Calculated based on number of publications stored in Pure and citations from Scopus
19952014

Research activity per year

Filter
Conference contribution

Search results

  • 2013

    Reasoning about delegation and account access in retail payment systems

    Chin, S. K. & Older, S., 2013, HCI International 2013 - Posters' Extended Abstracts - International Conference, HCI International 2013, Proceedings. PART II ed. Springer Verlag, p. 99-114 16 p. (Communications in Computer and Information Science; vol. 374, no. PART II).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • 2010

    Credentials management for high-value transactions

    Benson, G., Chin, S. K., Croston, S., Jayaraman, K. & Older, S., 2010, Computer Network Security - 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, Proceedings. p. 169-182 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6258 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • Policy-based design and verification for mission assurance

    Chin, S. K., Muccio, S., Older, S. & Vestal, T. N. J., 2010, Computer Network Security - 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, Proceedings. p. 125-138 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6258 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    1 Scopus citations
  • 2007

    Reasoning about delegation and Account access in retail payment systems

    Chin, S. K. & Older, S., 2007, Computer Network Security - Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, Proceedings. p. 99-114 16 p. (Communications in Computer and Information Science; vol. 1).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • 2005

    A modal logic for role-based access control

    Kosiyatrakul, T., Older, S. & Chin, S. K., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 179-193 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3685 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    9 Scopus citations
  • 2003

    Outcomes-based assessment as an assurance education tool

    Older, S. & Chin, S. K., 2003, Security Education and Critical Infrastructures - IFIP TC11/WG11.8 3rd Annual World Conference on Information Security Education, WISE 3. Springer New York LLC, p. 179-196 18 p. (IFIP Advances in Information and Communication Technology; vol. 125).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
  • 1999

    Formal development of secure Email

    Zhou, D., Kuo, J. C., Older, S. & Chin, S. K., 1999, Proceedings of the Hawaii International Conference on System Sciences. IEEE Computer Society, p. 132 1 p.

    Research output: Chapter in Book/Entry/PoemConference contribution

    5 Scopus citations