Formalizing federated learning and differential privacy for GIS systems in IIIf

Conference paper


Kammueller, F., Piras, L., Fields, B. and Nagarajan, R. 2024. Formalizing federated learning and differential privacy for GIS systems in IIIf. 3rd International Workshop on System Security Assurance. Bydgoszcz, Poland 19 - 20 Sep 2024 Springer.
TypeConference paper
TitleFormalizing federated learning and differential privacy for GIS systems in IIIf
AuthorsKammueller, F., Piras, L., Fields, B. and Nagarajan, R.
Abstract

GIS systems, like Google maps or ArcGIS, are a ubiquitous central application but are highly privacy critical. In many GIS systems, inputs from various and diverse sensors potentially expose private information. However, in particular, in the context of public safety, the sensor inputs are crucial to provide timely information for example for weather related warning systems. The notion of Differential Privacy (DP) has become an ad hoc standard, most notably adopted for the US census. Federated Learning (FL) facilitates machine learning for mobile distributed scenarios. This paper proposes a notion of DP for FL for infrastructures with actors and policies formalized in the Isabelle Insider and Infrastructure framework (IIIf). To illustrate this extension of the IIIf by FL and DP on a practical example, we apply the extended framework to a case study from GIS systems for extreme weather warning to control privacy.

KeywordsSecurity and Privacy; Software and Application Security; Human-centered computing - Visualisation; Theory of computation - Logic
Sustainable Development Goals9 Industry, innovation and infrastructure
Middlesex University ThemeSustainability
Research Groupseta
Conference3rd International Workshop on System Security Assurance
PublisherSpringer
Publication process dates
Accepted21 Jul 2024
Deposited02 Oct 2024
Output statusAccepted
Accepted author manuscript
File Access Level
Open
LanguageEnglish
Permalink -

https://repository.mdx.ac.uk/item/1q96z4

Restricted files

Accepted author manuscript

  • 10
    total views
  • 1
    total downloads
  • 10
    views this month
  • 1
    downloads this month

Export as

Related outputs

Assuring privacy of AI-powered community driven Android code vulnerability detection
Senanayake, J., Kalutarage, H., Piras, L., Al-Kadri, M.O. and Petrovski, A. 2024. Assuring privacy of AI-powered community driven Android code vulnerability detection. 3rd International Workshop on System Security Assurance. Bydgoszcz, Poland 19 - 20 Sep 2024
Model-based gamification design with Web-Agon: an automated analysis tool for gamification
Zaw, H., Piras, L., Calabrese, F. and Al-Obeidallah, M. 2024. Model-based gamification design with Web-Agon: an automated analysis tool for gamification. 50th Euromicro Conference Series on Software Engineering and Advanced Applications. Paris, France 28 - 30 Aug 2024 IEEE.
Analyzing air-traffic security using GIS-``blur'' with information flow control in the IIIf
Kammueller, F. 2024. Analyzing air-traffic security using GIS-``blur'' with information flow control in the IIIf. 19th International Conference on Availability, Reliability and Security. Vienna, Austria 30 Jul - 02 Aug 2024 New York, NY ACM. pp. 68 https://doi.org/10.1145/3664476
Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI
Senanayake, L., Kalutarage, H., Petrovski, A., Piras, L. and Al-Kadri, M. 2024. Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI. Journal of Information Security and Applications. 82. https://doi.org/10.1016/j.jisa.2024.103741
Gamification of E-Learning apps via acceptance requirements analysis
Calabrese, L., Piras, L., Al-Obeidallah, M., Egbikuadje, B. and Alkubaisy, D. 2024. Gamification of E-Learning apps via acceptance requirements analysis. 19th International Conference on Evaluation of Novel Approaches to Software Engineering. Angers, France 28 - 29 Apr 2024 SciTePress. pp. 291-298 https://doi.org/10.5220/0012550400003687
Characteristics and circumstances of rail suicides in England 2019-2021: a cluster analysis and autopsy study  
Norman, H., Marzano, L., Fields, B., Brown, S., MacDonald Hart, S. and Kruger, I. 2024. Characteristics and circumstances of rail suicides in England 2019-2021: a cluster analysis and autopsy study  . Journal of Affective Disorders. 354, pp. 397-407. https://doi.org/10.1016/j.jad.2024.03.020
FedREVAN: real-time detection of vulnerable Android source code through federated neural network with XAI
Senanayake, J., Kalutarage, H., Petrovski, A., Al-Kadri, M.O. and Piras, L. 2024. FedREVAN: real-time detection of vulnerable Android source code through federated neural network with XAI. ESORICS Workshop on Attacks and Software Protection (WASP). The Hague, The Netherlands 25 - 29 Sep 2023 Springer. pp. 426-441 https://doi.org/10.1007/978-3-031-54129-2_25
Android code vulnerabilities early detection using AI-powered ACVED plugin
Senanayake, J., Kalutarage, H., Al-Kadri, M.O., Petrovski, A. and Piras, L. 2023. Android code vulnerabilities early detection using AI-powered ACVED plugin. Atluri, V. and Ferrara, A. (ed.) 37th Annual IFIP WG 11.3 Conference (DBSec 2023). Sophia-Antipolis, France 19 - 21 Jul 2023 Cham Springer. pp. 339–357 https://doi.org/10.1007/978-3-031-37586-6_20
Labelled vulnerability dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models
Senanayake, J., Kalutarage, H., Al-Kadri, M.O., Piras, L. and Petrovski, A. 2023. Labelled vulnerability dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. International Conference on Security and Cryptography (SECRYPT) 2023. Rome, Italy 10 - 12 Jul 2023 Rome (IT) SciTePress. pp. 659-666 https://doi.org/10.5220/0012060400003555
Goal-modeling privacy-by-design patterns for supporting GDPR compliance
Al-Obeidallah, M., Piras, L., Iloanugo, O., Mouratidis, H., Alkubaisy, D and Dellagiacoma, D. 2023. Goal-modeling privacy-by-design patterns for supporting GDPR compliance. International Conference on Software Technologies (ICSOFT). Rome (Italy) 10 - 12 Jul 2023 Rome (IT) SciTePress. https://doi.org/10.5220/0012080700003538
Android source code vulnerability detection: a systematic literature review
Senanayake, J., Kalutarage, H., Al-Kadri, M.O., Petrovski, A. and Piras, L. 2023. Android source code vulnerability detection: a systematic literature review. ACM Computing Surveys. 55 (9). https://doi.org/10.1145/3556974
Explanation by automated reasoning using the Isabelle Infrastructure framework
Kammueller, F. 2022. Explanation by automated reasoning using the Isabelle Infrastructure framework. Human Computer Interaction International. Virtual 26 Jun - 01 Jul 2022
Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders
Kammueller, F. and Alvarado, C. 2022. Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders. Moallem, A. (ed.) HCI-CPT: 4th International Conference on HCI for Cybersecurity, Privacy and Trust. Virtual 26 Jun - 01 Jul 2022 Springer. pp. 340-357 https://doi.org/10.1007/978-3-031-05563-8_22
Explanation by automated reasoning using the Isabelle Infrastructure framework
Kammueller, F. 2021. Explanation by automated reasoning using the Isabelle Infrastructure framework. arxiv.org. https://doi.org/10.48550/arXiv.2112.14809
A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design
Alkubaisy, D., Piras, L., Al-Obeidallah, M., Cox, K. and Mouratidis, H. 2022. A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design. Ali, R., Kaindl, H. and Maciaszek, L. (ed.) 16th International Conference on Evaluation of Novel Approaches to Software Engineering. Virtual 26 - 27 Apr 2021 Cham Springer. https://doi.org/10.1007/978-3-030-96648-5_4
Developing secured Android applications by mitigating code vulnerabilities with machine learning
Senanayake, J., Kalutarage, H., Al-Kadri, M., Petrovski, A. and Piras, L. 2022. Developing secured Android applications by mitigating code vulnerabilities with machine learning. ACM Asia Conference on Computer and Communications Security (ASIA CCS '22). Nagasaki, Japan 30 May - 03 Jun 2022 ACM. pp. 1255–1257 https://doi.org/10.1145/3488932.3527290
Supporting the individuation, analysis and gamification of software components for acceptance requirements fulfilment
Calabrese, F., Piras, L. and Giorgini, P. 2022. Supporting the individuation, analysis and gamification of software components for acceptance requirements fulfilment. Barn, B. and Sandkuhl, K (ed.) IFIP Working Conference on The Practice of Enterprise Modeling. London 23 - 25 Nov 2022 Springer. pp. 33-48 https://doi.org/10.1007/978-3-031-21488-2_3
Explanation of black box AI for GDPR related privacy using Isabelle
Kammueller, F. 2022. Explanation of black box AI for GDPR related privacy using Isabelle. Garcia-Alfaro, J., Navarro-Arribas, G. and Dragoni, N. (ed.) 17th DPM International Workshop on Data Privacy Management. Copenhagen, Denmark 29 - 30 Sep 2022 Cham Springer. https://doi.org/10.1007/978-3-031-25734-6_5
Dependability engineering in Isabelle
Kammueller, F. 2021. Dependability engineering in Isabelle. arxiv.org.
Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders
Kammueller, F. and Alvarado, C. 2021. Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders. arxiv.org.
Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2022. Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems. Computational Intelligence. 38 (3), pp. 811-828. https://doi.org/10.1111/coin.12421
Applying the Isabelle insider framework to airplane security
Kammueller, F. and Kerber, M. 2021. Applying the Isabelle insider framework to airplane security. Science of Computer Programming. 206. https://doi.org/10.1016/J.SCICO.2021.102623
Confis: a tool for privacy and security analysis and conflict resolution for supporting GDPR compliance through privacy-by-design
Alkubaisy, D., Piras, L., Al-Obeidallah, M., Cox, K. and Mouratidis, H. 2021. Confis: a tool for privacy and security analysis and conflict resolution for supporting GDPR compliance through privacy-by-design. Ali, R., Kaindl, H. and Maciaszek, L. (ed.) 16th International Conference on Evaluation of Novel Approaches to Software Engineering. Virtual 26 - 27 Apr 2021 SciTePress. pp. 80-91 https://doi.org/10.5220/0010406100800091
Patterns and motivations for method choices in suicidal thoughts and behaviour: qualitative content analysis of a large online survey
Marzano, L., Katsampa, D., Mackenzie, J., Kruger, A., El-Gharbawi, N., Ffolkes-St-Helene, D., Mohiddin, H. and Fields, B. 2021. Patterns and motivations for method choices in suicidal thoughts and behaviour: qualitative content analysis of a large online survey. BJPsych Open. 7 (2), pp. 1-6. https://doi.org/10.1192/bjo.2021.15
A formal development cycle for security engineering in Isabelle
Kammueller, F. 2020. A formal development cycle for security engineering in Isabelle. arxiv.org.
Applying the Isabelle Insider framework to airplane security
Kammueller, F. and Kerber, M. 2020. Applying the Isabelle Insider framework to airplane security. arxiv.org.
Masterminding change by combining secure system design with security risk assessment
Kammueller, F., Legay, A. and Schivo, S. 2021. Masterminding change by combining secure system design with security risk assessment. International Journal on Software Tools for Technology Transfer. 23 (1), pp. 69-70. https://doi.org/10.1007/s10009-020-00595-8
Combining secure system design with risk assessment for IoT healthcare systems
Kammueller, F. 2019. Combining secure system design with risk assessment for IoT healthcare systems. SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of Things, colocated with IEEE PerCom 2019. Kyoto, Japan 11 - 15 Mar 2019 Institute of Electrical and Electronics Engineers (IEEE). pp. 961-966 https://doi.org/10.1109/PERCOMW.2019.8730776
Modeling and analyzing the Corona-virus warning app with the Isabelle infrastructure framework
Kammueller, F. and Lutz, B. 2020. Modeling and analyzing the Corona-virus warning app with the Isabelle infrastructure framework. Garcia-Alfaro, J., Navarro-Arribas, G. and Herrera-Joancomarti, J. (ed.) International Workshop of Data Privacy Management, DPM'20. University of Surrey, UK 17 - 18 Sep 2020 Springer. pp. 128-144 https://doi.org/10.1007/978-3-030-66172-4_8
Inter-blockchain protocols with the Isabelle Infrastructure framework
Kammueller, F. and Nestmann, U. 2020. Inter-blockchain protocols with the Isabelle Infrastructure framework. Bernardo, B. and Marmsoler, D. (ed.) 2nd Workshop on Formal Methods for Blockchain, co-located with CAV'20. Los Angeles, CA, USA LIPICS --Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany. pp. 11:1-11:12 https://doi.org/10.4230/OASIcs.FMBC.2020.11
An approach to human-machine teaming in legal investigations using anchored narrative visualisation and machine learning
Attfield, S., Fields, B., Windridge, D. and Xu, K. 2019. An approach to human-machine teaming in legal investigations using anchored narrative visualisation and machine learning. Conrad, J., Pickens, J., Jones, A., Baron, J. and Henseler, H. (ed.) First International Workshop on AI and Intelligent Assistance for Legal Professionals in the Digital Workplace (LegalAIIA 2019).. Montreal, Canada 17 Jun 2019 CEUR Workshop Proceedings. pp. 7-11
Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform
Tsohou, A., Magkos, M., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M. and Gallego-Nicasio Crespo, B. 2020. Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform. 2019 International Workshop on Security and Privacy Requirements Engineering. Luxembourg City, Luxembourg 26 - 27 Sep 2019 Springer. https://doi.org/10.1007/978-3-030-42048-2_14
DEFeND DSM: a data scope management service for model-based privacy by design GDPR compliance
Piras, L., Al-Obeidallah, M., Pavlidis, M., Mouratidis, H., Tsohou, A., Magkos, E., Praitano, A., Iodice, A. and Gallego-Nicasio Crespo, B. 2020. DEFeND DSM: a data scope management service for model-based privacy by design GDPR compliance. 17th International Conference on Trust and Privacy in Digital Business. Bratislava, Slovakia 14 - 17 Sep 2020 Springer. https://doi.org/10.1007/978-3-030-58986-8_13
Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems
Kammueller, F. 2020. Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems.
Describing and simulating concurrent quantum systems
Bornat, R., Boender, J., Kammueller, F., Poly, G. and Nagarajan, R. 2020. Describing and simulating concurrent quantum systems. Biere, A. and Parker, D. (ed.) International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 20). Dublin 27 - 30 Apr 2020 Springer. pp. 271-277 https://doi.org/10.1007/978-3-030-45237-7_16
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. ICC’17. Cambridge University, Cambridge 22 Mar 2019 ICC’17, Cambridge, United Kingdom © 2017 ACM.. pp. 1-6 https://doi.org/10.1145/3018896.3056795
Attack trees in Isabelle
Kammueller, F. 2018. Attack trees in Isabelle. 20th International Conference on Information and Communications Security, ICICS 2018. Lille, France 29 - 31 Oct 2018 Springer. pp. 611-628 https://doi.org/10.1007/978-3-030-01950-1_36
Design thinking and acceptance requirements for designing gamified software
Piras, L., Dellagiacoma, D., Perini, A., Susi, A., Giorgini, P. and Mylopoulos, J. 2019. Design thinking and acceptance requirements for designing gamified software. 13th International Conference on Research Challenges in Information Science. Brussels, Belgium 29 - 31 May 2019 IEEE. pp. 1-12 https://doi.org/10.1109/rcis.2019.8876973
Goal-oriented requirements engineering: an extended systematic mapping study
Horkoff, J., Aydemir, F., Cardoso, E., Li, T., Mate, A., Paja, E., Salnitri, M., Piras, L., Mylopoulos, J. and Giorgini, P. 2019. Goal-oriented requirements engineering: an extended systematic mapping study. Requirements Engineering. 24 (2), pp. 133-160. https://doi.org/10.1007/s00766-017-0280-z
DEFeND architecture: a privacy by design platform for GDPR compliance
Piras, L., Al-Obeidallah, M., Praitano, A., Tsohou, A., Mouratidis, H., Gallego-Nicasio Crespo, B., Bernard, J., Fiorani, M., Magkos, E., Castillo Sanz, A., Pavlidis, M., D'Addario, R. and Zorzino, G. 2019. DEFeND architecture: a privacy by design platform for GDPR compliance. 16th International Conference on Trust, Privacy and Security in Digital Business. Linz, Austria 26 - 29 Aug 2019 Springer. https://doi.org/10.1007/978-3-030-27813-7_6
Attack trees in Isabelle extended with probabilities for Quantum Cryptography
Kammueller, F. 2019. Attack trees in Isabelle extended with probabilities for Quantum Cryptography. Computers and Security. 87. https://doi.org/10.1016/j.cose.2019.101572
Factors deterring and prompting the decision to attempt suicide on the railway networks: findings from 353 online surveys and 34 semi-structured interviews
Marzano, L., Mackenzie, J., Kruger, A., Borrill, J. and Fields, B. 2019. Factors deterring and prompting the decision to attempt suicide on the railway networks: findings from 353 online surveys and 34 semi-structured interviews. The British Journal of Psychiatry. 215 (4), pp. 582-587. https://doi.org/10.1192/bjp.2018.303
Edit distance Kernelization of NP theorem proving for polynomial-time machine learning of proof heuristics
Windridge, D. and Kammueller, F. 2020. Edit distance Kernelization of NP theorem proving for polynomial-time machine learning of proof heuristics. FICC 2019: Future of Information and Communications Conference. San Francisco, USA 14 - 15 Mar 2019 Springer. pp. 271-283 https://doi.org/10.1007/978-3-030-12385-7_22
Formal modeling and analysis of data protection for GDPR compliance of IoT healthcare systems
Kammueller, F. 2018. Formal modeling and analysis of data protection for GDPR compliance of IoT healthcare systems. IEEE SMC 2018: IEEE International Conference on Systems, Man and Cybernetics. Miyazaki, Japan 08 - 10 Oct 2018 Institute of Electrical and Electronics Engineers (IEEE).
A resources model for distributed sensemaking
Attfield, S., Fields, B. and Baber, C. 2018. A resources model for distributed sensemaking. Cognition, Technology and Work. 20 (4), pp. 651-664. https://doi.org/10.1007/s10111-018-0529-4
Automated equivalence checking of concurrent quantum systems
Ardeshir-Larijani, E., Gay, S. and Nagarajan, R. 2018. Automated equivalence checking of concurrent quantum systems. ACM Transactions on Computational Logic (TOCL). 19 (4), pp. 1-32. https://doi.org/10.1145/3231597
MIRTO: an open-source robotic platform for education
Androutsopoulos, K., Aristodemou, L., Boender, J., Bottone, M., Currie, E., El-Aroussi, I., Fields, B., Gheri, L., Gorogiannis, N., Heeney, M., Micheletti, M., Loomes, M., Margolis, M., Petridis, M., Piermarteri, A., Primiero, G., Raimondi, F. and Weldin, N. 2018. MIRTO: an open-source robotic platform for education. 3rd European Conference on Software Engineering Education. Seeon, Germany 14 - 15 Jun 2018 Association for Computing Machinery (ACM). pp. 55-62 https://doi.org/10.1145/3209087.3209106
Common ground in collaborative intelligence analysis: an empirical study
Laurence, S., Fields, B. and Attfield, S. 2016. Common ground in collaborative intelligence analysis: an empirical study. 30th International BCS Human Computer Interaction Conference (HCI 2016). Bournemouth University, Poole, UK 11 - 15 Jul 2016 BCS Learning and Development. pp. 1-11 https://doi.org/10.14236/ewic/HCI2016.30
360 Cinematic literacy: a case study
Passmore, P., Glancy, M., Philpot, A. and Fields, B. 2017. 360 Cinematic literacy: a case study. International Broadcasting Convention Conference 2017. Amsterdam 14 - 18 Sep 2017 International Broadcasting Convention.
Formalization and analysis of a resource allocation security protocol for secure service migration
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2018. Formalization and analysis of a resource allocation security protocol for secure service migration. IEEE/ACM International Conference on Utility and Cloud Computing (UCC2018). Zurich, Switzerland 17 - 20 Dec 2018 IEEE. pp. 207-212 https://doi.org/10.1109/UCC-Companion.2018.00058
Quantum error-correcting output codes
Windridge, D., Mengoni, R. and Nagarajan, R. 2018. Quantum error-correcting output codes. International Journal of Quantum Information. 16 (8). https://doi.org/10.1142/S0219749918400038
Behaviours preceding suicides at railway and underground locations: a multimethodological qualitative approach
Mackenzie, J., Borrill, J., Hawkins, E., Fields, B., Kruger, A., Noonan, I. and Marzano, L. 2018. Behaviours preceding suicides at railway and underground locations: a multimethodological qualitative approach. BMJ Open. 8 (4), pp. 1-8. https://doi.org/10.1136/bmjopen-2017-021076
Goal models for acceptance requirements analysis and gamification design
Piras, L., Paja, E., Giorgini, P. and Mylopoulos, J. 2017. Goal models for acceptance requirements analysis and gamification design. Mayr, H.C., Guizzardi, G., Ma, H. and Pastor, O. (ed.) 36th International Conference on Conceptual Modeling. Valencia 2017 Cham Springer. pp. 223-230 https://doi.org/10.1007/978-3-319-69904-2_18
A proof calculus for attack trees in Isabelle
Kammueller, F. 2017. A proof calculus for attack trees in Isabelle. 12th International Workshop on Data Privacy Management (DPM 2017). Oslo, Norway 14 - 15 Sep 2017 Springer. pp. 3-18 https://doi.org/10.1007/978-3-319-67816-0_1
A proof-theoretic trust and reputation model for VANET
Primiero, G., Raimondi, F., Chen, T. and Nagarajan, R. 2017. A proof-theoretic trust and reputation model for VANET. S4CIP’17: 2nd Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. Paris, France 29 Apr 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 146-152 https://doi.org/10.1109/EuroSPW.2017.64
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. 2nd International Conference on Internet of Things, Data and Cloud Computing (ICC 2017). Churchill College, University of Cambridge, United Kingdom 22 - 23 Mar 2017 Association for Computing Machinery (ACM). https://doi.org/10.1145/3018896.3056795
Model based analysis of insider threats
Chen, T., Han, T., Kammueller, F., Nemli, I. and Probst, C. 2016. Model based analysis of insider threats. 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). London, United Kingdom 13 - 14 Jun 2016 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/CyberSecPODS.2016.7502350
Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle
Kammueller, F., Augusto, J. and Jones, S. 2017. Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle. IEEE/ACIS 15th International Conference on Software Engineering Research, Management and Application, SERA2017. University of Greenwich, London, United Kingdom 07 - 09 Jun 2017 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/SERA.2017.7965758
Formal modeling and analysis with humans in infrastructures for IoT health care systems
Kammueller, F. 2017. Formal modeling and analysis with humans in infrastructures for IoT health care systems. 5th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2017. Vancouver, BC, Canada 09 - 14 Jul 2017 Springer. pp. 339-352 https://doi.org/10.1007/978-3-319-58460-7_24
Human centric security and privacy for the IoT using formal techniques
Kammueller, F. 2018. Human centric security and privacy for the IoT using formal techniques. 3rd International Conference on Human Factors in Cybersecurity. Los Angeles, CA, United States 17 - 21 Jul 2017 Springer. pp. 106-116 https://doi.org/10.1007/978-3-319-60585-2_12
Insider threats for auctions: formalization, mechanized proof, and code generation
Kammueller, F., Kerber, M. and Probst, C. 2017. Insider threats for auctions: formalization, mechanized proof, and code generation. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). 8 (1), pp. 44-78. https://doi.org/10.22667/JOWUA.2017.03.31.044
Insight/inside learning: a participatory app for analysing the effectiveness of school environments
Szynalska, K., Fields, B. and Bardill, A. 2017. Insight/inside learning: a participatory app for analysing the effectiveness of school environments. People, Personal Data and the Built Environment: A DIS2017 Workshop. Edinburgh 10 Jun 2017
Quantum Bootstrap Aggregation
Windridge, D. and Nagarajan, R. 2017. Quantum Bootstrap Aggregation. de Barros, J., Coecke, B. and Pothos, E. (ed.) Quantum Interaction. San Francisco, CA, USA 20 - 22 Jul 2016 Springer. pp. 115-121 https://doi.org/10.1007/978-3-319-52289-0_9
Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques
Piras, L., Paja, E., Giorgini, P., Mylopoulos, J., Cuel, R. and Ponte, D. 2017. Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques. 11th International Conference on Research Challenges in Information Science. Brighton, UK 10 - 12 May 2017 IEEE. pp. 255-265 https://doi.org/10.1109/rcis.2017.7956544
Hamming distance kernelisation via topological quantum computation
Di Pierro, A., Mengoni, R., Nagarajan, R. and Windridge, D. 2017. Hamming distance kernelisation via topological quantum computation. Martín-Vide C., Neruda R. and Vega-Rodríguez M. (ed.) 6th International Conference on the Theory and Practice of Natural Computing. Prague, Czech Republic 18 - 20 Dec 2017 Springer. pp. 269-280 https://doi.org/10.1007/978-3-319-71069-3_21
User experience of panoramic video in CAVE-like and head mounted display viewing conditions
Philpot, A., Glancy, M., Passmore, P., Wood, A. and Fields, B. 2017. User experience of panoramic video in CAVE-like and head mounted display viewing conditions. TVX '17: ACM International Conference on Interactive Experiences for TV and Online Video. Hilversum, The Netherlands 14 - 16 Jun 2017 New York, NY, USA ACM. pp. 65-75 https://doi.org/10.1145/3077548.3077550
Modeling and verification of insider threats using logical analysis
Kammueller, F. and Probst, C. 2017. Modeling and verification of insider threats using logical analysis. IEEE Systems Journal. 11 (2), pp. 534-545. https://doi.org/10.1109/JSYST.2015.2453215
Effects of viewing condition on user experience of panoramic video
Passmore, P., Glancy, M., Philpot, A., Roscoe, A., Wood, A. and Fields, B. 2016. Effects of viewing condition on user experience of panoramic video. Reiners, D., Iwai, D and Steinicke, F. (ed.) ICAT-EGVE 2016 - International Conference on Artificial Reality and Telexistence and Eurographics Symposium on Virtual Environments. Little Rock, Arkansas, USA. 07 - 09 Dec 2016 The Eurographics Association. https://doi.org/10.2312/egve.20161428
Towards formal analysis of insider threats for auctions
Kammueller, F., Kerber, M. and Probst, C. 2016. Towards formal analysis of insider threats for auctions. ACM-CCS Workshop on Management of Security of Insider Threats. Vienna, Austria 28 Oct 2016 Association for Computing Machinery (ACM). pp. 23-34 https://doi.org/10.1145/2995959.2995963
Isabelle Modelchecking for insider threats
Kammueller, F. 2016. Isabelle Modelchecking for insider threats. 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016. Heraklion, Crete, Greece 26 - 27 Sep 2016 Springer. pp. 196-210 https://doi.org/10.1007/978-3-319-47072-6_13
Refactoring preserves security
Kammueller, F. 2016. Refactoring preserves security. 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016. Heraklion, Crete, Greece 26 - 27 Sep 2016 Springer. pp. 238-245 https://doi.org/10.1007/978-3-319-47072-6_17
Verification of statecharts using data abstraction
Helke, S. and Kammueller, F. 2016. Verification of statecharts using data abstraction. International Journal of Advanced Computer Science and Applications. 7 (1), pp. 571-583. https://doi.org/10.14569/IJACSA.2016.070179
Formal modelling and analysis of socio-technical systems
Probst, C., Kammueller, F. and Hansen, R. 2016. Formal modelling and analysis of socio-technical systems. in: Semantics, Logics, and Calculi Springer International.
Attack tree analysis for insider threats on the IoT using Isabelle
Kammueller, F., Nurse, J. and Probst, C. 2016. Attack tree analysis for insider threats on the IoT using Isabelle. 4th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2016. Toronto, ON, Canada 17 - 24 Jul 2016 Springer International. pp. 234-246 https://doi.org/10.1007/978-3-319-39381-0_21
Acceptance requirements and their gamification solutions
Piras, L., Giorgini, P. and Mylopoulos, J. 2016. Acceptance requirements and their gamification solutions. IEEE 24th International Requirements Engineering Conference. Beijing, China 12 - 16 Sep 2016 IEEE. pp. 365-370 https://doi.org/10.1109/RE.2016.43
Developing a model of distributed sensemaking: a case study of military analysis
Wheat, A., Attfield, S. and Fields, B. 2016. Developing a model of distributed sensemaking: a case study of military analysis. Informatics. 3 (1). https://doi.org/10.3390/informatics3010001
SensePath: understanding the sensemaking process through analytic provenance
Nguyen, P., Xu, K., Wheat, A., Wong, B., Attfield, S. and Fields, B. 2016. SensePath: understanding the sensemaking process through analytic provenance. IEEE Transactions on Visualization and Computer Graphics. 22 (1), pp. 41-50. https://doi.org/10.1109/TVCG.2015.2467611
Investigating airplane safety and security against insider threats using logical modeling
Kammueller, F. and Kerber, M. 2016. Investigating airplane safety and security against insider threats using logical modeling. 2016 IEEE Security and Privacy Workshops SPW'16: Workshop on Research in Insider Threats WRIT'16. San Jose, CA, USA 22 - 26 May 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 304-313 https://doi.org/10.1109/SPW.2016.47
Using gamification to incentivize sustainable urban mobility
Kazhamiakin, Raman, Marconi, Annapaola, Perillo, Mirko, Pistore, Marco, Valetto, Giuseppe, Piras, Luca, Avesani, Francesco and Perri, Nicola 2015. Using gamification to incentivize sustainable urban mobility. IEEE International Smart Cities Conference. IEEE. https://doi.org/10.1109/ISC2.2015.7366196
Secure refactoring with Java information flow
Helke, S., Kammueller, F. and Probst, C. 2016. Secure refactoring with Java information flow. 10th International Workshop on Data Privacy Management (DPM 2015). Vienna, Austria 21 - 22 Sep 2015 Springer. pp. 264-272 https://doi.org/10.1007/978-3-319-29883-2_19
Transforming graphical system models to graphical attack models
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2016. Transforming graphical system models to graphical attack models. 2nd International Workshop on Graphical Models for Security, GraMSec 2015, co-located with CSF2015. Verona, Italy 13 Jul 2015 Springer. pp. 82-96 https://doi.org/10.1007/978-3-319-29968-6_6
Attack tree generation by policy invalidation
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2015. Attack tree generation by policy invalidation. 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015). Heraklion, Crete, Greece 24 - 25 Aug 2015 Springer. pp. 249-259 https://doi.org/10.1007/978-3-319-24018-3_16
Techniques for formal modelling and analysis of quantum systems
Gay, S. and Nagarajan, R. 2013. Techniques for formal modelling and analysis of quantum systems. in: Computation, logic, games, and quantum foundations. The many facets of Samson Abramsky Springer Verlag.
Articulating resources: the impact of electronic health records on cross-professional healthcare work
Fields, B. and Duncker-Gassen, E. 2003. Articulating resources: the impact of electronic health records on cross-professional healthcare work. Interaction Design Centre - Middlesex University.
Formalization of quantum protocols using Coq
Boender, J., Kammueller, F. and Nagarajan, R. 2015. Formalization of quantum protocols using Coq. The 12th International Workshop on Quantum Physics and Logic (QPL 2015). Oxford, United Kingdom 15 - 17 Jul 2015 pp. 71-83
Towards cyber-physical systems as services: the ASIP protocol
Bordoni, M., Bottone, M., Fields, B., Gorogiannis, N., Margolis, M., Primiero, G. and Raimondi, F. 2015. Towards cyber-physical systems as services: the ASIP protocol. 2015 IEEE/ACM 1st International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS). Florence, Italy 17 - 17 May 2015 IEEE. pp. 52-55 https://doi.org/10.1109/SEsCPS.2015.18
Distributed sensemaking: a case study of military analysis
Attfield, S., Fields, B., Wheat, A., Hutton, R., Nixon, J., Leggatt, A. and Blackford, H. 2015. Distributed sensemaking: a case study of military analysis. 12th International Conference on Naturalistic Decision Making. McLean, Virginia, USA 09 - 12 Jun 2015
Visual analysis of streaming data with SAVI and SenseMAP
Xu, K., Nguyen, P. and Fields, B. 2014. Visual analysis of streaming data with SAVI and SenseMAP. 2014 IEEE Conference on Visual Analytics Science and Technology (VAST). pp. 389-390
Invalidating policies using structural information
Kammueller, F. and Probst, C. 2013. Invalidating policies using structural information. IEEE CS Security and Privacy Workshops, SPW, WRIT'13.
Network information flow control: proof of concept
Alghothami, A. and Kammueller, F. 2013. Network information flow control: proof of concept. IEEE Int. Conf. on Systems, Man, and Cybernetics, SMC. Manchester, UK 13 - 16 Oct 2013 IEEE. pp. 2957-2962 https://doi.org/10.1109/SMC.2013.504
Privacy analysis of a hidden friendship protocol
Kammueller, F. and Preibusch, S. 2013. Privacy analysis of a hidden friendship protocol. The 8th International Workshop on Data Privacy Management, DPM 2013. Egam, UK 12 - 13 Sep 2013 Springer. pp. 83-99
Externalizing behaviour for analysing system models
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2013. Externalizing behaviour for analysing system models. 5th International Workshop on Managing Insider Security Threats, MIST, 2013..
Verification of quantum protocols using Coq
Boender, J., Kammueller, F. and Nagarajan, R. 2014. Verification of quantum protocols using Coq. 17th Conference on Quantum Information Processing (QIP). Barcelona, Spain 03 - 07 Feb 2014
Reviews for the American Mathematical Society (AMS): Paul Howells, Mark d’Inverno. Specifying termination in CSP. Theoretical Computer Science, 503:31–61, 2013.
Kammueller, F. 2014. Reviews for the American Mathematical Society (AMS): Paul Howells, Mark d’Inverno. Specifying termination in CSP. Theoretical Computer Science, 503:31–61, 2013. MathSciNet: Mathematical Reviews.
Combining generated data models with formal invalidation for insider threat analysis
Kammueller, F. and Probst, C. 2014. Combining generated data models with formal invalidation for insider threat analysis. 2014 IEEE Security and Privacy Workshops (SPW): Workshop on Research for Insider Threat (WRIT 2014). San Jose, California, USA 17 - 18 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 229-235 https://doi.org/10.1109/SPW.2014.45
Verification of DNSsec delegation signatures
Kammueller, F. 2014. Verification of DNSsec delegation signatures. 21st International IEEE Conference on Telecommunication. Lisbon 04 - 07 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 298-392 https://doi.org/10.1109/ICT.2014.6845127
Invalidating policies using structural information
Kammueller, F. and Probst, C. 2014. Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 5 (2), pp. 59-79. https://doi.org/10.22667/JOWUA.2014.06.31.059
Modeling human behaviour with higher order logic: insider threats
Boender, J., Kammueller, F., Ivanova, M. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust. Vienna Technical University, Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 31-39
A probabilistic analysis framework for malicious insider threats
Chen, T., Kammueller, F., Nemli, I. and Probst, C. 2015. A probabilistic analysis framework for malicious insider threats. 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2015, held as part of HCI International 2015. Los Angeles, California, USA 02 - 07 Aug 2015 Springer. pp. 178-189
Confinement for active objects
Kammueller, F. 2015. Confinement for active objects. International Journal of Advanced Computer Science and Applications. 6 (2), pp. 246-261. https://doi.org/10.14569/IJACSA.2015.060236
Modeling human behaviour with higher order logic: insider threats
Boender, J., Ivanova, M., Kammueller, F. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST 2014). Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers. pp. 31-39 https://doi.org/10.1109/STAST.2014.13
The application of mHealth to mental health: opportunities and challenges
Marzano, L., Bardill, A., Fields, B., Herd, K., Veale, D., Grey, N. and Moran, P. 2015. The application of mHealth to mental health: opportunities and challenges. The Lancet Psychiatry. 2 (10), pp. 942-948. https://doi.org/10.1016/S2215-0366(15)00268-0
Hard-to-get-at data from difficult-to-access users
Fields, B., Bardill, A., Marzano, L. and Herd, K. 2015. Hard-to-get-at data from difficult-to-access users. Abascal, J., Barbosa, S., Fetter, M., Gross, T., Palanque, P. and Winckler, M. (ed.) 15th IFIP TC 13 International Conference on Human-Computer Interaction. Bamberg, Germany 14 - 18 Sep 2015 Springer. pp. 409-416 https://doi.org/10.1007/978-3-319-22723-8_32
External representation of provenance in intelligence analysis
Wheat, A., Attfield, S. and Fields, B. 2014. External representation of provenance in intelligence analysis. Provenance for Sensemaking IEEE VIS 2014 Workshop. Paris, France 10 Nov 2014
From global terminology to local terminology: a review of cross-cultural interface design solutions
Duncker-Gassen, E., Sheikh, J. and Fields, B. 2013. From global terminology to local terminology: a review of cross-cultural interface design solutions. in: Rau, P. (ed.) Cross-Cultural Design. Methods Practice and Case-Studies: Proceedings of the 5th International Conference CCD 2013, held as part of HCI Inernational 2013, Las Vegas Springer.
Verification of concurrent quantum protocols by equivalence checking
Ardeshir-Larijani, E., Gay, S. and Nagarajan, R. 2014. Verification of concurrent quantum protocols by equivalence checking. TACAS 2014: 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Grenoble, France 05 - 13 Apr 2014 Springer. https://doi.org/10.1007/978-3-642-54862-8_42
Model checking for communicating quantum processes
Davidson, T., Gay, S., Mlnařík, H., Nagarajan, R. and Papanikolaou, N. 2012. Model checking for communicating quantum processes. International Journal of Unconventional Computing. 8 (1), pp. 73-98.
Lossless quantum prefix compression for communication channels that are always open
Müller, M., Rogers, C. and Nagarajan, R. 2009. Lossless quantum prefix compression for communication channels that are always open. Physical Review A. 79 (1). https://doi.org/10.1103/PhysRevA.79.012302
Equivalence checking of quantum protocols
Ardeshir-Larijani, E., Gay, S. and Nagarajan, R. 2013. Equivalence checking of quantum protocols. in: Piterman, N. and Smolka, S. (ed.) Tools and Algorithms for the Construction and Analysis of Systems : 19th International Conference Proceedings (TACAS 2013). Berlin Springer.
QMC: a model checker for quantum systems
Gay, S., Nagarajan, R. and Papanikolaou, N. 2008. QMC: a model checker for quantum systems. in: Gupta, A. and Malik, S. (ed.) Computer Aided Verification : 20th International Conference, (CAV 2008) Proceedings Berlin Springer.
DNSsec in Isabelle – replay attack and origin authentication
Kammueller, F., Kirsal-Ever, Y. and Cheng, X. 2013. DNSsec in Isabelle – replay attack and origin authentication. SMC 2013: IEEE International Conference on Systems, Man, and Cybernetics. Manchester, UK 13 - 16 Oct 2013 IEEE. pp. 4772-4777 https://doi.org/10.1109/SMC.2013.812
A semi-lattice model for multi-lateral security
Kammueller, F. 2013. A semi-lattice model for multi-lateral security. in: Data privacy management and autonomous spontaneous security Berlin, Germany Springer.
A security model for functional active objects
Kammueller, F. 2012. A security model for functional active objects. Francisco, C., Kim, V., Miguel, C. and Andreas, K. (ed.) First International Symposium Communicability, Computer Graphics and Innovative Design for Interactive Systems (CCGIDIS 2011). Berlin Springer. https://doi.org/10.1007/978-3-642-33760-4_4
Conversational spaces for learning and designing
Fields, B., Bardill, A. and Jones, S. 2010. Conversational spaces for learning and designing. CHI2010 Workshop on New Generation of HCI and Education. Atlanta, GA, USA 10 - 15 Apr 2010
A security model for functional active objects with an implementation in Erlang
Fleck, A. and Kammueller, F. 2011. A security model for functional active objects with an implementation in Erlang. in: Ficarra, F., Kratky, A., Veltman, K., Ficarra, M., Nicol, E. and Brie, M. (ed.) Computational informatics, social factors and new information technologies: hypermedia perspectives and avant-garde experiences in the era of communicability expansion Bergamo, Italy Blue Herons.
Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol.
Kammueller, F., Mapp, G., Patel, S. and Sani, A. 2012. Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol. International Conference on Internet Monitoring and Protection (ICIMP 2012). Stuttgart, Germany 27 May - 01 Jun 2012 Xpert Publishing Service.
Review for the American Mathematical Society (AMS): A. Francalanza et al. Permission-based separation logic for message-passing concurrency. Logical methods in computer science, 7: 1-47, 2011
Kammueller, F. 2012. Review for the American Mathematical Society (AMS): A. Francalanza et al. Permission-based separation logic for message-passing concurrency. Logical methods in computer science, 7: 1-47, 2011. Mathematical Reviews.
Reviews for the American Mathematical Society (AMS): Russell O’Connor. Classical mathematics for a constructive world. MSCS (21): 861–882, Cambridge University Press. 2010.
Kammueller, F. 2012. Reviews for the American Mathematical Society (AMS): Russell O’Connor. Classical mathematics for a constructive world. MSCS (21): 861–882, Cambridge University Press. 2010. Mathematical Reviews.
A locally nameless theory of objects
Henrio, L., Kammueller, F., Lutz, B. and Sudhof, H. 2010. A locally nameless theory of objects. SAFA Annual Workshop on Formal Techniques (SAFA’2010). 2229 Route des Crêtes, 06560, Valbonne, Provence-Alpes-Côte d'Azur, France
Locally nameless sigma calculus
Henrio, L., Kammueller, F., Lutz, B. and Sudhof, H. 2010. Locally nameless sigma calculus. Archive of Formal Proof.
Formalizing statecharts using hierarchical automata
Helke, S. and Kammueller, F. 2010. Formalizing statecharts using hierarchical automata. Archive of Formal Proof.
Radius-SHA256 – verified remote authentication with secure hashing.
Kammueller, F. and Patel, S. 2011. Radius-SHA256 – verified remote authentication with secure hashing. First Global Conference on Communication, Science and Information Engineering, CCSIE’11. Middlesex University 25 - 27 Jul 2011
ASPfun: a typed functional active object calculus
Henrio, L., Kammueller, F. and Lutz, B. 2012. ASPfun: a typed functional active object calculus. Science of Computer Programming. 77 (7-8), pp. 823-847. https://doi.org/10.1016/j.scico.2010.12.008
Application of verification techniques to security: model checking insider attacks
Kammueller, F., Probst, C. and Raimondi, F. 2012. Application of verification techniques to security: model checking insider attacks. 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability. Venice, Italy 28 - 29 Mar 2012 Blue Herons editions.
A grounded theory approach towards conceptualizing CIS for heterogeneous work communities
Selvaraj, N. and Fields, B. 2009. A grounded theory approach towards conceptualizing CIS for heterogeneous work communities. Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology. Cambridge, UK 01 - 05 Sep 2009 Swindon, UK British Computer Society. pp. 471-479
The roles of time, place, value and relationships in collocated photo sharing with camera phones
Stelmaszewska, H., Fields, B. and Blandford, A. 2008. The roles of time, place, value and relationships in collocated photo sharing with camera phones. England, D. and Beale, R. (ed.) The 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction. Liverpool, UK 01 - 05 Sep 2008 Swindon, UK British Computer Society.
The cultural integration of knowledge management into interactive design
Sheikh, J., Fields, B. and Duncker-Gassen, E. 2011. The cultural integration of knowledge management into interactive design. HI'11 Proceedings of the 2011 international conference on Human interface and the management of information. Orlando, FL, USA 09 - 14 Jul 2011 Springer. https://doi.org/10.1007/978-3-642-21793-7_6
Mediation role of boundary objects in articulating common information spaces.
Selvaraj, N. and Fields, B. 2010. Mediation role of boundary objects in articulating common information spaces. Workshop held in conjunction with the 9th International Conference on the Designing Cooperative Systems (COOP 2010). Aix-en-Provence, France 18 - 21 May 2010
Design tribes and information spaces for creative conversations
Bardill, A., Griffiths, W., Jones, S. and Fields, B. 2010. Design tribes and information spaces for creative conversations. The 12th International Conference on Engineering and Product Design Education. Trondheim, Norway 02 - 03 Sep 2010
Modelchecking non-functional requirements for interface specifications.
Kammueller, F. and Preibusch, S. 2008. Modelchecking non-functional requirements for interface specifications. European Joint Conference on Theory and Practice of Software, 2008, (Foundations of Interface technologies). Budapest 29 Mar - 06 Apr 2008
Compositionality of aspect weaving.
Kammueller, F. and Sudhof, H. 2008. Compositionality of aspect weaving. in: Mahr, B. and Sheng, H. (ed.) Autonomous systems: self-organisation, management, and control. Springer Verlag. pp. 87-96
Interactive theorem proving in software engineering.
Kammueller, F. 2008. Interactive theorem proving in software engineering. Saarbrücken, Germany VDM Verlag Dr. Mueller.
Using functional active objects to enforce privacy
Kammueller, F. 2010. Using functional active objects to enforce privacy. 5th Conference on Network Architectures and Information Systems Security. Menton, France 18 - 21 May 2010
Enhancing privacy implementations of database enquiries
Kammueller, F. and Kammueller, R. 2009. Enhancing privacy implementations of database enquiries. IEEE. pp. 45-50 https://doi.org/10.1109/ICIMP.2009.15
Implementing privacy with Erlang active objects
Fleck, A. and Kammueller, F. 2010. Implementing privacy with Erlang active objects. International Conference on Internet Monitoring and Protection. Barcelona 09 - 15 May 2010 IEEE. pp. 141-146 https://doi.org/10.1109/ICIMP.2010.27
Privacy by flexible parameterization with Erlang active objects.
Fleck, A. and Kammueller, F. 2010. Privacy by flexible parameterization with Erlang active objects. International Journal on Advances in Software. 3 (3-4), pp. 461-473.
Functional active objects: typing and formalisation
Henrio, L. and Kammueller, F. 2009. Functional active objects: typing and formalisation. Elsevier. https://doi.org/10.1016/j.entcs.2009.10.026
Feature link propagation across variability representations with Isabelle/HOL
Kammueller, F., Rein, A. and Reiser, M. 2010. Feature link propagation across variability representations with Isabelle/HOL. Rubin, J., Botterweck, G., Mezini, M., Maman, I. and Lero, A. (ed.) New York ACM. pp. 48-53
Checking the TWIN elevator system by translating object-Z to SMV
Preibusch, S. and Kammueller, F. 2008. Checking the TWIN elevator system by translating object-Z to SMV. Lecture Notes in Computer Science. 4916, pp. 38-55. https://doi.org/10.1007/978-3-540-79707-4
Composing safely: a type system for aspects
Kammueller, F. and Sudhof, H. 2008. Composing safely: a type system for aspects. Lecture Notes in Computer Science. 4954, pp. 231-247. https://doi.org/10.1007/978-3-540-78789-1_18
Security analysis of private data enquiries in Erlang
Kammueller, F. and Kammueller, R. 2009. Security analysis of private data enquiries in Erlang. International Journal on Advances in Security. 2 (2&3), pp. 242-255.
An asynchronous distributed component model and its semantics
Henrio, L., Kammueller, F. and Rivera, M. 2009. An asynchronous distributed component model and its semantics. Lecture Notes in Computer Science. 5751, pp. 159-179. https://doi.org/10.1007/978-3-642-04167-9_9
A framework for reasoning on component composition
Henrio, L., Kammueller, F. and Khan, M. 2010. A framework for reasoning on component composition. Lecture Notes in Computer Science. 6286, pp. 1-20. https://doi.org/10.1007/978-3-642-17071-3_1
Formalizing non-interference for a simple bytecode language in Coq
Kammueller, F. 2008. Formalizing non-interference for a simple bytecode language in Coq. Formal Aspects of Computing. 20 (3), pp. 259-275.
Mechanical analysis of finite idempotent relations
Kammueller, F. 2011. Mechanical analysis of finite idempotent relations. Fundamenta Informaticae. 107 (1), pp. 43-65. https://doi.org/10.3233/FI-2011-392
Privacy enforcement and analysis for functional active objects
Kammueller, F. 2011. Privacy enforcement and analysis for functional active objects. Lecture Notes in Computer Science. 6514, pp. 93-107. https://doi.org/10.1007/978-3-642-19348-4_8
Lo-fi prototyping to design interactive-tabletop applications for children
Rick, J., Francois, P., Fields, B., Fleck, R., Yuill, N. and Carr, A. 2010. Lo-fi prototyping to design interactive-tabletop applications for children. The 9th International Conference on Interaction Design and Children. Barcelona, Spain 09 - 12 Jun 2010 New York, NY, USA ACM. pp. 138-146
Developing a framework of common information space (CIS): grounded theory analysis of airport CIS
Selvaraj, N. and Fields, B. 2010. Developing a framework of common information space (CIS): grounded theory analysis of airport CIS. Kolfschoten, G., Herrmann, T. and Lukosch, S. (ed.) 16th Collaboration Researchers' International Working Group Conference on Collaboration and Technology. Maastricht, The Netherlands 20 - 23 Sep 2010 Berlin, Germany Springer. pp. 281-296 https://doi.org/10.1007/978-3-642-15714-1_21
3D-in-2D Displays for ATC.
Wong, B., Rozzi, S., Boccalatte, A., Gaukrodger, S., Amaldi, P., Fields, B., Loomes, M. and Martin, P. 2007. 3D-in-2D Displays for ATC. in: Brochard, M. and Jurgens, M. (ed.) 6th EUROCONTROL innovative research workshop & exhibition. Eurocontrol. pp. 47-62
A framework for considering spatial-temporal representation design needs in air traffic control.
Wong, B., Rozzi, S., Amaldi, P., Woodward, P. and Fields, B. 2006. A framework for considering spatial-temporal representation design needs in air traffic control. in: Proceedings of the Human Factors and Ergonomics Society 50th annual meeting: October 16 - 20, 2006, San Francisco. Santa Monica, CA. HFES. pp. 250-254
Research into EMD at the London ambulance service: stage 1 report requirements, priorities and projects.
Wong, B., Fields, B. and Blandford, A. 2000. Research into EMD at the London ambulance service: stage 1 report requirements, priorities and projects. London Middlesex University.
Emergency medical dispatch at the London ambulance service.
Wong, B., Blandford, A. and Fields, B. 2000. Emergency medical dispatch at the London ambulance service. Middlesex University.
Evaluating combined 2D/3D displays for ATC.
Rozzi, S., Woodward, P., Amaldi, P., Fields, B. and Wong, B. 2006. Evaluating combined 2D/3D displays for ATC. in: 5th EUROCONTROL innovative research workshop & exhibition: proceedings. Eurocontrol: [http://inoworkshop.eurocontrol.fr/]. pp. 167-174
Developing visualisations to support spatial-temporal reasoning in ATC.
Rozzi, S., Wong, B., Woodward, P., Amaldi, P., Fields, B. and Panizzi, E. 2006. Developing visualisations to support spatial-temporal reasoning in ATC. in: Pejcic-Tarle, S. (ed.) Second international conference on research in air transportation. Belgrade, Serbia University of Belgrade: Faculty of Traffic and Transport Engineering.
Operational potential for 3D displays in air traffic control
Rozzi, S., Amaldi, P., Wong, B. and Fields, B. 2007. Operational potential for 3D displays in air traffic control. in: Brinkman, W., Ham, D. and Wong, B. (ed.) ECCE 2007: European conference on cognitive ergonomics, 2007. New York Association for computing machinery.
Next generation 4D HMI concepts. Deliverable 14. Report prepared for AD4: 4D virtual airspace management system, sixth framework programme, priority 1.4 aeronautics and space.
Wong, B., Panifici, E., Lot, D., Amaldi, P., Fields, B. and Rozzi, S. 2005. Next generation 4D HMI concepts. Deliverable 14. Report prepared for AD4: 4D virtual airspace management system, sixth framework programme, priority 1.4 aeronautics and space. Rome NEXT Sistems Ingegeria o..
Operational concepts report Vol.2: tower control deliverable 12.
Amaldi, P., Fields, B., Rozzi, S., Woodward, P. and Wong, B. 2005. Operational concepts report Vol.2: tower control deliverable 12. Middlesex University Press.
Operational Concepts Report Vol.1: Approach Control.
Amaldi, P., Fields, B., Rozzi, S. and Wong, B. 2005. Operational Concepts Report Vol.1: Approach Control. London Middlesex University Press.
Cultural representation for multi-culture interaction design
Sheikh, J., Fields, B. and Duncker-Gassen, E. 2009. Cultural representation for multi-culture interaction design. Aykin, N. (ed.) 3rd International Conference on Internationalization, Design and Global Development. San Diego, CA, USA 19 - 24 Jul 2009 Berlin, Heidelberg Springer. https://doi.org/10.1007/978-3-642-02767-3_11
Dynamic digital libraries for children.
Fields, B., Buchanan, G., Mohd-Nasir, N. and Theng, Y. 2001. Dynamic digital libraries for children. in: 1st ACM/IEEE-CS joint conference on Digital Libraries, Proceedings. NY, USA ACM New York. pp. 406-411
Representing collaborative work: the airport as common information space
Fields, B., Tassi, A. and Amaldi-Trillo, P. 2005. Representing collaborative work: the airport as common information space. Cognition Technoogy and Work. 7 (2), pp. 119-133. https://doi.org/10.1007/s10111-005-0177-3
A portable wireless-based architecture for solving minimum digital divide problems
Fenu, G. and Piras, L. 2008. A portable wireless-based architecture for solving minimum digital divide problems. 4th International Conference on Wireless and Mobile Communications. Athens, Greece 27 Jul - 01 Aug 2008 IEEE. pp. 130-136 https://doi.org/10.1109/icwmc.2008.21
Editorial: In use, in situ: extending field research methods
Fields, B., Amaldi, P., Wong, B. and Gill, S. 2007. Editorial: In use, in situ: extending field research methods. International Journal of Human-Computer Interaction. 22 (1-2), pp. 1-6. https://doi.org/10.1080/10447310709336952
Disrupting digital library development with scenario informed design
Fields, B., Blandford, A., Furniss, D. and Keith, S. 2007. Disrupting digital library development with scenario informed design. Interacting with Computers. 19 (1), pp. 70-82. https://doi.org/10.1016/j.intcom.2006.07.003
Design sketching for space and time
Rozzi, S., Wong, B., Amaldi, P., Woodward, P. and Fields, B. 2006. Design sketching for space and time. Clemmensen, T., Orngreen, R., Pejtersen, A. and Wong, B. (ed.) 1st IFIP Working Conference on Human Work Interaction Design. Madeira, Portugal 13 - 15 Feb 2006 New York, NY Springer. pp. 161-183 https://doi.org/10.1007/978-0-387-36792-7_10
Claims analysis "in the wild": a case study on digital library development
Fields, B., Blandford, A. and Keith, S. 2006. Claims analysis "in the wild": a case study on digital library development. International Journal of Human-Computer Interaction. 21 (2), pp. 197-218. https://doi.org/10.1207/s15327590ijhc2102_5
A study into the effect of digitisation projects on the management and stability of historic photograph collections
Davis-Perkins, V., Butterworth, R., Curzon, P. and Fields, B. 2005. A study into the effect of digitisation projects on the management and stability of historic photograph collections. Rauber, A., Christodoulakis, S. and Tjoa, A. (ed.) 9th European Conference on Research and Advanced Technology for Digital Libraries. Vienna, Austria 18 - 23 Sep 2005 Berlin, Heidelberg Springer. pp. 278-289 https://doi.org/10.1007/11551362_25