Paul Kearney
Paul Kearney
Professor of Cybersecurity, Birmingham City University
Verified email at
Cited by
Cited by
Agent oriented analysis using MESSAGE/UML
G Caire, W Coulier, F Garijo, J Gomez, J Pavon, F Leal, P Chainho, ...
Agent-Oriented Software Engineering II: Second International Workshop, AOSE …, 2002
Trust tokens
MM Gifford, NH Edwards, PJ Kearney
US Patent 7,627,895, 2009
Towards a trust and contract management framework for dynamic virtual organisations
T Dimitrakos, D Golby, P Kearney
eAdoption and the Knowledge Economy: eChallenges 2004, 27-29, 2004
MESSAGE: Methodology for engineering systems of software agents
R Evans, P Kearney, G Caire, F Garijo, J Gomez Sanz, J Pavon, F Leal, ...
EURESCOM, EDIN, 0223-0907, 2001
Integrating AI planning techniques with workflow management system
P Kearney
Knowledge-Based Systems 15 (5-6), 285-291, 2002
Regge theory and QCD in large-angle scattering
PDB Collins, PJ Kearney
Zeitschrift für Physik C Particles and Fields 22, 277-288, 1984
An approach to modular and testable security models of real-world health-care applications
AD Brucker, L Brügger, P Kearney, B Wolff
Proceedings of the 16th ACM symposium on Access control models and …, 2011
Verified firewall policy transformations for test case generation
AD Brucker, L Brügger, P Kearney, B Wolff
2010 Third International Conference on Software Testing, Verification and …, 2010
Cyber security of smart homes: Development of a reference architecture for attack surface analysis
K Ghirardello, C Maple, D Ng, P Kearney
Living in the Internet of Things: Cybersecurity of the IoT-2018, 1-10, 2018
An overview of Web Services security
P Kearney, J Chapman, N Edwards, M Gifford, L He
BT Technology Journal 22 (1), 27-42, 2004
Message level security for web services
P Kearney
Information Security Technical Report 10 (1), 41-50, 2005
Work allocation system
SG Thompson, TJ Stark, PJ Kearney
US Patent 7,451,449, 2008
Embodiment of evolutionary computation in general agents
RE Smith, C Bonacina, P Kearney, W Merlat
Evolutionary Computation 8 (4), 475-493, 2000
Cyber-risks in the industrial internet of things (IIoT): towards a method for continuous assessment
C Adaros Boye, P Kearney, M Josephs
Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018
Security: the human factor
P Kearney
IT Governance Publishing, 2010
Dealing with trust and control: a meta-model for trustworthy information systems development
M Pavlidis, H Mouratidis, S Islam, P Kearney
2012 Sixth International Conference on Research Challenges in Information …, 2012
Modeling trust relationships for developing trustworthy information systems
M Pavlidis, S Islam, H Mouratidis, P Kearney
International Journal of Information System Modeling and Design (IJISMD) 5 …, 2014
A model-based approach to trust, security and assurance
BT Technology Journal 24 (4), 53, 2006
Emergent behaviour in a multi-agent economic situation
PE Kearney, A Sehmi, RM Smith
Proceedings of the 11th European Conference on Artificial Intelligence, 284-288, 1994
MESSAGE: a methodology for the development of agent-based applications
W Coulier, F Garijo, J Gomez, J Pavon, P Kearney, P Massonet
Methodologies and Software Engineering for Agent Systems-The Agent-Oriented …, 2004
The system can't perform the operation now. Try again later.
Articles 1–20