium (NOMS), 2002, IEEE, New York, Pages:203-217
| DOI | Publisher Web Link
A policy deployment model for the ponder language,
Dulay N, Lupu E, Sloman M, Damianou N,
Integrated network management (IM): 2001 IEEE/IFIP integrated management strategies for the new millennium, IEEE, Piscataway, NJ, Pages:529-544
| DOI | Publisher Web Link | Author Web Link
Map adaptation for mobile systems,
Chalmers D, Sloman M, Dulay N,
10th international world-wide conference (WWW), 2001, Hong Kong, Pages:735-744
| DOI | Publisher Web Link
Policy-driven management of agent systems,
Corradi A, Dulay N, Montanari R, Stefanelli C,
International Workshop on Policies for Distributed Systems and Networks (POLICY), 2001, Springer-Verlag Berlin, Pages:214-229, 0302-9743
| DOI | Publisher Web Link | Author Web Link
The Ponder policy specification language,
Damianou N, Dulay N, Lupu E, Sloman M,
International Workshop on Policies for Distributed Systems and Networks (POLICY), 2001, Springer Verlag, Berlin, Pages:18-38, ISSN:0302-9743
| DOI | Publisher Web Link
Structuring Devolved Responsibilities in Network and Systems Management,
Lupu E, Dulay N, Damianou N, Sloman M,
Networking and Information Systems Journal, 2000, Vol:3, Pages:261-277
Ponder: A Language for Specifying Security and Management Policies for Distributed Systems,
Damianou N, Dulay N, Lupu E, Sloman M,
The Language Specification – Version 2.2, 2000, Imperial College, Department of Computing
| Open Access Link
Managing Security in Object-Based Systems Using Ponder,
Damianou N, Dulay N, Lupu E, Sloman M,
6th EUNICE Open European Summer School, 2000, Enschede, The Netherlands
Ponder: An Object-oriented Language for Specifying Security and Management Policies,
Damianou N, Dulay N, Lupu E, Sloman M,
10th Workshop for PhD Students in Object-Oriented Systems (PhDOOS), 2000, Sophia Antipolis, France
Ponder: Realising enterprise viewpoint concepts,
Lupu E, Sloman M, Dulay N, Damianou N,
4th International Conference on Enterprise Distributed Object Computing (EDOC), 2000, IEEE COMPUTER SOC, Pages:66-75
| DOI | Publisher Web Link | Open Access Link
Towards a Runtime Object Model for the Ponder Policy Language,
Dulay N, Lupu E , Sloman M, Damianou N,
7th Workshop of the Open View University Association (OVUA), 2000, Santorini, Greece