Author image not provided
 Martin Hall-May

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article1.13
Citation Count9
Publication count8
Publication years2005-2013
Available for download1
Average downloads per article425.00
Downloads (cumulative)425
Downloads (12 Months)23
Downloads (6 Weeks)3
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


8 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 8 of 8
Sort by:

1 published by ACM
September 2013 ACM Transactions on Information and System Security (TISSEC): Volume 16 Issue 2, September 2013
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 3,   Downloads (12 Months): 23,   Downloads (Overall): 425

Full text available: PDFPDF
Access control is a critical feature of many systems, including networks of services, processes within a computer, and objects within a running process. The security consequences of a particular architecture or access control policy are often difficult to determine, especially where some components are not under our control, where components ...
Keywords: datalog, proxy certificates, Object-capabilities

2
June 2011 International Journal of Applied Mathematics and Computer Science - SPECIAL SECTION: Efficient Resource Management for Grid-Enabled Applications: Volume 21 Issue 2, Number 2 / June 2011
Publisher: Versita
Bibliometrics:
Citation Count: 1

The SERSCIS approach aims to support the use of interconnected systems of services in Critical Infrastructure (CI) applications. The problem of system interconnectedness is aptly demonstrated by 'Airport Collaborative Decision Making' (A-CDM). Failure or underperformance of any of the interlinked ICT systems may compromise the ability of airports to plan ...
Keywords: Soa, Sla, Critical Infrastructure, Qos, Resilience

3
June 2011 International Journal of Applied Mathematics and Computer Science: Volume 21 Issue 2, 6 2011
Publisher: Walter de Gruyter & Co.
Bibliometrics:
Citation Count: 0

Resilient critical infrastructure management with a service oriented architecture: A test case using airport collaborative decision makingThe SERSCIS approach aims to support the use of interconnected systems of services in Critical Infrastructure CI applications. The problem of system interconnectedness is aptly demonstrated by 'Airport Collaborative Decision Making' A-CDM. Failure or ...
Keywords: SLA, critical infrastructure, QoS, resilience, SOA

4
July 2010 CLOUD '10: Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Industrial adoption of cloud computing for collaborative business processes is limited by their ability to meet inter-enterprise security requirements. Although some clouds offerings comply with security standards, no solution today allows businesses to assess security compliance of applications at the business level and dynamically link to security countermeasures on-demand. In ...
Keywords: service-oriented architecture, clouds, trust, security, risk management

5
February 2010 CISIS '10: Proceedings of the 2010 International Conference on Complex, Intelligent and Software Intensive Systems
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

The SERSCIS project aims to support the use of interconnected systems of services in Critical Infrastructure (CI) applications. The problem of system interconnectedness is aptly demonstrated by 'Airport Collaborative Decision Making' (A-CDM). Failure or underperformance of any of the interlinked ICT systems may compromise the ability of airports to plan ...
Keywords: resilience, QoS, SOA, critical infrastructure, SLA

6
October 2009 Safety and Security in Multiagent Systems: Research Results from 2004-2006
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

The increasing role of Systems of Systems (SoS) in safety-critical applications establishes the need for methods to ensure their safe behaviour. One approach to ensuring this is by means of safety policy -- a set of rules that all the system entities must abide by. This paper proposes simulation as ...

7
September 2006 SAFECOMP'06: Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

A safety policy defines the set of rules that governs the safe interaction of agents operating together as part of a system of systems (SoS). Agent autonomy can give rise to unpredictable, and potentially undesirable, emergent behaviour. Deriving rules of safety policy requires an understanding of the capabilities of an ...

8
September 2005 SAFECOMP'05: Proceedings of the 24th international conference on Computer Safety, Reliability, and Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 3

A ‘system of systems' (SoS) comprises many other systems operating collectively with a shared purpose. Individual system autonomy can give rise to unpredictable, and potentially undesirable, emergent behaviour. A policy is a set of rules that bounds the behaviours of entities. Policy can be expressed at various levels of abstraction. ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us