John C. Mace
John C. Mace
Lecturer in Security, Newcastle University
Bestätigte E-Mail-Adresse bei ncl.ac.uk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The case for dynamic security solutions in public cloud workflow deployments
JC Mace, A Van Moorsel, P Watson
2011 IEEE/IFIP 41st International Conference on Dependable Systems and …, 2011
412011
A collaborative ontology development tool for information security managers
JC Mace, S Parkin, A van Moorsel
Proceedings of the 4th symposium on computer human interaction for the …, 2010
222010
Quantitative workflow resiliency
JC Mace, C Morisset, A Van Moorsel
European Symposium on Research in Computer Security, 344-361, 2014
212014
Printer Identification Techniques and Their Privacy Implications
J Mace
University of Newcastle upon Tyne, Computing Science, 2010
92010
Impact of policy design on workflow resiliency computation time
JC Mace, C Morisset, A Van Moorsel
International Conference on Quantitative Evaluation of Systems, 244-259, 2015
82015
Modelling user availability in workflow resiliency analysis
JC Mace, C Morisset, A van Moorsel
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-10, 2015
82015
WRAD: Tool Support for Workflow Resiliency Analysis and Design
JC Mace, C Morisset, A van Moorsel
International Workshop on Software Engineering for Resilient Systems, 79-87, 2016
62016
Resiliency variance in workflows with choice
JC Mace, C Morisset, A van Moorsel
International Workshop on Software Engineering for Resilient Systems, 128-143, 2015
62015
A multi-modelling based approach to assessing the security of smart buildings
JC Mace, C Morisset, K Pierce, C Gamble, C Maple, J Fitzgerald
IET Digital Library, 2018
32018
Ontology Editing Tool for Information Security and Human Factors Experts.
JC Mace, SE Parkin, APA van Moorsel
KMIS, 207-212, 2010
32010
ADaCS: A Tool for Analysing Data Collection Strategies
JC Mace, N Thekkummal, C Morisset, A Van Moorsel
European Workshop on Performance Engineering, 230-245, 2017
12017
Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations
JC Mace, RM Czekster, C Morisset, C Maple
2020 16th European Dependable Computing Conference (EDCC), 59-64, 2020
2020
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach
I Matthews, J Mace, S Soudjani, A van Moorsel
arXiv preprint arXiv:2005.06350, 2020
2020
A socio-technical ethical process for managing access to smart building data
JC Mace, C Morisset, L Smith
IET Digital Library, 2019
2019
Design Space Exploration for Secure Building Control
M Mansfield, C Morisset, C Gamble, JC Mace, K Pierce, J Fitzgerald
The 16th Overture Workshop, 71, 2018
2018
Tools and techniques for analysing the impact of information security
JC Mace
Newcastle University, 2017
2017
EDCC 2018
C Borchert, B Chapuis, J Durães, M Gratian, V Kulkarni, J Mace, ...
EDCC 2020
A Bondavalli, A Casimiro, S Collart-Dutilleul, M Cukier, T Dohi, S Donatelli, ...
EDCC 2019
E Anceaume, D Avresky, A Bondavalli, S Bouchenak, F Buccafurri, ...
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–19