Skip to main content

Research Repository

Advanced Search

Eliciting and visualising trust expectations using persona trust characteristics and goal models. (2014)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2014. Eliciting and visualising trust expectations using persona trust characteristics and goal models. In Lanubile, F. and Ali, R. (eds.) Proceedings of the 6th International workshop on social software engineering (SSE 2014), 17 November 2014, Hong Kong, China. New York: ACM [online], pages 17-24. Available from: https://doi.org/10.1145/2661685.2661690

Developers and users rely on trust to simplify complexity when building and using software. Unfortunately, the invisibility of trust and the richness of a system's context of use means that factors influencing trust are difficult to see, and assessin... Read More about Eliciting and visualising trust expectations using persona trust characteristics and goal models..

Authorisation in context: incorporating context-sensitivity into an access control framework. (2014)
Conference Proceeding
FAILY, S., LYLE, J., FLÉCHAIS, I., ATZENI, A., CAMERONI, C., MYRHAUG, H., GÖKER, A. and KLEINFELD, R. 2014. Authorisation in context: incorporating context-sensitivity into an access control framework. In Proceedings of the 28th International BCS human computer interaction conference (HCI 2014): sand, sea and sky: holiday HCI, 9-12 September 2014, Southport, UK. Swindon: BCS, pages 189-194. Hosted on ScienceOpen [online]. Available from: https://doi.org/10.14236/ewic/hci2014.29

With sensitive information about ourselves now distributed across personal devices, people need to make access control decisions for different contexts of use. However, despite advances in improving the usability of access control for both developers... Read More about Authorisation in context: incorporating context-sensitivity into an access control framework..

Proceedings of the 1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014). (2014)
Conference Proceeding
BECKERS, K., FAILY, S., LEE, S.-W. and MEAD, N. (eds.) 2014. Proceedings of the 1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014), co-located with the 22nd IEEE international requirements engineering conference (RE 2014), 25 August 2014, Karlskrona, Sweden. Piscataway: IEEE [online]. Available from: https://ieeexplore.ieee.org/xpl/conhome/6883269/proceeding

The main focus of ESPRE is to bring together practitioners and researchers interested in security and privacy requirements. ESPRE probes the interfaces between requirements engineering, security and privacy, and takes the first step in evolving secur... Read More about Proceedings of the 1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014)..

Online reviews as first class artifacts in mobile app development. (2014)
Conference Proceeding
IACOB, C., HARRISON, R. and FAILY, S. 2014. Online reviews as first class artifacts in mobile app development. In Memmi, G. and Blanke, U. (eds.) Mobile computing, applications and services: revised selected papers from the proceedings of the 5th International conference on mobile computing, applications and services (MobiCase 2013), 7-8 November 2013, Paris, France. Lecture notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 130. Cham: Springer [online], pages 47-53. Available from: https://doi.org/10.1007/978-3-319-05452-0_4

This paper introduces a framework for developing mobile apps. The framework relies heavily on app stores and, particularly, on online reviews from app users. The underlying idea is that app stores are proxies for users because they contain direct fee... Read More about Online reviews as first class artifacts in mobile app development..

Evaluating the implications of attack and security patterns with premortems. (2014)
Book Chapter
FAILY, S., PARKIN, S. and LYLE, J. 2014. Evaluating the implications of attack and security patterns with premortems. In Blackwell, C. and Zhu, H. (eds.) Cyberpatterns: unifying design patterns with security and attack patterns. Cham: Springer [online], chapter 16, pages 199-209. Available from: https://doi.org/10.1007/978-3-319-04447-7_16

Security patterns are a useful way of describing, packaging and applying security knowledge which might otherwise be unavailable. However, because patterns represent partial knowledge of a problem and solution space, there is little certainty that ad... Read More about Evaluating the implications of attack and security patterns with premortems..

Continuous integration for web-based software infrastructures: lessons learned on the webinos project. (2013)
Conference Proceeding
SU, T., LYLE, J., ATZENI, A., FAILY, S., VIRJI, H., NTANOS, C. and BOTSIKAS, C. 2013. Continuous integration for web-based software infrastructures: lessons learned on the webinos project. In Bertacco, V. and Legay, A. (eds.) Hardware and software: verification and testing: proceedings of the 9th International Haifa verification conference (HVC 2013), 5-7 November 2013, Haifa, Israel. Lecture notes in computer science, 8244. Cham: Springer [online], pages 145-150. Available from: https://doi.org/10.1007/978-3-319-03077-7_10

Testing web-based software infrastructures is challenging. The need to interact with different services running on different devices, with different expectations for security and privacy contributes not only to the complexity of the infrastructure, b... Read More about Continuous integration for web-based software infrastructures: lessons learned on the webinos project..

Personal PKI for the smart device era. (2013)
Conference Proceeding
LYLE, J., PAVERD, A., KING-LACROIX, J., ATZENI, A., VIRJI, H., FLÉCHAIS, I. and FAILY, S. 2013. Personal PKI for the smart device era. In De Capitani di Vimercati, S. and Mitchell, C. (eds.) Public key infrastructures, services and applications: revised selected papers from the 9th European workshop on public key infrastructures, services and applications (EuroPKI 2012), 13-14 September 2012, Pisa, Italy. Lecture notes in computer science, 7868. Heidelberg: Springer [online], pages 69-84. Available from: https://doi.org/10.1007/978-3-642-40012-4_5

As people use an increasing number of smart devices for their everyday computing, it is surprising that these powerful, internet-enabled devices are rarely connected together to create personal networks. The webinos project is an attempt to make this... Read More about Personal PKI for the smart device era..

Security lessons learned building concept apps for webinos. (2013)
Presentation / Conference
FAILY, S. and LYLE, J. 2013. Security lessons learned building concept apps for webinos. Presented at the Human aspects in mobile apps engineering workshop (HAMAE 2013), part of the 27th International BCS human computer interaction conference (HCI 2013): the Internet of Things, 9 September 2013, London, UK.

Concept applications provide a means for tackling security infrastructure problems. Not only do they provide feedback to infrastructure design, they can also inform subsequent research activities. However, to directly influence the architectural desi... Read More about Security lessons learned building concept apps for webinos..

Security patterns considered harmful? (2013)
Conference Proceeding
FAILY, S. 2013. Security patterns considered harmful? In Proceedings of the 2nd International workshop on cyberpatterns (Cyberpatterns 2013): unifying design patterns with security, attack and forensic patterns, 8-9 July 2013, Abingdon, UK. Oxford: Oxford Brookes University, pages 108-109.

While a useful source of repeatable security knowledge, ambiguity about what security patterns are and how they might be applied call into question their reliability as a design tool. To provoke discussion about their usefulness, this paper claims th... Read More about Security patterns considered harmful?.

Proceedings of the Workshop on web applications and secure hardware (WASH 2013). (2013)
Conference Proceeding
LYLE, J., FAILY, S. and WINANDY, M. (eds.) 2013. Proceedings of the Workshop on web applications and secure hardware (WASH 2013), co-located with the 6th International conference on trust and trustworthy computing (TRUST 2013), 20 June 2013, London, UK. CEUR workshop proceedings, 1011. Aachen: CEUR-WS [online]. Available from: http://ceur-ws.org/Vol-1011/

Web browsers are becoming the platform of choice for applications that need to work across a wide range of different devices, including mobile phones, tablets, PCs, TVs and in-car systems. However, for web applications which require a higher level of... Read More about Proceedings of the Workshop on web applications and secure hardware (WASH 2013)..

Guidelines for integrating personas into software engineering tools. (2013)
Conference Proceeding
FAILY, S. and LYLE, J. 2013. Guidelines for integrating personas into software engineering tools. In Proceedings of the 5th ACM SIGCHI symposium on engineering interactive computing systems (EICS 2013), 24-27 June 2013, London, UK. New York: ACM [online], pages 69-74. Available from: https://doi.org/10.1145/2494603.2480318

Personas have attracted the interest of many in the usability and software engineering communities. To date, however, there has been little work illustrating how personas can be integrated into software tools to support these engineering activities.... Read More about Guidelines for integrating personas into software engineering tools..

Formal evaluation of persona trustworthiness with EUSTACE. (2013)
Presentation / Conference
FAILY, S., POWER, D., ARMSTRONG, P. and FLÉCHAIS, I. 2013. Formal evaluation of persona trustworthiness with EUSTACE. Presented at the 6th International conference on trust and trustworthy computing (TRUST 2013), 17-19 June 2013, London, UK.

Personas are useful for considering how users of a system might behave, but problematic when accounting for hidden behaviours not obvious from their descriptions alone. Formal methods can potentially identify such subtleties in interactive systems, b... Read More about Formal evaluation of persona trustworthiness with EUSTACE..

Designing interactive secure systems: CHI 2013 special interest group. (2013)
Conference Proceeding
FAILY, S., COLES-KEMP, L., DUNPHY, P., JUST, M., AKAMA, Y. and DE LUCA, A. 2013. Designing interactive secure systems: CHI 2013 special interest group. In Baudisch, P., Beaudouin-Lafon, M. and Mackay, W.E. (eds.) Extended abstracts from the 31st Annual CHI conference on human factors in computing systems (CHI 2013): changing perspectives, 27 April - 2 May 2013, Paris, France. New York: ACM [online], volume 3, pages 2469-2472. Available from: https://doi.org/10.1145/2468356.2468807

Despite a growing interest in the design and engineering of interactive secure systems, there is also a noticeable amount of fragmentation. This has led to a lack of awareness about what research is currently being carried out, and misunderstandings... Read More about Designing interactive secure systems: CHI 2013 special interest group..

Extending the web to support personal network services. (2013)
Conference Proceeding
LYLE, J., NILSSON, C., ISBERG, A. and FAILY, S. 2013. Extending the web to support personal network services. In Proceedings of the 28th Annual ACM symposium on applied computing (SAC 2013), 18-22 March 2013, Coimbra, Portugal. New York: ACM [online], volume 1, pages 711-716. Available from: https://doi.org/10.1145/2480362.2480499

Web browsers are able to access resources hosted anywhere in the world, yet content and features on personal devices remain largely inaccessible. Because of routing, addressing and security issues, web applications are unable to use local sensors, ca... Read More about Extending the web to support personal network services..

Requirements sensemaking using concept maps. (2012)
Conference Proceeding
FAILY, S., LYLE, J., PAUL, A., ATZENI, A., BLOMME, D., DESRUELLE, H. and BANGALORE, K. 2012. Requirements sensemaking using concept maps. In Winckler, M., Forbrig, P. and Bernhaupt, R. (eds.) Human-centered software engineering: proceedings of the 4th International conference on human-centered software engineering (HCSE 2012), 29-31 October 2012, Toulouse, France. Lecture notes in computer science, 7623. Heidelberg: Springer [online], pages 217-232. Available from: https://doi.org/10.1007/978-3-642-34347-6_13

Requirements play an important role in software engineering, but their perceived usefulness means that they often fail to be properly maintained. Traceability is often considered a means for motivating and maintaining requirements, but this is diffic... Read More about Requirements sensemaking using concept maps..

On the design and development of webinos: a distributed mobile application middleware. (2012)
Conference Proceeding
LYLE, J., FAILY, S., FLÉCHAIS, I., PAUL, A., GÖKER, A., MYRHAUG, H., DESRUELLE, H. and MARTIN, A. 2012. On the design and development of webinos: a distributed mobile application middleware. In Göschka, K.M. and Haridi, S. (eds.) Distributed applications and interoperable systems: proceedings of the 12th International Federation for Information Processing (IFIP) Working Group 6.1 international conference on distributed applications and interoperable systems (DAIS 2012), 13-16 June 2012, Stockholm, Sweden. Lecture notes in computer science, 7272. Heidelberg: Springer [online], pages 140-147. Available from: https://doi.org/10.1007/978-3-642-30823-9_12

As personal devices become smarter, opportunities arise for sharing services, applications and data between them. While web technologies hold the promise of being a unifying layer, browsers lack functionality for supporting inter-device communication... Read More about On the design and development of webinos: a distributed mobile application middleware..

Model-driven architectural risk analysis using architectural and contextualised attack patterns. (2012)
Conference Proceeding
FAILY, S., LYLE, J., NAMILUKO, C., ATZENI, A. and CAMERONI, C. 2012. Model-driven architectural risk analysis using architectural and contextualised attack patterns. In Proceedings of the 1st Model-driven security workshop (MDsec 2012), co-located with the 15th International conference on model-driven engineering languages and systems (MoDELS 2012), 1-5 October 2012, Innsbruck, Austria. New York: ACM [online], article number 3. Available from: https://doi.org/10.1145/2422498.2422501

A secure system architecture is often based on a variety of design and security model elements. Without some way of evaluating the impact of these individual design elements in the face of possible attacks, design flaws may weaken a software architec... Read More about Model-driven architectural risk analysis using architectural and contextualised attack patterns..

Proceedings of the Designing interactive secure systems workshop (DISS 2012). (2012)
Conference Proceeding
FAILY, S., FLÉCHAIS, I. and COLES-KEMP, L. (eds.) 2012. Proceedings of the Designing interactive secure systems workshop (DISS 2012), part of the 26th International BCS human computer interaction conference (HCI 2012): people and computers, 11 September 2012, Birmingham, UK. Swindon: BCS [online], article numbers 62-70. Preface available from: https://doi.org/10.14236/ewic/HCI2012.70

In recent years, the field of usable security has attracted researchers from HCI and Information Security, and led to a better understanding of the interplay between human factors and security mechanisms. Despite these advances, designing systems whi... Read More about Proceedings of the Designing interactive secure systems workshop (DISS 2012)..

Secure system? Challenge accepted: finding and resolving security failures using security premortems. (2012)
Conference Proceeding
FAILY, S., PARKIN, S. and LYLE, J. 2012. Secure system? Challenge accepted: finding and resolving security failures using security premortems. In Faily, S., Fléchais, I. and Coles-Kemp, L. (eds.) Proceedings of the Designing interactive secure systems workshop (DISS 2012), part of the 26th International BCS human computer interaction conference (HCI 2012): people and computers, 11 September 2012, Birmingham, UK. Swindon: BCS [online], article number 66. Available from: https://doi.org/10.14236/ewic/HCI2012.66

Risk-driven approaches are dominant in secure systems design; these aim to elicit and treat vulnerabilities and the threats exploiting them. Such approaches, however, are so focused on driving risks out of system design, they fail to recognise the us... Read More about Secure system? Challenge accepted: finding and resolving security failures using security premortems..

Software for interactive secure systems design: lessons learned developing and applying CAIRIS. (2012)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2012. Software for interactive secure systems design: lessons learned developing and applying CAIRIS. In Faily, S., Fléchais, I. and Coles-Kemp, L. (eds.) Proceedings of the Designing interactive secure systems workshop (DISS 2012), part of the 26th International BCS human computer interaction conference (HCI 2012): people and computers, 11 September 2012, Birmingham, UK. Swindon: BCS [online], article number 64. Available from: https://doi.org/10.14236/ewic/HCI2012.64

As systems become more complex, the potential for security vulnerabilities being introduced increases. If we are to provide assurances about systems we design then we need the means of analysing, managing, and generally making sense of the data that... Read More about Software for interactive secure systems design: lessons learned developing and applying CAIRIS..