Search the dblp DataBase
Howard Chivers :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Howard Chivers Information Modeling for Automated Risk Analysis. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:228-239 [Conf ] Howard Chivers , Richard F. Paige XRound: Bidirectional Transformations and Unifications Via a Reversible Template Language. [Citation Graph (0, 0)][DBLP ] ECMDA-FA, 2005, pp:205-219 [Conf ] Howard Chivers , Jeremy Jacob Specifying Information-Flow Controls. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:114-120 [Conf ] Xiaocheng Ge , Richard F. Paige , Fiona Polack , Howard Chivers , Phillip J. Brooke Agile development of secure web applications. [Citation Graph (0, 0)][DBLP ] ICWE, 2006, pp:305-312 [Conf ] Richard F. Paige , Howard Chivers , John A. McDermid , Zoë R. Stephenson High-integrity extreme programming. [Citation Graph (0, 0)][DBLP ] SAC, 2005, pp:1518-1523 [Conf ] Howard Chivers Trust Without Identification. [Citation Graph (0, 0)][DBLP ] SPC, 2006, pp:1-2 [Conf ] Howard Chivers , John A. Clark , Susan Stepney Smart Devices and Software Agents: The Basics of Good Behaviour. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:39-52 [Conf ] Emine G. Aydal , Richard F. Paige , Howard Chivers , Phillip J. Brooke Security Planning and Refactoring in Extreme Programming. [Citation Graph (0, 0)][DBLP ] XP, 2006, pp:154-163 [Conf ] Howard Chivers , Richard F. Paige , Xiaocheng Ge Agile Security Using an Incremental Security Architecture. [Citation Graph (0, 0)][DBLP ] XP, 2005, pp:57-65 [Conf ] Howard Chivers , John A. Clark Smart dust, friend or foe?--Replacing identity with configuration trust. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:46, n:5, pp:723-740 [Journal ] Howard Chivers , John A. McDermid Refactoring service-based systems: how to avoid trusting a workflow service. [Citation Graph (0, 0)][DBLP ] Concurrency and Computation: Practice and Experience, 2006, v:18, n:10, pp:1255-1275 [Journal ] John A. Clark , Susan Stepney , Howard Chivers Breaking the Model: Finalisation and a Taxonomy of Security Attacks. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:225-242 [Journal ] Howard Chivers , Martyn Fletcher Applying Security Design Analysis to a service-based system. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 2005, v:35, n:9, pp:873-897 [Journal ] Howard Chivers , Andrew Martin Editorial. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 2005, v:35, n:9, pp:799-800 [Journal ] Peter Laurens , Richard F. Paige , Phillip J. Brooke , Howard Chivers A Novel Approach to the Detection of Cheating in Multiplayer Online Games. [Citation Graph (0, 0)][DBLP ] ICECCS, 2007, pp:97-106 [Conf ] Recovery of Encryption Keys from Memory Using a Linear Scan. [Citation Graph (, )][DBLP ] Optimising IDS Sensor Placement. [Citation Graph (, )][DBLP ] Detecting Hidden Encrypted Volumes. [Citation Graph (, )][DBLP ] A Deployment Value Model for Intrusion Detection Sensors. [Citation Graph (, )][DBLP ] Risk profiles and distributed risk assessment. [Citation Graph (, )][DBLP ] Windows Vista and digital investigations. [Citation Graph (, )][DBLP ] Search in 0.009secs, Finished in 0.011secs