Fairer usage contracts for DRM A Arnab, A Hutchison Proceedings of the 5th ACM workshop on Digital rights management, 1-7, 2005 | 51 | 2005 |
Persistent access control: A formal model for drm A Arnab, A Hutchison Proceedings of the 2007 ACM workshop on Digital Rights Management, 41-53, 2007 | 46 | 2007 |
Generating network security protocol implementations from formal specifications B Tobler, ACM Hutchison IFIP World Computer Congress, TC 11, 33-53, 2004 | 40 | 2004 |
Requirement analysis of enterprise DRM systems A Arnab, A Hutchison University of Cape Town, 2005 | 38 | 2005 |
Digital rights management-an overview of current challenges and solutions A Arnab, A Hutchison University of Cape Town, 2004 | 38 | 2004 |
Electronic data interchange for health care A Hutchison, M Kaiserswerth, M Moser, A Schade IEEE communications Magazine 34 (7), 28-34, 1996 | 33 | 1996 |
Verifiable digital object identity system A Arnab, A Hutchison Proceedings of the ACM workshop on Digital rights management, 19-26, 2006 | 32 | 2006 |
An architecture for secure searchable cloud storage R Koletka, A Hutchison 2011 Information Security for South Africa, 1-7, 2011 | 29 | 2011 |
Security of mobile banking K Chikomo, MK Chong, A Arnab, A Hutchison University of Cape Town, South Africa, Tech. Rep., Nov 1, 1-10, 2006 | 28 | 2006 |
CSCW for strategic management in Swiss enterprises: an empirical study C Sauter, O Morger, T Mühlherr, A Hutchison, S Teufel Proceedings of the Fourth European Conference on Computer-Supported …, 1995 | 27 | 1995 |
Security and reliability requirements for advanced security event management R Rieke, L Coppolino, A Hutchison, E Prieto, C Gaber International Conference on Mathematical Methods, Models, and Architectures …, 2012 | 23 | 2012 |
SPEAR II-The Security Protocol Engineering and Analysis Resource E Saul, A Hutchison University of Cape Town, 1999 | 22 | 1999 |
Interfacing trusted applications with intrusion detection systems M Welz, A Hutchison International Workshop on Recent Advances in Intrusion Detection, 37-53, 2001 | 21 | 2001 |
Automated attack analysis and code generation in a multi-dimensional security protocol engineering framework S Lukell, A Hutchison University of Cape Town, 2003 | 20 | 2003 |
SPEAR: Security protocol engineering and analysis resources JP Bekmann, P De Goede, ACM Hutchison DIMACS Workshop on Design and Formal Verification of Security Protocols, 3-5, 1997 | 20 | 1997 |
Digital Rights Management-A Current Review A Arnab, A Hutchison University of Cape Town, 2004 | 19 | 2004 |
Extending ODRL to enable bi-directional communication A Arnab, A Hutchison University of Cape Town, 2005 | 18 | 2005 |
Enhancing Security Event Management Systems with Unsupervised Anomaly Detection. M Goldstein, S Asanger, M Reif, A Hutchison ICPRAM, 530-538, 2013 | 15 | 2013 |
Facilitating the modelling and automated analysis of cryptographic protocols E Saul, A Hutchison University of Cape Town, 2001 | 15 | 2001 |
Secure Routing for Wireless Mesh Networks S Asherson, A Hutchison University of Cape Town, 2006 | 14 | 2006 |