Author image not provided
 Naranker Dulay

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article10.77
Citation Count905
Publication count84
Publication years1987-2015
Available for download16
Average downloads per article363.50
Downloads (cumulative)5,816
Downloads (12 Months)308
Downloads (6 Weeks)29
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


84 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 84
Result page: 1 2 3 4 5

Sort by:

1
September 2015 STM 2015: Proceedings of the 11th International Workshop on Security and Trust Management - Volume 9331
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

In this paper we describe a new approach that uses multi-criteria decision making and the analytic hierarchy process AHP for integrating privacy and safety criteria into planning tasks. We apply the approach to the journey planning using two criteria: i a willingness-to-share-data WSD metric to control data disclosure, and ii ...
Keywords: Multi-criteria decision making, Information privacy, Smart city applications, Analytic hierarchy process, Personal safety

2
September 2015 SASOW '15: Proceedings of the 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Socio-technical systems are systems where autonomous humans and computational entities collectively collaborate with each other to satisfy their goals in a dynamic environment. To be resilient, such systems need to adapt to unexpected human behaviours and exogenous changes in the environment. In this paper, we describe a framework for the ...
Keywords: Socio-Technical Systems, Ensembles, Collective Adaptation, Multi-criteria Decision Making

3 published by ACM
September 2014 MobileHCI '14: Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 7,   Downloads (12 Months): 98,   Downloads (Overall): 512

Full text available: PDFPDF
Short term studies in controlled environments have shown that user behaviour is consistent enough to predict disruptive smartphone notifications. However, in practice, user behaviour changes over time (concept drift) and individual user preferences need to be considered. There is a lack of research on which methods are best suited for ...
Keywords: machine learning, smartphone, experience sampling, interruptions

4 published by ACM
September 2014 UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 3,   Downloads (12 Months): 50,   Downloads (Overall): 275

Full text available: PDFPDF
This paper is prompted by the overall question 'what is the most effective way to recognise disruptive smartphone interruptions?'. We design our experiments to answer 3 questions: 'Do users revise what they perceive as disruptive incoming calls as time goes by?', 'How do different types of machine-learners (lazy, eager, evolutionary, ...
Keywords: notifications, interruptions, smartphones, learning

5 published by ACM
August 2014 ACM Transactions on Information and System Security (TISSEC): Volume 17 Issue 1, August 2014
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 6,   Downloads (12 Months): 25,   Downloads (Overall): 272

Full text available: PDFPDF
Access control policies define what resources can be accessed by which subjects and under which conditions. It is, however, often not possible to anticipate all subjects that should be permitted access and the conditions under which they should be permitted. For example, predicting and correctly encoding all emergency and exceptional ...
Keywords: logic programming, Security, access control, break-glass access control, many-valued logics

6
July 2012 POLICY '12: Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

Home networks are becoming increasingly complex but existing management solutions are not simple to use since they are not tailored to the needs of typical home-users. In this paper we present a new approach to home network management that allows users to formulate quite sophisticated "comic-strip" policies using an attractive ...

7
June 2012 Journal of Network and Systems Management: Volume 20 Issue 2, June 2012
Publisher: Plenum Press
Bibliometrics:
Citation Count: 2

The advent of mobile and ubiquitous systems has enabled the development of autonomous systems such as wireless-sensors for environmental data collection and teams of collaborating Unmanned Autonomous Vehicles (UAVs) used in missions unsuitable for humans. However, with these range of new application-domains comes a new challenge--enabling self-management in mobile autonomous ...
Keywords: Collaborating autonomous vehicles, Communication failure recovery, Mission management, Autonomic management

8
October 2011 CNSM '11: Proceedings of the 7th International Conference on Network and Services Management
Publisher: International Federation for Information Processing
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 0,   Downloads (Overall): 57

Full text available: PDFPDF
Experimental evidence from recent measurement studies has shown that bandwidth bottlenecks usually reside at the edges of the Internet, which is also true for residential networks where users share network resources and there is a need to regulate the usage of bandwidth. In this paper we introduce a rule-based approach ...

9 published by ACM
August 2011 HomeNets '11: Proceedings of the 2nd ACM SIGCOMM workshop on Home networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 15,   Downloads (Overall): 127

Full text available: PDFPDF
Home networks are a fast growing market but managing them is a difficult task, and diagnosing faults is even more challenging. Current fault management tools provide comprehensive information about the network and the devices but it is left to the user to interpret and reason about the data and experiment ...
Keywords: argumentation, fault diagnosis

10
August 2011 Journal of Computer Security - DBSEC 2008: Volume 19 Issue 3, August 2011
Publisher: IOS Press
Bibliometrics:
Citation Count: 19

Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and computation overheads if only a subset of the data is required, for example, ...
Keywords: Searchable encryption, secure data outsourcing, proxy encryption

11 published by ACM
June 2011 SACMAT '11: Proceedings of the 16th ACM symposium on Access control models and technologies
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 0,   Downloads (12 Months): 15,   Downloads (Overall): 470

Full text available: PDFPDF
Access control operates under the assumption that it is possible to correctly encode and predict all subjects' needs and rights. However, in human-centric pervasive domains, such as health care, it is hard if not impossible to encode all emergencies and exceptions, but also to imagine a priori all the permissible ...
Keywords: access control, beak-glass, emergency management, policy

12
April 2011 Journal of Systems and Software: Volume 84 Issue 4, April, 2011
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 6

Abstract: With the inclusion of actuators on wireless nodes, Wireless Sensor Networks (WSNs) are starting to change from sense-and-report platforms to sense-and-react platforms. Applications for such platforms are characterised by actuator nodes that are able to react to data collected by sensor nodes. Sensor and actuator nodes use a variety ...
Keywords: Sense-and-react applications, Separation of concerns, Wireless Sensor Networks, Component-based software engineering, Policy-based composition, Publish/subscribe middleware

13 published by ACM
September 2010 UbiComp '10: Proceedings of the 12th ACM international conference on Ubiquitous computing
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 3,   Downloads (12 Months): 32,   Downloads (Overall): 930

Full text available: PDFPDF
The mobile phone offers a unique opportunity to predict a person's behaviour automatically for advanced ubiquitous services. In this note, we analyse cellular data collected as part of the Reality Mining project and use information-theoretic concepts to answer three questions (i) What time points in the day help predict a ...
Keywords: human behaviour, machine learning, mobile phone

14
July 2010 POLICY '10: Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and Networks
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 4

Policies could potentially be an important and cost-effective technique for building and managing pervasive systems. Historically, policy-based systems have been built using a policy environment that supports the specification and enforcement of policies for a range of management concerns such as adaptation and security. In this short paper we describe ...
Keywords: Policy systems, Ponder2, teleo-reactive programs, Android OS

15
July 2010 POLICY '10: Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and Networks
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

In a disaster-recovery mission, rescuers need to coordinate their operations and exchange information to make the right judgments and perform their statutory duties. The information exchanged may be privileged or sensitive and not generally in the public domain. For instance, the assessment of the risk level in the disaster area ...
Keywords: Usage Control, OppNets, Crisis Management, Coordination, Shared Data Space

16
June 2010 ISARCS'10: Proceedings of the First international conference on Architecting Critical Systems
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 5

The increasing complexity of software systems entails large effort to jointly analyze their non-functional attributes in order to identify potential tradeoffs among them (e.g. increased availability can lead to performance degradation). In this paper we propose a framework for the architectural analysis of software performance degradation induced by security solutions. ...
Keywords: performance, GSPN, UML, security, tradeoff analysis

17
June 2010 DAIS'10: Proceedings of the 10th IFIP WG 6.1 international conference on Distributed Applications and Interoperable Systems
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Distributed applications are often built from sets of distributed components that must be co-ordinated in order to achieve some global behaviour. The common approach is to use a centralised controller for co-ordination, or occasionally a set of distributed entities. Centralised co-ordination is simpler but introduces a single point of failure ...

18
June 2010 DAIS 2010: Proceedings of the 10th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems - Volume 6115
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Distributed applications are often built from sets of distributed components that must be co-ordinated in order to achieve some global behaviour. The common approach is to use a centralised controller for co-ordination, or occasionally a set of distributed entities. Centralised co-ordination is simpler but introduces a single point of failure ...

19
June 2010 Science of Computer Programming: Volume 75 Issue 6, June, 2010
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 2

This paper focuses on the protection of the confidentiality of the data space content when Shared Data Spaces are deployed in open, possibly hostile, environments. In previous approaches, the data space content was protected against access from unauthorised application components by means of access control mechanisms. The basic assumption is ...
Keywords: Encrypted Shared Data Space, No shared key, Advance proxy encryption scheme, Encrypted searches

20
May 2010 Personal and Ubiquitous Computing: Volume 14 Issue 4, May 2010
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 3,   Downloads (Overall): 35

Full text available: PDFPDF
We present a ubiquitous system that combines context information, security mechanisms and a transport infrastructure to provide authentication and secure transport of works of art. Authentication is provided for both auctions and exhibitions, where users can use their own mobile devices to authenticate works of art. Transport is provided by ...
Keywords: Authentication, Ubiquitous systems



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us