Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol.

Conference paper


Kammueller, F., Mapp, G., Patel, S. and Sani, A. 2012. Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol. International Conference on Internet Monitoring and Protection (ICIMP 2012). Stuttgart, Germany 27 May - 01 Jun 2012 Xpert Publishing Service.
TypeConference paper
TitleEngineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol.
AuthorsKammueller, F., Mapp, G., Patel, S. and Sani, A.
Abstract

This paper presents Radius-SHA256, an adaptation of the Radius protocol for remote authentication for network access to the secure hash function SHA- 256 and a Secure Simple Protocol. Both protocols have been formalized in the Avispa model checker, an automated verification tool for security of protocols. The work on Radius utilizes the existing formalization of the standard Radius protocol thereby establishing general validity and transferability of the established security proof and showing how refactoring can be applied in security protocol engineering. The development of a secured version of the SP protocol shows how gradually adding cryptographic keys to a transport protocol can introduce verified security while maintaining a level of trust in the adapted protocol.

Research GroupArtificial Intelligence group
Foundations of Computing group
SensoLab group
ConferenceInternational Conference on Internet Monitoring and Protection (ICIMP 2012)
Proceedings TitleInternational Conference on Internet Monitoring and Protection
PublisherXpert Publishing Service
Publication dates
Print2012
Publication process dates
Deposited07 Jun 2012
Output statusPublished
Accepted author manuscript
File Access Level
Controlled
LanguageEnglish
Permalink -

https://repository.mdx.ac.uk/item/83q41

  • 65
    total views
  • 0
    total downloads
  • 3
    views this month
  • 0
    downloads this month

Export as

Related outputs

Formalizing federated learning and differential privacy for GIS systems in IIIf
Kammueller, F., Piras, L., Fields, B. and Nagarajan, R. 2024. Formalizing federated learning and differential privacy for GIS systems in IIIf. 3rd International Workshop on System Security Assurance. Bydgoszcz, Poland 19 - 20 Sep 2024 Springer.
Transparency vs explanation of machine learning algorithms: perspectives from recent legal proceedings
Nnawuchi, U., George, C. and Kammueller, F. 2024. Transparency vs explanation of machine learning algorithms: perspectives from recent legal proceedings. Santos M., Machado, J., Novais, P., Cortez, P. and Moreira, P. (ed.) 23rd International Conference on Artificial Intelligence. Viana do Castelo, Portugal 03 - 06 Sep 2024 Springer.
Developing a secure service ecosystem to implement the intelligent edge environment for smart cities
Karthick, G. and Mapp, G. 2024. Developing a secure service ecosystem to implement the intelligent edge environment for smart cities. Future Internet. 16 (9). https://doi.org/10.3390/fi16090317
Enhancing digital forensics readiness in big data wireless medical networks: A secure decentralised framework
Mpungu, C, George, C. and Mapp, G. 2024. Enhancing digital forensics readiness in big data wireless medical networks: A secure decentralised framework. International Journal of Network Security & Its Applications (IJNSA) . 16 (4), pp. 13-30. https://doi.org/10.5121/ijnsa.2024.16402
Digital forensics readiness in big data networks: a novel framework and incident response script for Linux-Hadoop environments
Mpungu, C., George, C. and Mapp, G. 2024. Digital forensics readiness in big data networks: a novel framework and incident response script for Linux-Hadoop environments. Applied System Innovation. 7 (5). https://doi.org/10.3390/asi7050090
Analyzing air-traffic security using GIS-``blur'' with information flow control in the IIIf
Kammueller, F. 2024. Analyzing air-traffic security using GIS-``blur'' with information flow control in the IIIf. 19th International Conference on Availability, Reliability and Security. Vienna, Austria 30 Jul - 02 Aug 2024 New York, NY ACM. pp. 68 https://doi.org/10.1145/3664476
Energy efficiency optimisation of joint computational task offloading and resource allocation using particle swarm optimisation approach in vehicular edge networks
Alam, A., Shah, P., Trestian, R., Ali, K. and Mapp, G. 2024. Energy efficiency optimisation of joint computational task offloading and resource allocation using particle swarm optimisation approach in vehicular edge networks. Sensors. 24 (10). https://doi.org/10.3390/s24103001
Building an intelligent edge environment to provide essential services in smart cities
Karthick, G., Mapp, G. and Crowcroft, J. 2023. Building an intelligent edge environment to provide essential services in smart cities. 18th Workshop on Mobility in the Evolving Internet Architecture . Madrid Spain 06 - 06 Oct 2023 New York, NY, United States Association for Computing Machinery (ACM). pp. 13-18 https://doi.org/10.1145/3615587.3615987
Developing a novel digital forensics readiness framework for wireless medical networks using specialised logging
Mpungu, C., George, C. and Mapp, G. 2023. Developing a novel digital forensics readiness framework for wireless medical networks using specialised logging. Jahankhani, H. (ed.) 14th ICGS3-22: International Conference on Global Security, Safety and Sustainability. Virtual Conference 07 - 08 Sep 2022 Springer. pp. 203-226 https://doi.org/10.1007/978-3-031-20160-8_12
Joint energy and spectral optimization in Heterogeneous Vehicular Network
Alam, A., Ali, K., Trestian, R., Shah, P. and Mapp, G. 2023. Joint energy and spectral optimization in Heterogeneous Vehicular Network. Computer Networks. 238. https://doi.org/10.1016/j.comnet.2023.110111
Explanation by automated reasoning using the Isabelle Infrastructure framework
Kammueller, F. 2022. Explanation by automated reasoning using the Isabelle Infrastructure framework. Human Computer Interaction International. Virtual 26 Jun - 01 Jul 2022
Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders
Kammueller, F. and Alvarado, C. 2022. Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders. Moallem, A. (ed.) HCI-CPT: 4th International Conference on HCI for Cybersecurity, Privacy and Trust. Virtual 26 Jun - 01 Jul 2022 Springer. pp. 340-357 https://doi.org/10.1007/978-3-031-05563-8_22
Exploring new traffic prediction models to build an intelligent transport system for Smart Cities
Mehta, V., Mapp, G. and Gandhi, V. 2022. Exploring new traffic prediction models to build an intelligent transport system for Smart Cities. IEEE/IFIP Network Operations and Management Symposium. Hungary 25 - 29 Apr 2022 pp. 1-6
Explanation by automated reasoning using the Isabelle Infrastructure framework
Kammueller, F. 2021. Explanation by automated reasoning using the Isabelle Infrastructure framework. arxiv.org. https://doi.org/10.48550/arXiv.2112.14809
Explanation of black box AI for GDPR related privacy using Isabelle
Kammueller, F. 2022. Explanation of black box AI for GDPR related privacy using Isabelle. Garcia-Alfaro, J., Navarro-Arribas, G. and Dragoni, N. (ed.) 17th DPM International Workshop on Data Privacy Management. Copenhagen, Denmark 29 - 30 Sep 2022 Cham Springer. https://doi.org/10.1007/978-3-031-25734-6_5
Securing future healthcare environments in a post-COVID-19 world: moving from frameworks to prototypes
Vithanwattana, N., Karthick, G., Mapp, G., George, C. and Samuels, A. 2022. Securing future healthcare environments in a post-COVID-19 world: moving from frameworks to prototypes. Journal of Reliable Intelligent Environments. 8 (3), pp. 299-315. https://doi.org/10.1007/s40860-022-00180-7
A new privacy framework for the management of chronic diseases via mHealth in a post-Covid-19 world
Jusob, F., George, C. and Mapp, G. 2022. A new privacy framework for the management of chronic diseases via mHealth in a post-Covid-19 world. Journal of Public Health. 30 (1), pp. 37-47. https://doi.org/10.1007/s10389-021-01608-9
3D analytical modelling and iterative solution for high performance computing clusters
Kirsal, Y., Kirsal Ever, Y., Mapp, G. and Raza, M. 2022. 3D analytical modelling and iterative solution for high performance computing clusters. IEEE Transactions on Cloud Computing. 10 (4), pp. 2238-2251. https://doi.org/10.1109/TCC.2021.3055119
Dependability engineering in Isabelle
Kammueller, F. 2021. Dependability engineering in Isabelle. arxiv.org.
Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders
Kammueller, F. and Alvarado, C. 2021. Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders. arxiv.org.
Exploring a new security framework for future healthcare systems
Vithanwattana, N., Karthick, G., Mapp, G. and George, C. 2021. Exploring a new security framework for future healthcare systems. IEEE Global Communications Conference: Workshop on Securing Next-Generation Connected Healthcare Systems using Futuristic Technologies. Madrid, Spain [Hybrid: In-Person and Virtual] 07 - 11 Dec 2021 IEEE. pp. 1-6 https://doi.org/10.1109/GCWkshps52748.2021.9681967
A smart sensor grid to enhance irrigation techniques in Jordan using a novel event-based routing protocol
Rantisi, M., Mapp, G. and Gemikonakli, O. 2017. A smart sensor grid to enhance irrigation techniques in Jordan using a novel event-based routing protocol. Multimodal Technologies and Interaction. 1 (2). https://doi.org/10.3390/mti1020009
Connected vehicle testbed: development & deployment of C-ITS in the UK
Mapp, G., Ghosh, A., Paranthaman, V., Dohler, M. and Sardis, F. 2018. Connected vehicle testbed: development & deployment of C-ITS in the UK. Middlesex Repository Middlesex University.
Building an Intelligent Transport Information Platform for Smart Cities
Mapp, G., Ghosh, A. and Paranthaman, V. 2017. Building an Intelligent Transport Information Platform for Smart Cities. Middlesex University Research Repository Middlesex University.
Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2022. Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems. Computational Intelligence. 38 (3), pp. 811-828. https://doi.org/10.1111/coin.12421
Applying the Isabelle insider framework to airplane security
Kammueller, F. and Kerber, M. 2021. Applying the Isabelle insider framework to airplane security. Science of Computer Programming. 206. https://doi.org/10.1016/J.SCICO.2021.102623
Developing traffic predictions from source to destination using probabilistic modelling
Mehta, V., Gandhi, V. and Mapp, G. 2021. Developing traffic predictions from source to destination using probabilistic modelling. Third UK Mobile, Wearable and Ubiquitous Systems Research Symposium. Online via Zoom 05 - 06 Jul 2021
A formal development cycle for security engineering in Isabelle
Kammueller, F. 2020. A formal development cycle for security engineering in Isabelle. arxiv.org.
Applying the Isabelle Insider framework to airplane security
Kammueller, F. and Kerber, M. 2020. Applying the Isabelle Insider framework to airplane security. arxiv.org.
Exploring analytical models for proactive resource management in highly mobile environments
Kirsal, Y., Paranthaman, V. and Mapp, G. 2018. Exploring analytical models for proactive resource management in highly mobile environments. International Journal of Computers, Communications and Control. 13 (5), pp. 837-852. https://doi.org/10.15837/ijccc.2018.5.3349
Masterminding change by combining secure system design with security risk assessment
Kammueller, F., Legay, A. and Schivo, S. 2021. Masterminding change by combining secure system design with security risk assessment. International Journal on Software Tools for Technology Transfer. 23 (1), pp. 69-70. https://doi.org/10.1007/s10009-020-00595-8
Combining secure system design with risk assessment for IoT healthcare systems
Kammueller, F. 2019. Combining secure system design with risk assessment for IoT healthcare systems. SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of Things, colocated with IEEE PerCom 2019. Kyoto, Japan 11 - 15 Mar 2019 Institute of Electrical and Electronics Engineers (IEEE). pp. 961-966 https://doi.org/10.1109/PERCOMW.2019.8730776
Inter-blockchain protocols with the Isabelle Infrastructure framework
Kammueller, F. and Nestmann, U. 2020. Inter-blockchain protocols with the Isabelle Infrastructure framework. Bernardo, B. and Marmsoler, D. (ed.) 2nd Workshop on Formal Methods for Blockchain, co-located with CAV'20. Los Angeles, CA, USA LIPICS --Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany. pp. 11:1-11:12 https://doi.org/10.4230/OASIcs.FMBC.2020.11
Exploring real time traffic signalling using probabilistic approach in intelligent transport system
Mehta, V., Gandhi, V. and Mapp, G. 2018. Exploring real time traffic signalling using probabilistic approach in intelligent transport system. Mobi-UK 2018. University of Cambridge, Cambridge, UK 12 - 13 Sep 2018
Exploring real time traffic signalling using probabilistic approach in intelligent transport system
Mehta, V., Gandhi, V. and Mapp, G. 2018. Exploring real time traffic signalling using probabilistic approach in intelligent transport system. 3rd CommNet2 PhD Autumn School. University of Sheffield, Sheffield, UK 17 - 19 Sep 2018
Exploring a new framework to build mobile QoS-aware applications and services for future internet
Ezenwigbo, A., Kirsal, Y., Paranthaman, V., Mapp, G. and Trestian, R. 2018. Exploring a new framework to build mobile QoS-aware applications and services for future internet. Journal of Communications. 13 (10), pp. 559-573. https://doi.org/10.12720/jcm.13.10.559-573
Towards autonomous driving: a machine learning-based pedestrian detection system using 16-layer LiDAR
Mihai, S., Shah, P., Mapp, G., Nguyen, H. and Trestian, R. 2020. Towards autonomous driving: a machine learning-based pedestrian detection system using 16-layer LiDAR. COMM 2020. Bucharest, Romania 18 - 20 Jun 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 271-276 https://doi.org/10.1109/COMM48946.2020.9142042
Exploring the provision of reliable network storage in highly mobile environments
Ezenwigbo, A., Ramirez, J., Karthick, G., Mapp, G. and Trestian, R. 2020. Exploring the provision of reliable network storage in highly mobile environments. COMM 2020. Bucharest, Romania 18 - 20 Jun 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 255-260 https://doi.org/10.1109/COMM48946.2020.9142033
A new service management framework for vehicular networks
Ramirez, J., Ezenwigbo, A., Karthick, G., Trestian, R. and Mapp, G. 2020. A new service management framework for vehicular networks. 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops. Paris, France 23 - 27 Feb 2020 IEEE. pp. 162-164 https://doi.org/10.1109/ICIN48450.2020.9059441
Modeling and analyzing the Corona-virus warning app with the Isabelle infrastructure framework
Kammueller, F. and Lutz, B. 2020. Modeling and analyzing the Corona-virus warning app with the Isabelle infrastructure framework. Garcia-Alfaro, J., Navarro-Arribas, G. and Herrera-Joancomarti, J. (ed.) International Workshop of Data Privacy Management, DPM'20. University of Surrey, UK 17 - 18 Sep 2020 Springer. pp. 128-144 https://doi.org/10.1007/978-3-030-66172-4_8
Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems
Kammueller, F. 2020. Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems.
Describing and simulating concurrent quantum systems
Bornat, R., Boender, J., Kammueller, F., Poly, G. and Nagarajan, R. 2020. Describing and simulating concurrent quantum systems. Biere, A. and Parker, D. (ed.) International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 20). Dublin 27 - 30 Apr 2020 Springer. pp. 271-277 https://doi.org/10.1007/978-3-030-45237-7_16
Developing traffic prediction and congestion algorithms for a C-ITS network
Mehta, V., Gandhi, V. and Mapp, G. 2019. Developing traffic prediction and congestion algorithms for a C-ITS network. Second UK Mobile, Wearable and Ubiquitous Systems Research Symposium. Dept of Computer Science, University of Oxford, UK 01 Jul 2019
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. ICC’17. Cambridge University, Cambridge 22 Mar 2019 ICC’17, Cambridge, United Kingdom © 2017 ACM.. pp. 1-6 https://doi.org/10.1145/3018896.3056795
Attack trees in Isabelle
Kammueller, F. 2018. Attack trees in Isabelle. 20th International Conference on Information and Communications Security, ICICS 2018. Lille, France 29 - 31 Oct 2018 Springer. pp. 611-628 https://doi.org/10.1007/978-3-030-01950-1_36
Using advanced handover and localization techniques for maintaining quality-of-service of mobile users in heterogeneous cloud-based environment
Kirsal, Y., Mapp, G. and Sardis, F. 2019. Using advanced handover and localization techniques for maintaining quality-of-service of mobile users in heterogeneous cloud-based environment. Journal of Network and Systems Management. 27 (4), pp. 927-997. https://doi.org/10.1007/s10922-019-09494-z
Exploring intelligent service migration in vehicular networks
Ezenwigbo, A., Paranthaman, V., Mapp, G. and Trestian, R. 2019. Exploring intelligent service migration in vehicular networks. Gao, H., Yin, Y., Yang, X. and Miao, H. (ed.) TridentCom 2018: International Conference on Testbeds and Research Infrastructures. Shanghai, China 16 - 18 Nov 2018 Springer. pp. 41-61 https://doi.org/10.1007/978-3-030-12971-2_3
Exploiting resource contention in highly mobile environments and its application to vehicular ad-hoc networks
Paranthaman, V., Kirsal, Y., Mapp, G., Shah, P. and Nguyen, H. 2019. Exploiting resource contention in highly mobile environments and its application to vehicular ad-hoc networks. IEEE Transactions on Vehicular Technology. 68 (4), pp. 3805-3819. https://doi.org/10.1109/tvt.2019.2902245
Attack trees in Isabelle extended with probabilities for Quantum Cryptography
Kammueller, F. 2019. Attack trees in Isabelle extended with probabilities for Quantum Cryptography. Computers and Security. 87. https://doi.org/10.1016/j.cose.2019.101572
A QoS-based flow assignment for traffic engineering in software-defined networks
Thiruvasakan, L., Vien, Q., Loo, J. and Mapp, G. 2019. A QoS-based flow assignment for traffic engineering in software-defined networks. Barolli, L., Takizawa, M., Xhafa, F. and Enokido, T. (ed.) 33rd International Conference on Advanced Information Networking and Applications (AINA-2019). Matsue, Japan 27 - 29 Mar 2019 Springer. pp. 762-774 https://doi.org/10.1007/978-3-030-15032-7_64
Exploring the need for a suitable privacy framework for mHealth when managing chronic diseases
Jusob, F., George, C. and Mapp, G. 2017. Exploring the need for a suitable privacy framework for mHealth when managing chronic diseases. Journal of Reliable Intelligent Environments. 3 (4), pp. 243-256. https://doi.org/10.1007/s40860-017-0049-7
Edit distance Kernelization of NP theorem proving for polynomial-time machine learning of proof heuristics
Windridge, D. and Kammueller, F. 2020. Edit distance Kernelization of NP theorem proving for polynomial-time machine learning of proof heuristics. FICC 2019: Future of Information and Communications Conference. San Francisco, USA 14 - 15 Mar 2019 Springer. pp. 271-283 https://doi.org/10.1007/978-3-030-12385-7_22
Formal modeling and analysis of data protection for GDPR compliance of IoT healthcare systems
Kammueller, F. 2018. Formal modeling and analysis of data protection for GDPR compliance of IoT healthcare systems. IEEE SMC 2018: IEEE International Conference on Systems, Man and Cybernetics. Miyazaki, Japan 08 - 10 Oct 2018 Institute of Electrical and Electronics Engineers (IEEE).
Formalization and analysis of a resource allocation security protocol for secure service migration
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2018. Formalization and analysis of a resource allocation security protocol for secure service migration. IEEE/ACM International Conference on Utility and Cloud Computing (UCC2018). Zurich, Switzerland 17 - 20 Dec 2018 IEEE. pp. 207-212 https://doi.org/10.1109/UCC-Companion.2018.00058
Exploring a new transport protocol for vehicular networks
Ezenwigbo, A., Paranthaman, V., Trestian, R., Mapp, G. and Sardis, F. 2018. Exploring a new transport protocol for vehicular networks. 5th International Conference on Internet of Things: Systems, Management and Security (IoTSMS). Valencia, Spain 15 - 18 Oct 2018 IEEE. pp. 287-294 https://doi.org/10.1109/IoTSMS.2018.8554836
A proof calculus for attack trees in Isabelle
Kammueller, F. 2017. A proof calculus for attack trees in Isabelle. 12th International Workshop on Data Privacy Management (DPM 2017). Oslo, Norway 14 - 15 Sep 2017 Springer. pp. 3-18 https://doi.org/10.1007/978-3-319-67816-0_1
Developing an implementation framework for the future internet using the Y-Comm architecture, SDN and NFV
Mapp, G., Sardis, F. and Crowcroft, J. 2016. Developing an implementation framework for the future internet using the Y-Comm architecture, SDN and NFV. 2nd International Conference on Network Softwarization, IEEE NetSoft 2016. Seoul, South Korea 06 - 10 Jun 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 43-47 https://doi.org/10.1109/NETSOFT.2016.7502440
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. 2nd International Conference on Internet of Things, Data and Cloud Computing (ICC 2017). Churchill College, University of Cambridge, United Kingdom 22 - 23 Mar 2017 Association for Computing Machinery (ACM). https://doi.org/10.1145/3018896.3056795
Exploring a new security framework for cloud storage using capabilities
Mapp, G., Aiash, M., Ondiege, B. and Clarke, M. 2014. Exploring a new security framework for cloud storage using capabilities. 1st International Workshop on Cyber Security and Cloud Computing, a workshop of SOSE. Oxford, United Kingdom 07 - 11 Apr 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 484-489 https://doi.org/10.1109/SOSE.2014.69
Dynamic traffic management for interactive cloud services: localising traffic based on network throughput and user mobility
Sardis, F., Mapp, G., Loo, J. and Aiash, M. 2014. Dynamic traffic management for interactive cloud services: localising traffic based on network throughput and user mobility. 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC),. London, UK 08 - 11 Dec 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 298-306 https://doi.org/10.1109/UCC.2014.39
Developing a comprehensive information security framework for mHealth: a detailed analysis
Vithanwattana, N., Mapp, G. and George, C. 2017. Developing a comprehensive information security framework for mHealth: a detailed analysis. Journal of Reliable Intelligent Environments. 3 (1), pp. 21-39. https://doi.org/10.1007/s40860-017-0038-x
Admission control and buffer management of wireless communication systems with mobile stations and integrated voice and data services
Gemikonakli, E., Ever, E., Mapp, G. and Gemikonakli, O. 2017. Admission control and buffer management of wireless communication systems with mobile stations and integrated voice and data services. Telecommunication Systems. 65 (4), pp. 663-675. https://doi.org/10.1007/s11235-016-0259-y
Model based analysis of insider threats
Chen, T., Han, T., Kammueller, F., Nemli, I. and Probst, C. 2016. Model based analysis of insider threats. 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). London, United Kingdom 13 - 14 Jun 2016 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/CyberSecPODS.2016.7502350
Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle
Kammueller, F., Augusto, J. and Jones, S. 2017. Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle. IEEE/ACIS 15th International Conference on Software Engineering Research, Management and Application, SERA2017. University of Greenwich, London, United Kingdom 07 - 09 Jun 2017 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/SERA.2017.7965758
Formal modeling and analysis with humans in infrastructures for IoT health care systems
Kammueller, F. 2017. Formal modeling and analysis with humans in infrastructures for IoT health care systems. 5th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2017. Vancouver, BC, Canada 09 - 14 Jul 2017 Springer. pp. 339-352 https://doi.org/10.1007/978-3-319-58460-7_24
Human centric security and privacy for the IoT using formal techniques
Kammueller, F. 2018. Human centric security and privacy for the IoT using formal techniques. 3rd International Conference on Human Factors in Cybersecurity. Los Angeles, CA, United States 17 - 21 Jul 2017 Springer. pp. 106-116 https://doi.org/10.1007/978-3-319-60585-2_12
Insider threats for auctions: formalization, mechanized proof, and code generation
Kammueller, F., Kerber, M. and Probst, C. 2017. Insider threats for auctions: formalization, mechanized proof, and code generation. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). 8 (1), pp. 44-78. https://doi.org/10.22667/JOWUA.2017.03.31.044
Exploring a new proactive algorithm for resource management and its application to wireless mobile environments
Paranthaman, V., Kirsal, Y., Mapp, G., Shah, P. and Nguyen, H. 2017. Exploring a new proactive algorithm for resource management and its application to wireless mobile environments. 42nd Conference on Local Computer Networks (LCN). Singapore 09 - 12 Oct 2017 IEEE. pp. 539-542 https://doi.org/10.1109/LCN.2017.86
UEFA-M: Utility-based energy efficient adaptive multimedia mechanism over LTE HetNet small cells
Trestian, R., Vien, Q., Shah, P. and Mapp, G. 2017. UEFA-M: Utility-based energy efficient adaptive multimedia mechanism over LTE HetNet small cells. 14th International Symposium on Wireless Communication Systems. Bologna, Italy​ 28 - 31 Aug 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 408-413 https://doi.org/10.1109/ISWCS.2017.8108149
Exploring a new security framework for remote patient monitoring devices
Ondiege, B., Clarke, M. and Mapp, G. 2017. Exploring a new security framework for remote patient monitoring devices. Computers. 6 (1), pp. 1-12. https://doi.org/10.3390/computers6010011
A comparative experimental design and performance analysis of Snort-based Intrusion Detection System in practical computer networks
Karim, I., Vien, Q., Le, T. and Mapp, G. 2017. A comparative experimental design and performance analysis of Snort-based Intrusion Detection System in practical computer networks. Computers. 6 (1), pp. 1-15. https://doi.org/10.3390/computers6010006
Modeling and verification of insider threats using logical analysis
Kammueller, F. and Probst, C. 2017. Modeling and verification of insider threats using logical analysis. IEEE Systems Journal. 11 (2), pp. 534-545. https://doi.org/10.1109/JSYST.2015.2453215
Building a prototype VANET testbed to explore communication dynamics in highly mobile environments
Paranthaman, V., Ghosh, A., Mapp, G., Iniovosa, V., Shah, P., Nguyen, H., Gemikonakli, O. and Rahman, S. 2017. Building a prototype VANET testbed to explore communication dynamics in highly mobile environments. Guo, S., Wei, G., Xiang, Y., Lin, X. and Lorenz, P. (ed.) International Conference on Testbeds and Research Infrastructures (TridentCom 2016). Hangzhou, china 14 - 15 Jun 2016 Springer, Cham. pp. 81-90 https://doi.org/10.1007/978-3-319-49580-4_8
Towards formal analysis of insider threats for auctions
Kammueller, F., Kerber, M. and Probst, C. 2016. Towards formal analysis of insider threats for auctions. ACM-CCS Workshop on Management of Security of Insider Threats. Vienna, Austria 28 Oct 2016 Association for Computing Machinery (ACM). pp. 23-34 https://doi.org/10.1145/2995959.2995963
Isabelle Modelchecking for insider threats
Kammueller, F. 2016. Isabelle Modelchecking for insider threats. 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016. Heraklion, Crete, Greece 26 - 27 Sep 2016 Springer. pp. 196-210 https://doi.org/10.1007/978-3-319-47072-6_13
Refactoring preserves security
Kammueller, F. 2016. Refactoring preserves security. 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016. Heraklion, Crete, Greece 26 - 27 Sep 2016 Springer. pp. 238-245 https://doi.org/10.1007/978-3-319-47072-6_17
Verification of statecharts using data abstraction
Helke, S. and Kammueller, F. 2016. Verification of statecharts using data abstraction. International Journal of Advanced Computer Science and Applications. 7 (1), pp. 571-583. https://doi.org/10.14569/IJACSA.2016.070179
Formal modelling and analysis of socio-technical systems
Probst, C., Kammueller, F. and Hansen, R. 2016. Formal modelling and analysis of socio-technical systems. in: Semantics, Logics, and Calculi Springer International.
Attack tree analysis for insider threats on the IoT using Isabelle
Kammueller, F., Nurse, J. and Probst, C. 2016. Attack tree analysis for insider threats on the IoT using Isabelle. 4th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2016. Toronto, ON, Canada 17 - 24 Jul 2016 Springer International. pp. 234-246 https://doi.org/10.1007/978-3-319-39381-0_21
Exploring seamless connectivity and proactive handover techniques in VANET systems
Mapp, G., Ghosh, A., Paranthaman, V., Iniovosa, V., Loo, J. and Vinel, A. 2016. Exploring seamless connectivity and proactive handover techniques in VANET systems. in: Intelligent Transportation Systems: Dependable Vehicular Communications for Improved Road Safety Switzerland Springer International Publishing.
Investigating airplane safety and security against insider threats using logical modeling
Kammueller, F. and Kerber, M. 2016. Investigating airplane safety and security against insider threats using logical modeling. 2016 IEEE Security and Privacy Workshops SPW'16: Workshop on Research in Insider Threats WRIT'16. San Jose, CA, USA 22 - 26 May 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 304-313 https://doi.org/10.1109/SPW.2016.47
Secure refactoring with Java information flow
Helke, S., Kammueller, F. and Probst, C. 2016. Secure refactoring with Java information flow. 10th International Workshop on Data Privacy Management (DPM 2015). Vienna, Austria 21 - 22 Sep 2015 Springer. pp. 264-272 https://doi.org/10.1007/978-3-319-29883-2_19
Providing ubiquitous communication using handover techniques in VANET systems
Ghosh, A., Paranthaman, V., Mapp, G. and Gemikonakli, O. 2014. Providing ubiquitous communication using handover techniques in VANET systems. 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET). Piran, Slovenia 02 - 04 Jun 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 195-202 https://doi.org/10.1109/MedHocNet.2014.6849124
Providing ubiquitous communication using road-side units in VANET systems: unveiling the challenges
Ghosh, A., Vardhan, V., Mapp, G., Gemikonakli, O. and Loo, J. 2013. Providing ubiquitous communication using road-side units in VANET systems: unveiling the challenges. 13th International Conference on ITS Telecommunications (ITST) 2013. Finland, Tampere 05 - 07 Nov 2013 pp. 74-79 https://doi.org/10.1109/ITST.2013.6685524
Transforming graphical system models to graphical attack models
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2016. Transforming graphical system models to graphical attack models. 2nd International Workshop on Graphical Models for Security, GraMSec 2015, co-located with CSF2015. Verona, Italy 13 Jul 2015 Springer. pp. 82-96 https://doi.org/10.1007/978-3-319-29968-6_6
Attack tree generation by policy invalidation
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2015. Attack tree generation by policy invalidation. 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015). Heraklion, Crete, Greece 24 - 25 Aug 2015 Springer. pp. 249-259 https://doi.org/10.1007/978-3-319-24018-3_16
Formalization of quantum protocols using Coq
Boender, J., Kammueller, F. and Nagarajan, R. 2015. Formalization of quantum protocols using Coq. The 12th International Workshop on Quantum Physics and Logic (QPL 2015). Oxford, United Kingdom 15 - 17 Jul 2015 pp. 71-83
Invalidating policies using structural information
Kammueller, F. and Probst, C. 2013. Invalidating policies using structural information. IEEE CS Security and Privacy Workshops, SPW, WRIT'13.
Network information flow control: proof of concept
Alghothami, A. and Kammueller, F. 2013. Network information flow control: proof of concept. IEEE Int. Conf. on Systems, Man, and Cybernetics, SMC. Manchester, UK 13 - 16 Oct 2013 IEEE. pp. 2957-2962 https://doi.org/10.1109/SMC.2013.504
Privacy analysis of a hidden friendship protocol
Kammueller, F. and Preibusch, S. 2013. Privacy analysis of a hidden friendship protocol. The 8th International Workshop on Data Privacy Management, DPM 2013. Egam, UK 12 - 13 Sep 2013 Springer. pp. 83-99
Externalizing behaviour for analysing system models
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2013. Externalizing behaviour for analysing system models. 5th International Workshop on Managing Insider Security Threats, MIST, 2013..
Verification of quantum protocols using Coq
Boender, J., Kammueller, F. and Nagarajan, R. 2014. Verification of quantum protocols using Coq. 17th Conference on Quantum Information Processing (QIP). Barcelona, Spain 03 - 07 Feb 2014
Reviews for the American Mathematical Society (AMS): Paul Howells, Mark d’Inverno. Specifying termination in CSP. Theoretical Computer Science, 503:31–61, 2013.
Kammueller, F. 2014. Reviews for the American Mathematical Society (AMS): Paul Howells, Mark d’Inverno. Specifying termination in CSP. Theoretical Computer Science, 503:31–61, 2013. MathSciNet: Mathematical Reviews.
Combining generated data models with formal invalidation for insider threat analysis
Kammueller, F. and Probst, C. 2014. Combining generated data models with formal invalidation for insider threat analysis. 2014 IEEE Security and Privacy Workshops (SPW): Workshop on Research for Insider Threat (WRIT 2014). San Jose, California, USA 17 - 18 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 229-235 https://doi.org/10.1109/SPW.2014.45
Verification of DNSsec delegation signatures
Kammueller, F. 2014. Verification of DNSsec delegation signatures. 21st International IEEE Conference on Telecommunication. Lisbon 04 - 07 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 298-392 https://doi.org/10.1109/ICT.2014.6845127
Invalidating policies using structural information
Kammueller, F. and Probst, C. 2014. Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 5 (2), pp. 59-79. https://doi.org/10.22667/JOWUA.2014.06.31.059
Modeling human behaviour with higher order logic: insider threats
Boender, J., Kammueller, F., Ivanova, M. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust. Vienna Technical University, Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 31-39
A probabilistic analysis framework for malicious insider threats
Chen, T., Kammueller, F., Nemli, I. and Probst, C. 2015. A probabilistic analysis framework for malicious insider threats. 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2015, held as part of HCI International 2015. Los Angeles, California, USA 02 - 07 Aug 2015 Springer. pp. 178-189
Confinement for active objects
Kammueller, F. 2015. Confinement for active objects. International Journal of Advanced Computer Science and Applications. 6 (2), pp. 246-261. https://doi.org/10.14569/IJACSA.2015.060236
Modeling human behaviour with higher order logic: insider threats
Boender, J., Ivanova, M., Kammueller, F. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST 2014). Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers. pp. 31-39 https://doi.org/10.1109/STAST.2014.13
Supporting communication in information centric networks using the location/ID split protocol and time released caching
Aiash, M., Mapp, G. and Kallash, M. 2015. Supporting communication in information centric networks using the location/ID split protocol and time released caching. 2015 International Conference on Cloud Computing (ICCC). Riyadh, Saudi Arabia 26 - 29 Apr 2015 Institute of Electrical and Electronics Engineers. pp. 233-238 https://doi.org/10.1109/CLOUDCOMP.2015.7149657
Enabling seamless V2I communications towards developing cooperative automotive applications in VANET systems
Ghosh, A., Paranthaman, V., Mapp, G., Gemikonakli, O. and Loo, J. 2015. Enabling seamless V2I communications towards developing cooperative automotive applications in VANET systems. IEEE Communications Magazine. 53 (12), pp. 80-86. https://doi.org/10.1109/MCOM.2015.7355570
Exploring energy consumption issues for multimedia streaming in LTE HetNet small cells
Trestian, R., Vien, Q., Shah, P. and Mapp, G. 2015. Exploring energy consumption issues for multimedia streaming in LTE HetNet small cells. 2015 IEEE 40th Conference on Local Computer Networks (LCN 2015). Clearwater Beach, Florida, USA 26 - 29 Oct 2015 IEEE. pp. 498-501 https://doi.org/10.1109/LCN.2015.7366362
A secure framework for communications in heterogeneous networks
Aiash, M., Mapp, G., Lasebae, A. and Loo, J. 2014. A secure framework for communications in heterogeneous networks. WAINA 2014 28th International Conference on Advanced Information Networking and Applications Workshops. Victoria, BC 13 - 16 May 2014 pp. 841-846
Secure live virtual machines migration: issues and solutions
Aiash, M., Mapp, G. and Gemikonakli, O. 2014. Secure live virtual machines migration: issues and solutions. IEEE AINA 2014. Victoria, BC, Canada 13 - 16 May 2014
Cloud-based service delivery architecture with service-populating and mobility-aware mechanisms
Sardis, F., Mapp, G. and Loo, J. 2013. Cloud-based service delivery architecture with service-populating and mobility-aware mechanisms. in: Rodrigues, J., Lin, K. and Lloret, J. (ed.) Mobile Networks And Cloud Computing Convergence for Progressive Services and Applications IGI Global. pp. 183-199
Exploring efficient seamless handover in VANET systems using network dwell time
Ghosh, A., Parathaman, V., Mapp, G. and Gemikonakli, O. 2014. Exploring efficient seamless handover in VANET systems using network dwell time. EURASIP Journal on Wireless Communications and Networking. 2014 (1), pp. 1-19. https://doi.org/10.1186/1687-1499-2014-227
Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness
Kodagoda, N., Attfield, S., Choudhury, S., Rooney, C., Mapp, G., Nguyen, P., Slabbert, L., Wong, B., Aiash, M., Zheng, Y., Xu, K. and Lasebae, A. 2014. Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness. Information Visualization. 13 (4), pp. 346-360. https://doi.org/10.1177/1473871613490291
Modelling mixed access-patterns in network-based systems
Thakker, D., Mapp, G. and Gemikonakli, O. 2009. Modelling mixed access-patterns in network-based systems. in: 11th International Conference on Computer Modelling and Simulation (UKSIM '09) IEEE. pp. 514-519
Integrating mobility, quality-of-service and security in future mobile networks
Aiash, M., Mapp, G., Lasebae, A., Phan, R. and Loo, J. 2013. Integrating mobility, quality-of-service and security in future mobile networks. in: Ao, S. and Gelman, L. (ed.) Electrical Engineering and Intelligent Systems New York Springer.
Exploring service and buffer management issues to provide integrated voice and data services in single and multi channel wireless networks
Gemikonakli, E., Mapp, G., Gemikonakli, O. and Ever, E. 2013. Exploring service and buffer management issues to provide integrated voice and data services in single and multi channel wireless networks. The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013
Enhancing the modelling of vertical handover in integrated cellular/WLAN environments
Kirsal, Y., Ever, E., Mapp, G. and Gemikonakli, O. 2013. Enhancing the modelling of vertical handover in integrated cellular/WLAN environments. The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013
DNSsec in Isabelle – replay attack and origin authentication
Kammueller, F., Kirsal-Ever, Y. and Cheng, X. 2013. DNSsec in Isabelle – replay attack and origin authentication. SMC 2013: IEEE International Conference on Systems, Man, and Cybernetics. Manchester, UK 13 - 16 Oct 2013 IEEE. pp. 4772-4777 https://doi.org/10.1109/SMC.2013.812
Exploring service and buffer management issues to provide integrated voice and data services in single and multi-channel wireless networks
Gemikonakli, E., Mapp, G., Gemikonakli, O. and Ever, E. 2013. Exploring service and buffer management issues to provide integrated voice and data services in single and multi-channel wireless networks. in: 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA) IEEE. pp. 1056-1063
On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms
Sardis, F., Mapp, G., Loo, J., Aiash, M. and Vinel, A. 2013. On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms. IEEE Transactions on Multimedia. 15 (4), pp. 769-777. https://doi.org/10.1109/TMM.2013.2240286
A semi-lattice model for multi-lateral security
Kammueller, F. 2013. A semi-lattice model for multi-lateral security. in: Data privacy management and autonomous spontaneous security Berlin, Germany Springer.
A security model for functional active objects
Kammueller, F. 2012. A security model for functional active objects. Francisco, C., Kim, V., Miguel, C. and Andreas, K. (ed.) First International Symposium Communicability, Computer Graphics and Innovative Design for Interactive Systems (CCGIDIS 2011). Berlin Springer. https://doi.org/10.1007/978-3-642-33760-4_4
Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments
Mapp, G., Katsriku, F., Aiash, M., Chinnam, N., Lopes, R., Moreira, E., Vanni, R., Augusto, M., Middlesex University and University of Sao Paulo 2012. Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments. Journal of Computer Networks and Communications. https://doi.org/10.1155/2012/748163
A security model for functional active objects with an implementation in Erlang
Fleck, A. and Kammueller, F. 2011. A security model for functional active objects with an implementation in Erlang. in: Ficarra, F., Kratky, A., Veltman, K., Ficarra, M., Nicol, E. and Brie, M. (ed.) Computational informatics, social factors and new information technologies: hypermedia perspectives and avant-garde experiences in the era of communicability expansion Bergamo, Italy Blue Herons.
A formally verified device authentication protocol using Casper/FDR
Aiash, M., Mapp, G., Phan, R., Lasebae, A. and Loo, J. 2012. A formally verified device authentication protocol using Casper/FDR. Min, G., Wu, Y., Liu, L., Jin, X., Jarvis, S. and Al-Dubai, A. (ed.) 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012). Liverpool, UK 25 - 27 Jun 2012 IEEE. pp. 1293-1298 https://doi.org/10.1109/TrustCom.2012.27
Review for the American Mathematical Society (AMS): A. Francalanza et al. Permission-based separation logic for message-passing concurrency. Logical methods in computer science, 7: 1-47, 2011
Kammueller, F. 2012. Review for the American Mathematical Society (AMS): A. Francalanza et al. Permission-based separation logic for message-passing concurrency. Logical methods in computer science, 7: 1-47, 2011. Mathematical Reviews.
Reviews for the American Mathematical Society (AMS): Russell O’Connor. Classical mathematics for a constructive world. MSCS (21): 861–882, Cambridge University Press. 2010.
Kammueller, F. 2012. Reviews for the American Mathematical Society (AMS): Russell O’Connor. Classical mathematics for a constructive world. MSCS (21): 861–882, Cambridge University Press. 2010. Mathematical Reviews.
A locally nameless theory of objects
Henrio, L., Kammueller, F., Lutz, B. and Sudhof, H. 2010. A locally nameless theory of objects. SAFA Annual Workshop on Formal Techniques (SAFA’2010). 2229 Route des Crêtes, 06560, Valbonne, Provence-Alpes-Côte d'Azur, France
Locally nameless sigma calculus
Henrio, L., Kammueller, F., Lutz, B. and Sudhof, H. 2010. Locally nameless sigma calculus. Archive of Formal Proof.
Formalizing statecharts using hierarchical automata
Helke, S. and Kammueller, F. 2010. Formalizing statecharts using hierarchical automata. Archive of Formal Proof.
Radius-SHA256 – verified remote authentication with secure hashing.
Kammueller, F. and Patel, S. 2011. Radius-SHA256 – verified remote authentication with secure hashing. First Global Conference on Communication, Science and Information Engineering, CCSIE’11. Middlesex University 25 - 27 Jul 2011
ASPfun: a typed functional active object calculus
Henrio, L., Kammueller, F. and Lutz, B. 2012. ASPfun: a typed functional active object calculus. Science of Computer Programming. 77 (7-8), pp. 823-847. https://doi.org/10.1016/j.scico.2010.12.008
Application of verification techniques to security: model checking insider attacks
Kammueller, F., Probst, C. and Raimondi, F. 2012. Application of verification techniques to security: model checking insider attacks. 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability. Venice, Italy 28 - 29 Mar 2012 Blue Herons editions.
A survey of potential architectures for communication in heterogeneous networks
Aiash, M., Mapp, G., Lasebae, A., Loo, J., Sardis, F., Phan, R., Augusto, M., Moreira, E. and Vanni, R. 2012. A survey of potential architectures for communication in heterogeneous networks. IEEE Wireless Telecommunications Symposium (WTS 2012). London 18 - 20 Apr 2012 IEEE. pp. 1-6 https://doi.org/10.1109/WTS.2012.6266121
Critical review of analytical modelling approaches for performability evaluation of the handover phenomena in mobile communication systems
Kirsal, Y., Ever, E., Gemikonakli, O. and Mapp, G. 2011. Critical review of analytical modelling approaches for performability evaluation of the handover phenomena in mobile communication systems. IEEE International Conference on Computer and Information Technology (CIT 2011). pp. 132-137 https://doi.org/10.1109/CIT.2011.45
Modelling and performability analysis of WLANs as a queuing model with channel/access point failures and reconfiguration
Kirsal, Y., Ever, E., Gemikonakli, O. and Mapp, G. 2011. Modelling and performability analysis of WLANs as a queuing model with channel/access point failures and reconfiguration. EMS. Los Alamitos, CA IEEE Computer Society. pp. 440-445 https://doi.org/10.1109/EMS.2011.33
Security and QoS integration for protecting service providers in hterogeneous environments
Aiash, M., Mapp, G. and Lasebae, A. 2011. Security and QoS integration for protecting service providers in hterogeneous environments. International Journal of Computer Science. 38 (4), pp. 384-393.
M-Sieve: a visualisation tool for supporting network security analysts
Choudhury, S., Kodagoda, N., Nguyen, P., Rooney, C., Attfield, S., Xu, K., Zheng, Y., Wong, B., Chen, R., Mapp, G., Slabbert, L., Aiash, M. and Lasebae, A. 2012. M-Sieve: a visualisation tool for supporting network security analysts. VisWeek 2012. Seattle, WA, USA 14 - 19 Oct 2012
A formally verified AKA protocol for vertical handover inheterogeneous environments using Casper/FDR
Aiash, M., Mapp, G., Lasebae, A., Phan, R. and Loo, J. 2012. A formally verified AKA protocol for vertical handover inheterogeneous environments using Casper/FDR. EURASIP Journal on Wireless Communications and Networking. 2012 (57). https://doi.org/10.1186/1687-1499-2012-57
Stream bundle management layer for optimum management of co-existing telemedicine traffic streams under varying channel conditions in heterogeneous networks.
Shaikh, F., Lasebae, A., Mapp, G. and Middlesex University 2005. Stream bundle management layer for optimum management of co-existing telemedicine traffic streams under varying channel conditions in heterogeneous networks. MIT 2005. China
Teleporting in an X Window System Environment
Richardson, T., Bennett, F., Mapp, G., Hopper, A., Olivetti Research Laboratory and University of Cambridge 1994. Teleporting in an X Window System Environment. IEEE Personal Communications. 1 (3), pp. 6-12. https://doi.org/10.1109/MPC.1994.311827
Proactive policy management for heterogeneous networks
Shaikh, F., Lasebae, A., Mapp, G. and Middlesex University 2008. Proactive policy management for heterogeneous networks. 3rd International Conference on Information and Communication Technologies: from Theory to Applications (ICTTA 2008). Umayyad Palace, Damascus, Syria 07 - 11 Apr 2008
Client-based SBM layer for predictive management of traffic flows in heterogeneous networks
Shaikh, F., Lasebae, A., Mapp, G. and Middlesex University 2006. Client-based SBM layer for predictive management of traffic flows in heterogeneous networks. 2nd IEEE International Conference on Information and Communication Technologies: from Theory to Applications (ICTTA 2006). Damascus, Syria 24 - 28 Apr 2006
Tripwire: a synchronization primitive for virtual memory mapped communication.
Riddoch, D., Pope, S., Roberts, D., Mapp, G., Clarke, D., Ingram, D., Mansley, K., Hopper, A., AT&T Laboratories Cambridge and Laboratory for Communications Engineering 2001. Tripwire: a synchronization primitive for virtual memory mapped communication. Journal for Interconnection Networks. 2 (3), pp. 345-364. https://doi.org/10.1142/S0219265901000439
Traffic modelling in WLANs and cellular networks.
Gemikonakli, E., Mapp, G., Gemikonakli, O., Ever, E. and Middlesex University 2011. Traffic modelling in WLANs and cellular networks. First Global Conference on Communication, Science and Information Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
A survey of network coverage prediction mechanisms in 4G heterogeneous wireless networks.
Shaikh, F., Mapp, G., Lasebae, A., British Institute of Technology and e-Commerce and Middlesex University 2011. A survey of network coverage prediction mechanisms in 4G heterogeneous wireless networks. First Global Conference on Communication, Science and Information Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Exploring the concept of scope to provide better security for internet services.
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Middlesex University and Loughborough University 2011. Exploring the concept of scope to provide better security for internet services. First Global Conference on Communication, Science and Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
The development of a dynamic and robust event-based routing protocol in wireless sensor networks for environment monitoring.
Rantisi, M., Maquosi, A., Mapp, G., Gemikonakli, O., PSUT University, Petra University and Middlesex University 2011. The development of a dynamic and robust event-based routing protocol in wireless sensor networks for environment monitoring. First Global Conference on Communication, Science and Information Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Enhancing naming and location services to support multi-homed devices in heterogeneous environments
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Augusto, M., Vanni, R., Moreira, E., Middlesex University, Loughborough University and University of Sao Paulo 2011. Enhancing naming and location services to support multi-homed devices in heterogeneous environments. First Conference on Communication, Science and Information Enginneering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Networked surfaces: a new concept in mobile networking
Scott, J., Hoffman, F., Addlesee, M., Mapp, G., Hopper, A., Laboratory for Communications Engineering, AT&T Laboratories Cambridge and Cambridge University Engineering Department 2002. Networked surfaces: a new concept in mobile networking. Mobile Networks and Applications. 7 (5), pp. 353-364. https://doi.org/10.1023/A:1016539632660
Virtual memory support for distributed computing environments using a shared data object model
Huang, F., Bacon, J., Mapp, G. and University of Cambridge 1995. Virtual memory support for distributed computing environments using a shared data object model. Distributed Systems Engineering. 2 (4), pp. 202-211. https://doi.org/10.1088/0967-1846/2/4/003
Proactive policy management using TBVH mechanism in heterogeneous networks.
Shaikh, F., Mapp, G., Lasebae, A. and Middlesex University 2007. Proactive policy management using TBVH mechanism in heterogeneous networks. Proceedings of the International Conference and Exhibition on 'Next Generation Mobile Application, Services and Technologies' (NGMAST 2007). Cardiff, Wales 12 - 14 Sep 2007
Balancing streaming and demand accesses in a network based storage environment.
Thakker, D., Mapp, G., Gemikonakli, O. and Middlesex University 2010. Balancing streaming and demand accesses in a network based storage environment. in: Sobh, T., Elleithy, K. and Mahmood, A. (ed.) Novel algorithms and techniques in telecommunications and networking. London, New York Springer. pp. 403-408
A QoS framework for heterogeneous networking
Aiash, M., Mapp, G., Lasebae, A., Augusto, M., Vanni, R. and Moreira, E. 2011. A QoS framework for heterogeneous networking. ICWN'11: The 2011 International Conference of Wireless Networks (held as part of WCE 2011). London, UK 06 - 08 Jul 2011
Impacts of buffering voice calls in integrated voice and data services
Gemikonakli, E., Gemikonakli, O., Ever, E., Mapp, G. and Institute of Electrical and Electronics Engineers 2011. Impacts of buffering voice calls in integrated voice and data services. Al-Dabass, D., Orsoni, A., Cant, R. and Abraham, A. (ed.) IEEE. pp. 507-512 https://doi.org/10.1109/UKSIM.2011.103
Exploring multi-homing issues in heterogeneous networks
Mapp, G., Aiash, M., Guardia, H., Crowcroft, J., Institute of Electrical and Electronics Engineers, Middlesex University, Federal University of Sao Paulo and University of Cambridge 2011. Exploring multi-homing issues in heterogeneous networks. IEEE. pp. 690-695 https://doi.org/10.1109/WAINA.2011.140
Modelchecking non-functional requirements for interface specifications.
Kammueller, F. and Preibusch, S. 2008. Modelchecking non-functional requirements for interface specifications. European Joint Conference on Theory and Practice of Software, 2008, (Foundations of Interface technologies). Budapest 29 Mar - 06 Apr 2008
Compositionality of aspect weaving.
Kammueller, F. and Sudhof, H. 2008. Compositionality of aspect weaving. in: Mahr, B. and Sheng, H. (ed.) Autonomous systems: self-organisation, management, and control. Springer Verlag. pp. 87-96
Interactive theorem proving in software engineering.
Kammueller, F. 2008. Interactive theorem proving in software engineering. Saarbrücken, Germany VDM Verlag Dr. Mueller.
Using functional active objects to enforce privacy
Kammueller, F. 2010. Using functional active objects to enforce privacy. 5th Conference on Network Architectures and Information Systems Security. Menton, France 18 - 21 May 2010
Enhancing privacy implementations of database enquiries
Kammueller, F. and Kammueller, R. 2009. Enhancing privacy implementations of database enquiries. IEEE. pp. 45-50 https://doi.org/10.1109/ICIMP.2009.15
Implementing privacy with Erlang active objects
Fleck, A. and Kammueller, F. 2010. Implementing privacy with Erlang active objects. International Conference on Internet Monitoring and Protection. Barcelona 09 - 15 May 2010 IEEE. pp. 141-146 https://doi.org/10.1109/ICIMP.2010.27
Privacy by flexible parameterization with Erlang active objects.
Fleck, A. and Kammueller, F. 2010. Privacy by flexible parameterization with Erlang active objects. International Journal on Advances in Software. 3 (3-4), pp. 461-473.
Functional active objects: typing and formalisation
Henrio, L. and Kammueller, F. 2009. Functional active objects: typing and formalisation. Elsevier. https://doi.org/10.1016/j.entcs.2009.10.026
Feature link propagation across variability representations with Isabelle/HOL
Kammueller, F., Rein, A. and Reiser, M. 2010. Feature link propagation across variability representations with Isabelle/HOL. Rubin, J., Botterweck, G., Mezini, M., Maman, I. and Lero, A. (ed.) New York ACM. pp. 48-53
Checking the TWIN elevator system by translating object-Z to SMV
Preibusch, S. and Kammueller, F. 2008. Checking the TWIN elevator system by translating object-Z to SMV. Lecture Notes in Computer Science. 4916, pp. 38-55. https://doi.org/10.1007/978-3-540-79707-4
Composing safely: a type system for aspects
Kammueller, F. and Sudhof, H. 2008. Composing safely: a type system for aspects. Lecture Notes in Computer Science. 4954, pp. 231-247. https://doi.org/10.1007/978-3-540-78789-1_18
Security analysis of private data enquiries in Erlang
Kammueller, F. and Kammueller, R. 2009. Security analysis of private data enquiries in Erlang. International Journal on Advances in Security. 2 (2&3), pp. 242-255.
An asynchronous distributed component model and its semantics
Henrio, L., Kammueller, F. and Rivera, M. 2009. An asynchronous distributed component model and its semantics. Lecture Notes in Computer Science. 5751, pp. 159-179. https://doi.org/10.1007/978-3-642-04167-9_9
A framework for reasoning on component composition
Henrio, L., Kammueller, F. and Khan, M. 2010. A framework for reasoning on component composition. Lecture Notes in Computer Science. 6286, pp. 1-20. https://doi.org/10.1007/978-3-642-17071-3_1
Formalizing non-interference for a simple bytecode language in Coq
Kammueller, F. 2008. Formalizing non-interference for a simple bytecode language in Coq. Formal Aspects of Computing. 20 (3), pp. 259-275.
Mechanical analysis of finite idempotent relations
Kammueller, F. 2011. Mechanical analysis of finite idempotent relations. Fundamenta Informaticae. 107 (1), pp. 43-65. https://doi.org/10.3233/FI-2011-392
Privacy enforcement and analysis for functional active objects
Kammueller, F. 2011. Privacy enforcement and analysis for functional active objects. Lecture Notes in Computer Science. 6514, pp. 93-107. https://doi.org/10.1007/978-3-642-19348-4_8
Y-Comm research [web page]
Mapp, G., Middlesex University, University of Cambridge, University of Sao Paulo and Loughborough University 2008. Y-Comm research [web page]. Middlesex University.
Exploring gate-limited analytical models for high-performance network storage servers
Mapp, G., Thakker, D., Gemikonakli, O. and Middlesex University 2011. Exploring gate-limited analytical models for high-performance network storage servers. Journal of Computer and System Sciences. 77 (5). https://doi.org/10.1016/j.jcss.2010.08.002
Towards an integrated network security framework using the Y-Comm architecture
Mapp, G., Crowcroft, J. and Phan, R. 2010. Towards an integrated network security framework using the Y-Comm architecture. in: Jahankhani, H., Watson, D., Me, G. and Leonhardt, F. (ed.) Handbook of electronic security and digital forensics Singapore World Scientific Publishing. pp. 169-183
Providing security in 4G systems: unveiling the challenges
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Middlesex University and Loughborough University 2010. Providing security in 4G systems: unveiling the challenges. Atmaca, T., Palicot, J., Amor, N., Tsiatsos, T., Marot, M. and Dini, O. (ed.) IEEE. pp. 439-444 https://doi.org/10.1109/AICT.2010.24
The design of a storage architecture for mobile heterogeneous devices.
Mapp, G., Thakker, D. and Silcott, D. 2007. The design of a storage architecture for mobile heterogeneous devices. IEEE Computer Society. https://doi.org/10.1109/ICNS.2007.113
An architectural framework for heterogeneous networking.
Mapp, G., Cottingham, D., Shaikh, F., Vidales, P., Patanapongpibul, L., Baliosian, J. and Crowcroft, J. 2006. An architectural framework for heterogeneous networking. Vasiu, L. (ed.) Portugal Institute of Systems and Technologies of Information, Control and Communication.
Y-Comm: a global architecture for heterogeneous networking.
Mapp, G., Shaikh, F., Crowcroft, J., Cottingham, D. and Baliosian, J. 2007. Y-Comm: a global architecture for heterogeneous networking. 3rd International Conference on Wireless Internet. Austin, Texas
An analytical approach for performance analysis of handoffs in the next generation integrated cellular networks and WLANs
Kirsal, Y., Gemikonakli, E., Ever, E., Mapp, G., Gemikonakli, O. and Middlesex University 2010. An analytical approach for performance analysis of handoffs in the next generation integrated cellular networks and WLANs. IEEE. https://doi.org/10.1109/ICCCN.2010.5560093
Information for handover management in heterogeneous networks: data representation,languages and integrated platforms
Vanni, R., Branco, K., Moreira, E., Mapp, G., University of Sao Paulo and Middlesex University 2010. Information for handover management in heterogeneous networks: data representation,languages and integrated platforms. 7th International Conference on Information and Technology Management. Sao Paulo, Brazil 19 - 21 May 2010
Exploring Markov models for gate-limited service and their application to network-based services.
Mapp, G. 2009. Exploring Markov models for gate-limited service and their application to network-based services. Eight Mathematics of Networks Meeting. Cambridge 18 Sep 2009
Exploring a new Markov chain model for multiqueue systems.
Mapp, G., Thakker, D. and Gemikonakli, O. 2010. Exploring a new Markov chain model for multiqueue systems. Al-Dabass, D., Orsoni, A., Cant, R. and Abraham, A. (ed.) IEEE Computer Society. pp. 592-597 https://doi.org/10.1109/UKSIM.2010.113
Exploiting contextual handover information for versatile services in NGN environments.
Moreira, E., Cottingham, D., Crowcroft, J., Hui, P., Mapp, G., Vanni, R. and Institute of Electrical and Electronics Engineers 2007. Exploiting contextual handover information for versatile services in NGN environments. in: Digital Information Management, 2007. ICDIM '07. 2nd International Conference. IEEE Computer Society. pp. 506-512
Security models for heterogeneous networking
Mapp, G., Aiash, M., Lasebae, A. and Phan, R. 2010. Security models for heterogeneous networking. Katsikas, S. (ed.) 4th International Conference on Security and Cryptography. Athens, Greece 26 - 28 Jul 2010 IEEE. pp. 1-4
Modelling and performability analysis of network memory servers.
Gemikonakli, O., Mapp, G., Thakker, D., Ever, E. and Society for Modeling and Simulation International 2006. Modelling and performability analysis of network memory servers. in: 39th Annual Simulation Symposium: proceedings. California IEEE Computer Society. pp. 127-134
Modelling network memory servers with parallel processors, break-downs and repairs.
Gemikonakli, O., Mapp, G., Ever, E. and Thakker, D. 2007. Modelling network memory servers with parallel processors, break-downs and repairs. California IEEE Computer Society. pp. 11-20 https://doi.org/10.1109/ANSS.2007.29
Exploring efficient imperative handover mechanisms for heterogeneous wireless networks
Mapp, G., Shaikh, F., Aiash, M., Vanni, R., Augusto, M. and Moreira, E. 2009. Exploring efficient imperative handover mechanisms for heterogeneous wireless networks. Duresi, A., Barolli, L., Enokido, T., Uehara, M., Shakshuki, E. and Takizawa, M. (ed.) 12th International Conference on Network-Based Information Systems. Indianapolis, Indiana 19 - 21 Aug 2009 IEEE. pp. 286-291 https://doi.org/10.1109/NBiS.2009.95
A practical approach for 4G systems: deployment of overlay networks.
Mapp, G., Stajano, F., Crowcroft, J. and Vidales, P. 2005. A practical approach for 4G systems: deployment of overlay networks. in: First International Conference on Testbeds and Research Infrastructures for the DEvelopment of NeTworks and COMmunities, Tridentcom 2005, Trento, Italy. IEEE Computer Society Press. pp. 172-181
A client-based handoff mechanism for mobile IPv6 wireless networks.
Mapp, G. and Pantanapongpibul, L. 2003. A client-based handoff mechanism for mobile IPv6 wireless networks. in: 8th IEEE Symposium on Computers and Communications (ISCC), Antalya, Turkey. Proceedings IEEE Computer Society Press. pp. 563-568
Autonomic system for mobility support in 4G networks
Mapp, G., Baliosian, J., Serrat, J. and Vidales, P. 2005. Autonomic system for mobility support in 4G networks. IEEE Journal on Selected Areas in Communications. 23 (12), pp. 2288-2304. https://doi.org/10.1109/JSAC.2005.857198
An end-system approach to mobility management for 4G networks and its application to thin-client computing.
Mapp, G., Hopper, A. and Pantanapongpibul, L. 2006. An end-system approach to mobility management for 4G networks and its application to thin-client computing. ACM SIGMOBILE Mobile Computing and Communications Review. 10 (3), pp. 13-33. https://doi.org/10.1145/1148094.1148097
Link layer-based TCP optimisation for disconnecting networks.
Scott, J. and Mapp, G. 2003. Link layer-based TCP optimisation for disconnecting networks. ACM SIGCOMM Computer Communication Review. 33 (5), pp. 31-42. https://doi.org/10.1145/963985.963989