Michael Goldsmith
Michael Goldsmith
Associate Professor and Senior Research Fellow, Cybersecurity Centre, Department of Computer Science
Verifierad e-postadress på cs.ox.ac.uk
TitelCiteras avÅr
Modelling and Analysis of Security Protocols
P Ryan, S Schneider, M Goldsmith, G Lowe, B Roscoe
Addison Wesley, 2001
745*2001
Programming in occam 2
G Jones, M Goldsmith
Prentice-Hall, 1988
3861988
What is intransitive noninterference?
AW Roscoe, MH Goldsmith
Computer Security Foundations Workshop, 1999. Proceedings of the 12th IEEE …, 1999
1521999
Hierarchical compression for model-checking CSP or how to check 10 20 dining philosophers for deadlock
A Roscoe, P Gardiner, M Goldsmith, J Hulance, D Jackson, J Scattergood
Tools and Algorithms for the Construction and Analysis of Systems, 133-152, 1995
1511995
Understanding Insider Threat: A Framework for Characterising Attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
IEEE Security and Privacy Workshop on Research for Insider Threat (WRIT 2014 …, 2014
1382014
Insider attacks in cloud computing
AJ Duncan, S Creese, M Goldsmith
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
952012
The perfect ‘spy’ for model-checking cryptoprotocols
AW Roscoe, MH Goldsmith
Proceedings of DIMACS workshop on the design and formal verification of …, 1997
791997
FDR2 user manual
P Gardiner, M Goldsmith, J Hulance, D Jackson, AW Roscoe, ...
Formal Systems (Europe) Ltd, 2000
72*2000
Towards a conceptual model and reasoning structure for insider threat detection
P Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
672013
Authentication for pervasive computing
S Creese, M Goldsmith, B Roscoe, I Zakiuddin
Security in Pervasive Computing, 439-488, 2004
662004
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
P Legg, O Buckley, M Goldsmith, S Creese
IEEE Systems Journal 99, 1-10, 2015
622015
Guidelines for usable cybersecurity: past and present
JRC Nurse, S Creese, M Goldsmith, K Lamberts
Cyberspace Safety and Security (CSS), 2011 Third International Workshop on …, 2011
602011
The Attacker in Ubiquitous Computing Environments: Formalising the Threat Model
S Creese, M Goldsmith, B Roscoe, I Zakiuddin
Formal Aspects of Security and Trust, 2003
52*2003
Exploiting empirical engagement in authentication protocol design
S Creese, M Goldsmith, R Harrison, B Roscoe, P Whittaker, I Zakiuddin
Security in Pervasive Computing, 119-133, 2005
472005
Denotational semantics for occam 2
MH Goldsmith, AW Roscoe, BG Scott
Transputer Communications, 1993
431993
Information Quality and Trustworthiness: A Topical State-of-the-Art Review
JRC Nurse, SS Rahman, S Creese, M Goldsmith, K Lamberts
International Conference on Computer Applications and Network Security, 2011
392011
Trustworthy and effective communication of cybersecurity risks: a review
JRC Nurse, S Creese, M Goldsmith, K Lamberts
1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) at 5th …, 2011
372011
A data-reachability model for elucidating privacy and security risks related to the use of online social networks
S Creese, M Goldsmith, JRC Nurse, E Phillips
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
332012
A Conceptual Model for Privacy Policies with Consent and Revocation Requirements
MC Mont, S Pearson, S Creese, M Goldsmith, N Papanikolaou
Privacy and Identity Management for Life: 6th IFIP WG 9. 2, 9. 6/11. 7, 11 …, 2011
332011
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
322015
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20