Skip to main content

Research Repository

Advanced Search

All Outputs (2)

Developing secure, unified, multi-device, and multi-domain platforms: a case study from the webinos project. (2014)
Book Chapter
ATZENI, A., LYLE, J. and FAILY, S. 2014. Developing secure, unified, multi-device, and multi-domain platforms: a case study from the webinos project. In Ruiz-Martinez, A., Marin-Lopez, R. and Pereniguez-Garcia, F. (eds.) Architectures and protocols for secure information technology infrastructures. Hershey: IGI Global [online], chapter 12, pages 310-333. Available from: https://doi.org/10.4018/978-1-4666-4514-1.ch012

The need for integrated cross-platform systems is growing. Such systems can enrich the user experience, but also lead to greater security and privacy concerns than the sum of their existing components. To provide practical insights and suggest viable... Read More about Developing secure, unified, multi-device, and multi-domain platforms: a case study from the webinos project..

Evaluating the implications of attack and security patterns with premortems. (2014)
Book Chapter
FAILY, S., PARKIN, S. and LYLE, J. 2014. Evaluating the implications of attack and security patterns with premortems. In Blackwell, C. and Zhu, H. (eds.) Cyberpatterns: unifying design patterns with security and attack patterns. Cham: Springer [online], chapter 16, pages 199-209. Available from: https://doi.org/10.1007/978-3-319-04447-7_16

Security patterns are a useful way of describing, packaging and applying security knowledge which might otherwise be unavailable. However, because patterns represent partial knowledge of a problem and solution space, there is little certainty that ad... Read More about Evaluating the implications of attack and security patterns with premortems..