Skip to main content

Research Repository

Advanced Search

All Outputs (9)

Developing secure, unified, multi-device, and multi-domain platforms: a case study from the webinos project. (2014)
Book Chapter
ATZENI, A., LYLE, J. and FAILY, S. 2014. Developing secure, unified, multi-device, and multi-domain platforms: a case study from the webinos project. In Ruiz-Martinez, A., Marin-Lopez, R. and Pereniguez-Garcia, F. (eds.) Architectures and protocols for secure information technology infrastructures. Hershey: IGI Global [online], chapter 12, pages 310-333. Available from: https://doi.org/10.4018/978-1-4666-4514-1.ch012

The need for integrated cross-platform systems is growing. Such systems can enrich the user experience, but also lead to greater security and privacy concerns than the sum of their existing components. To provide practical insights and suggest viable... Read More about Developing secure, unified, multi-device, and multi-domain platforms: a case study from the webinos project..

Ethical hacking assessment as a vehicle for undergraduate cyber-security education. (2014)
Conference Proceeding
FAILY, S. 2014. Ethical hacking assessment as a vehicle for undergraduate cyber-security education. In Uhomoibhi, J.O., Linecar, P., Barikzai, S., Ross, M. and Staples, G. (eds.) Global issues in IT education: proceedings of the 19th International conference on software process improvement research, education and training (INSPIRE 2014), 15 April 2014, Southampton, UK. Southampton: Solent University, pages 79-90.

The need for cyber security professionals in the UK is growing, motivating the need to introduce cybersecurity at an earlier stage of an undergraduate's education. However, despite on-going interest in cybersecurity pedagogy, there has been comparati... Read More about Ethical hacking assessment as a vehicle for undergraduate cyber-security education..

Engaging stakeholders in security design: an assumption-driven approach. (2014)
Conference Proceeding
FAILY, S. 2014. Engaging stakeholders in security design: an assumption-driven approach. In Clarke, N.L. and Furnell, S.M. (eds.) Proceedings of the 8th International symposium on human aspects of information security and assurance (HAISA 2014), 8-9 July 2014, Plymouth, UK. Plymouth: Plymouth University, pages 21-29.

System stakeholders fail to engage with security until comparatively late in the design and development process. User Experience artefacts like personas and scenarios create this engagement, but creating and contextualising them is difficult without... Read More about Engaging stakeholders in security design: an assumption-driven approach..

Finding and resolving security misusability with misusability cases. (2014)
Journal Article
FAILY, S. and FLÉCHAIS, I. 2016. Finding and resolving security misusability with misusability cases. Requirements engineering [online], 21(2), pages 209-223. Available from: https://doi.org/10.1007/s00766-014-0217-8

Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice-versa. One way of using scenarios to bridge security and usability involves explicitly descr... Read More about Finding and resolving security misusability with misusability cases..

Eliciting and visualising trust expectations using persona trust characteristics and goal models. (2014)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2014. Eliciting and visualising trust expectations using persona trust characteristics and goal models. In Lanubile, F. and Ali, R. (eds.) Proceedings of the 6th International workshop on social software engineering (SSE 2014), 17 November 2014, Hong Kong, China. New York: ACM [online], pages 17-24. Available from: https://doi.org/10.1145/2661685.2661690

Developers and users rely on trust to simplify complexity when building and using software. Unfortunately, the invisibility of trust and the richness of a system's context of use means that factors influencing trust are difficult to see, and assessin... Read More about Eliciting and visualising trust expectations using persona trust characteristics and goal models..

Authorisation in context: incorporating context-sensitivity into an access control framework. (2014)
Conference Proceeding
FAILY, S., LYLE, J., FLÉCHAIS, I., ATZENI, A., CAMERONI, C., MYRHAUG, H., GÖKER, A. and KLEINFELD, R. 2014. Authorisation in context: incorporating context-sensitivity into an access control framework. In Proceedings of the 28th International BCS human computer interaction conference (HCI 2014): sand, sea and sky: holiday HCI, 9-12 September 2014, Southport, UK. Swindon: BCS, pages 189-194. Hosted on ScienceOpen [online]. Available from: https://doi.org/10.14236/ewic/hci2014.29

With sensitive information about ourselves now distributed across personal devices, people need to make access control decisions for different contexts of use. However, despite advances in improving the usability of access control for both developers... Read More about Authorisation in context: incorporating context-sensitivity into an access control framework..

Proceedings of the 1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014). (2014)
Conference Proceeding
BECKERS, K., FAILY, S., LEE, S.-W. and MEAD, N. (eds.) 2014. Proceedings of the 1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014), co-located with the 22nd IEEE international requirements engineering conference (RE 2014), 25 August 2014, Karlskrona, Sweden. Piscataway: IEEE [online]. Available from: https://ieeexplore.ieee.org/xpl/conhome/6883269/proceeding

The main focus of ESPRE is to bring together practitioners and researchers interested in security and privacy requirements. ESPRE probes the interfaces between requirements engineering, security and privacy, and takes the first step in evolving secur... Read More about Proceedings of the 1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014)..

Online reviews as first class artifacts in mobile app development. (2014)
Conference Proceeding
IACOB, C., HARRISON, R. and FAILY, S. 2014. Online reviews as first class artifacts in mobile app development. In Memmi, G. and Blanke, U. (eds.) Mobile computing, applications and services: revised selected papers from the proceedings of the 5th International conference on mobile computing, applications and services (MobiCase 2013), 7-8 November 2013, Paris, France. Lecture notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 130. Cham: Springer [online], pages 47-53. Available from: https://doi.org/10.1007/978-3-319-05452-0_4

This paper introduces a framework for developing mobile apps. The framework relies heavily on app stores and, particularly, on online reviews from app users. The underlying idea is that app stores are proxies for users because they contain direct fee... Read More about Online reviews as first class artifacts in mobile app development..

Evaluating the implications of attack and security patterns with premortems. (2014)
Book Chapter
FAILY, S., PARKIN, S. and LYLE, J. 2014. Evaluating the implications of attack and security patterns with premortems. In Blackwell, C. and Zhu, H. (eds.) Cyberpatterns: unifying design patterns with security and attack patterns. Cham: Springer [online], chapter 16, pages 199-209. Available from: https://doi.org/10.1007/978-3-319-04447-7_16

Security patterns are a useful way of describing, packaging and applying security knowledge which might otherwise be unavailable. However, because patterns represent partial knowledge of a problem and solution space, there is little certainty that ad... Read More about Evaluating the implications of attack and security patterns with premortems..