The SCEAS System
Navigation Menu

Search the dblp DataBase


Howard Chivers: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Howard Chivers
    Information Modeling for Automated Risk Analysis. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:228-239 [Conf]
  2. Howard Chivers, Richard F. Paige
    XRound: Bidirectional Transformations and Unifications Via a Reversible Template Language. [Citation Graph (0, 0)][DBLP]
    ECMDA-FA, 2005, pp:205-219 [Conf]
  3. Howard Chivers, Jeremy Jacob
    Specifying Information-Flow Controls. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:114-120 [Conf]
  4. Xiaocheng Ge, Richard F. Paige, Fiona Polack, Howard Chivers, Phillip J. Brooke
    Agile development of secure web applications. [Citation Graph (0, 0)][DBLP]
    ICWE, 2006, pp:305-312 [Conf]
  5. Richard F. Paige, Howard Chivers, John A. McDermid, Zoë R. Stephenson
    High-integrity extreme programming. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1518-1523 [Conf]
  6. Howard Chivers
    Trust Without Identification. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:1-2 [Conf]
  7. Howard Chivers, John A. Clark, Susan Stepney
    Smart Devices and Software Agents: The Basics of Good Behaviour. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:39-52 [Conf]
  8. Emine G. Aydal, Richard F. Paige, Howard Chivers, Phillip J. Brooke
    Security Planning and Refactoring in Extreme Programming. [Citation Graph (0, 0)][DBLP]
    XP, 2006, pp:154-163 [Conf]
  9. Howard Chivers, Richard F. Paige, Xiaocheng Ge
    Agile Security Using an Incremental Security Architecture. [Citation Graph (0, 0)][DBLP]
    XP, 2005, pp:57-65 [Conf]
  10. Howard Chivers, John A. Clark
    Smart dust, friend or foe?--Replacing identity with configuration trust. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:46, n:5, pp:723-740 [Journal]
  11. Howard Chivers, John A. McDermid
    Refactoring service-based systems: how to avoid trusting a workflow service. [Citation Graph (0, 0)][DBLP]
    Concurrency and Computation: Practice and Experience, 2006, v:18, n:10, pp:1255-1275 [Journal]
  12. John A. Clark, Susan Stepney, Howard Chivers
    Breaking the Model: Finalisation and a Taxonomy of Security Attacks. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:225-242 [Journal]
  13. Howard Chivers, Martyn Fletcher
    Applying Security Design Analysis to a service-based system. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2005, v:35, n:9, pp:873-897 [Journal]
  14. Howard Chivers, Andrew Martin
    Editorial. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2005, v:35, n:9, pp:799-800 [Journal]
  15. Peter Laurens, Richard F. Paige, Phillip J. Brooke, Howard Chivers
    A Novel Approach to the Detection of Cheating in Multiplayer Online Games. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2007, pp:97-106 [Conf]

  16. Recovery of Encryption Keys from Memory Using a Linear Scan. [Citation Graph (, )][DBLP]

  17. Optimising IDS Sensor Placement. [Citation Graph (, )][DBLP]

  18. Detecting Hidden Encrypted Volumes. [Citation Graph (, )][DBLP]

  19. A Deployment Value Model for Intrusion Detection Sensors. [Citation Graph (, )][DBLP]

  20. Risk profiles and distributed risk assessment. [Citation Graph (, )][DBLP]

  21. Windows Vista and digital investigations. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002