• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
19952014

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2013

    Reasoning about delegation and account access in retail payment systems

    Chin, S. K. & Older, S., Jan 1 2013, HCI International 2013 - Posters' Extended Abstracts - International Conference, HCI International 2013, Proceedings. PART II ed. Springer Verlag, p. 99-114 16 p. (Communications in Computer and Information Science; vol. 374, no. PART II).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2010

    Credentials management for high-value transactions

    Benson, G., Chin, S. K., Croston, S., Jayaraman, K. & Older, S., 2010, Computer Network Security - 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, Proceedings. p. 169-182 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6258 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Policy-based design and verification for mission assurance

    Chin, S. K., Muccio, S., Older, S. & Vestal, T. N. J., 2010, Computer Network Security - 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, Proceedings. p. 125-138 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6258 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2007

    Reasoning about delegation and Account access in retail payment systems

    Chin, S. K. & Older, S., Dec 1 2007, Computer Network Security - Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, Proceedings. p. 99-114 16 p. (Communications in Computer and Information Science; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2005

    A modal logic for role-based access control

    Kosiyatrakul, T., Older, S. & Chin, S. K., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 179-193 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3685 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • 2003

    Outcomes-based assessment as an assurance education tool

    Older, S. & Chin, S. K., 2003, Security Education and Critical Infrastructures - IFIP TC11/WG11.8 3rd Annual World Conference on Information Security Education, WISE 3. Springer New York LLC, p. 179-196 18 p. (IFIP Advances in Information and Communication Technology; vol. 125).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1999

    Formal development of secure Email

    Zhou, D., Kuo, J. C., Older, S. B. & Chin, S. K., 1999, Proceedings of the Hawaii International Conference on System Sciences. IEEE Computer Society, p. 132 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations