Skip to main content

Research Repository

Advanced Search

All Outputs (9)

Personal PKI for the smart device era. (2013)
Conference Proceeding
LYLE, J., PAVERD, A., KING-LACROIX, J., ATZENI, A., VIRJI, H., FLÉCHAIS, I. and FAILY, S. 2013. Personal PKI for the smart device era. In De Capitani di Vimercati, S. and Mitchell, C. (eds.) Public key infrastructures, services and applications: revised selected papers from the 9th European workshop on public key infrastructures, services and applications (EuroPKI 2012), 13-14 September 2012, Pisa, Italy. Lecture notes in computer science, 7868. Heidelberg: Springer [online], pages 69-84. Available from: https://doi.org/10.1007/978-3-642-40012-4_5

As people use an increasing number of smart devices for their everyday computing, it is surprising that these powerful, internet-enabled devices are rarely connected together to create personal networks. The webinos project is an attempt to make this... Read More about Personal PKI for the smart device era..

Continuous integration for web-based software infrastructures: lessons learned on the webinos project. (2013)
Conference Proceeding
SU, T., LYLE, J., ATZENI, A., FAILY, S., VIRJI, H., NTANOS, C. and BOTSIKAS, C. 2013. Continuous integration for web-based software infrastructures: lessons learned on the webinos project. In Bertacco, V. and Legay, A. (eds.) Hardware and software: verification and testing: proceedings of the 9th International Haifa verification conference (HVC 2013), 5-7 November 2013, Haifa, Israel. Lecture notes in computer science, 8244. Cham: Springer [online], pages 145-150. Available from: https://doi.org/10.1007/978-3-319-03077-7_10

Testing web-based software infrastructures is challenging. The need to interact with different services running on different devices, with different expectations for security and privacy contributes not only to the complexity of the infrastructure, b... Read More about Continuous integration for web-based software infrastructures: lessons learned on the webinos project..

Security lessons learned building concept apps for webinos. (2013)
Presentation / Conference
FAILY, S. and LYLE, J. 2013. Security lessons learned building concept apps for webinos. Presented at the Human aspects in mobile apps engineering workshop (HAMAE 2013), part of the 27th International BCS human computer interaction conference (HCI 2013): the Internet of Things, 9 September 2013, London, UK.

Concept applications provide a means for tackling security infrastructure problems. Not only do they provide feedback to infrastructure design, they can also inform subsequent research activities. However, to directly influence the architectural desi... Read More about Security lessons learned building concept apps for webinos..

Security patterns considered harmful? (2013)
Conference Proceeding
FAILY, S. 2013. Security patterns considered harmful? In Proceedings of the 2nd International workshop on cyberpatterns (Cyberpatterns 2013): unifying design patterns with security, attack and forensic patterns, 8-9 July 2013, Abingdon, UK. Oxford: Oxford Brookes University, pages 108-109.

While a useful source of repeatable security knowledge, ambiguity about what security patterns are and how they might be applied call into question their reliability as a design tool. To provoke discussion about their usefulness, this paper claims th... Read More about Security patterns considered harmful?.

Proceedings of the Workshop on web applications and secure hardware (WASH 2013). (2013)
Conference Proceeding
LYLE, J., FAILY, S. and WINANDY, M. (eds.) 2013. Proceedings of the Workshop on web applications and secure hardware (WASH 2013), co-located with the 6th International conference on trust and trustworthy computing (TRUST 2013), 20 June 2013, London, UK. CEUR workshop proceedings, 1011. Aachen: CEUR-WS [online]. Available from: http://ceur-ws.org/Vol-1011/

Web browsers are becoming the platform of choice for applications that need to work across a wide range of different devices, including mobile phones, tablets, PCs, TVs and in-car systems. However, for web applications which require a higher level of... Read More about Proceedings of the Workshop on web applications and secure hardware (WASH 2013)..

Guidelines for integrating personas into software engineering tools. (2013)
Conference Proceeding
FAILY, S. and LYLE, J. 2013. Guidelines for integrating personas into software engineering tools. In Proceedings of the 5th ACM SIGCHI symposium on engineering interactive computing systems (EICS 2013), 24-27 June 2013, London, UK. New York: ACM [online], pages 69-74. Available from: https://doi.org/10.1145/2494603.2480318

Personas have attracted the interest of many in the usability and software engineering communities. To date, however, there has been little work illustrating how personas can be integrated into software tools to support these engineering activities.... Read More about Guidelines for integrating personas into software engineering tools..

Formal evaluation of persona trustworthiness with EUSTACE. (2013)
Presentation / Conference
FAILY, S., POWER, D., ARMSTRONG, P. and FLÉCHAIS, I. 2013. Formal evaluation of persona trustworthiness with EUSTACE. Presented at the 6th International conference on trust and trustworthy computing (TRUST 2013), 17-19 June 2013, London, UK.

Personas are useful for considering how users of a system might behave, but problematic when accounting for hidden behaviours not obvious from their descriptions alone. Formal methods can potentially identify such subtleties in interactive systems, b... Read More about Formal evaluation of persona trustworthiness with EUSTACE..

Designing interactive secure systems: CHI 2013 special interest group. (2013)
Conference Proceeding
FAILY, S., COLES-KEMP, L., DUNPHY, P., JUST, M., AKAMA, Y. and DE LUCA, A. 2013. Designing interactive secure systems: CHI 2013 special interest group. In Baudisch, P., Beaudouin-Lafon, M. and Mackay, W.E. (eds.) Extended abstracts from the 31st Annual CHI conference on human factors in computing systems (CHI 2013): changing perspectives, 27 April - 2 May 2013, Paris, France. New York: ACM [online], volume 3, pages 2469-2472. Available from: https://doi.org/10.1145/2468356.2468807

Despite a growing interest in the design and engineering of interactive secure systems, there is also a noticeable amount of fragmentation. This has led to a lack of awareness about what research is currently being carried out, and misunderstandings... Read More about Designing interactive secure systems: CHI 2013 special interest group..

Extending the web to support personal network services. (2013)
Conference Proceeding
LYLE, J., NILSSON, C., ISBERG, A. and FAILY, S. 2013. Extending the web to support personal network services. In Proceedings of the 28th Annual ACM symposium on applied computing (SAC 2013), 18-22 March 2013, Coimbra, Portugal. New York: ACM [online], volume 1, pages 711-716. Available from: https://doi.org/10.1145/2480362.2480499

Web browsers are able to access resources hosted anywhere in the world, yet content and features on personal devices remain largely inaccessible. Because of routing, addressing and security issues, web applications are unable to use local sensors, ca... Read More about Extending the web to support personal network services..