Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle

Conference paper


Kammueller, F., Augusto, J. and Jones, S. 2017. Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle. IEEE/ACIS 15th International Conference on Software Engineering Research, Management and Application, SERA2017. University of Greenwich, London, United Kingdom 07 - 09 Jun 2017 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/SERA.2017.7965758
TypeConference paper
TitleSecurity and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle
AuthorsKammueller, F., Augusto, J. and Jones, S.
Abstract

In this paper, we combine a framework for ethical requirement elicitation eFRIEND with automated reasoning. To provide trustworthy and secure IoT for vulnerable users in healthcare scenarios, we need to apply ethics to arrive at suitable system requirements. In order to map those to technical system requirements, we employ high level logical modeling using dedicated Isabelle frameworks for (1) infrastructures with human actors and security policies, (2) attack tree analysis, and (3) security protocol analysis. Following this outline, we apply these frameworks to a case study for supporting Security and Privacy when diagnosing Alzheimer’s patients with smartphone and sensor technology

ConferenceIEEE/ACIS 15th International Conference on Software Engineering Research, Management and Application, SERA2017
ISBN
Hardcover9781509057566
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Publication dates
Print09 Jun 2017
Online03 Jul 2017
Publication process dates
Deposited13 Jun 2017
Accepted10 Apr 2017
Output statusPublished
Accepted author manuscript
Copyright Statement

© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Digital Object Identifier (DOI)https://doi.org/10.1109/SERA.2017.7965758
LanguageEnglish
Book title2017 IEEE 15th International Conference on Software Engineering Research, Management and Application (SERA)
Permalink -

https://repository.mdx.ac.uk/item/87029

Download files


Accepted author manuscript
  • 144
    total views
  • 17
    total downloads
  • 12
    views this month
  • 1
    downloads this month

Export as

Related outputs

Formalizing federated learning and differential privacy for GIS systems in IIIf
Kammueller, F., Piras, L., Fields, B. and Nagarajan, R. 2024. Formalizing federated learning and differential privacy for GIS systems in IIIf. 3rd International Workshop on System Security Assurance. Bydgoszcz, Poland 19 - 20 Sep 2024 Springer.
Transparency vs explanation of machine learning algorithms: perspectives from recent legal proceedings
Nnawuchi, U., George, C. and Kammueller, F. 2024. Transparency vs explanation of machine learning algorithms: perspectives from recent legal proceedings. Santos M., Machado, J., Novais, P., Cortez, P. and Moreira, P. (ed.) 23rd International Conference on Artificial Intelligence. Viana do Castelo, Portugal 03 - 06 Sep 2024 Springer. pp. 270-283 https://doi.org/10.1007/978-3-031-73497-7_22
Analyzing air-traffic security using GIS-``blur'' with information flow control in the IIIf
Kammueller, F. 2024. Analyzing air-traffic security using GIS-``blur'' with information flow control in the IIIf. 19th International Conference on Availability, Reliability and Security. Vienna, Austria 30 Jul - 02 Aug 2024 New York, NY Association for Computing Machinery (ACM). pp. 68 https://doi.org/10.1145/3664476
Generating data in an intelligent environment and systematically predicting user activity via bluetooth low energy beacons and machine learning
Benedict. S., Augusto, J. and Kacar. O. 2024. Generating data in an intelligent environment and systematically predicting user activity via bluetooth low energy beacons and machine learning. Hornos, M., Slapničar, G. and Yu, J. (ed.) 20th International Conference on Intelligent Environments (IE2024). Ljubljana, Slovenia 17 - 20 Jun 2024 IOS Press. pp. 158-163 https://doi.org/10.3233/AISE240030
Gaining insight into user behaviour and systematically determing user location via Bluetooth low energy beacon optimisation
Benedict, S., Augusto, J. and Kacar. O. 2024. Gaining insight into user behaviour and systematically determing user location via Bluetooth low energy beacon optimisation. 20th International Conference on Intelligent Environments (IE2024). Ljubljana, Slovenia 17 - 20 Jun 2024 IEEE. https://doi.org/10.1109/IE61493.2024.10599920
Towards engineering higher quality intelligent environments: a multi case study approach
Santokhee, A., Augusto, J. and Brodie, L. 2024. Towards engineering higher quality intelligent environments: a multi case study approach. Software Quality Journal. 32 (3), pp. 1075-1135. https://doi.org/10.1007/s11219-024-09678-0
Taxonomy and software architecture for real-time context-aware collaborative smart environments
Bazan-Muñoz, A., Ortiz, G., Augusto, J. C. and Garcia-de-Prado, A. 2024. Taxonomy and software architecture for real-time context-aware collaborative smart environments. Internet of Things. 26. https://doi.org/10.1016/j.iot.2024.101160
Introducing distributed ledger security into system specifications with the Isabelle RR-cycle
Kammueller, F. 2024. Introducing distributed ledger security into system specifications with the Isabelle RR-cycle. 28th European Symposium on Research in Computer Security: 2nd International Workshop on System Security Assurance (SecAssure). The Hague, The Netherlands 29 - 29 Sep 2023 Springer. pp. 330-340 https://doi.org/10.1007/978-3-031-54129-2_19
Applying motivational techniques for user adherence to adopt a healthy lifestyle in a gamified application
Fatima, S., Augusto, J., Moseley, R., Urbonas, P., Elliott, A. and Payne, N. 2023. Applying motivational techniques for user adherence to adopt a healthy lifestyle in a gamified application. Entertainment Computing. 46. https://doi.org/10.1016/j.entcom.2023.100571
A user-guided personalization methodology to facilitate new smart home occupancy
Ali, S.M.M., Augusto, J., Windridge, D. and Ward, E. 2023. A user-guided personalization methodology to facilitate new smart home occupancy. Universal Access in the Information Society. 22 (3), pp. 869-891. https://doi.org/10.1007/s10209-022-00883-x
Quality traceability for user-centric context-aware systems in intelligent environments
Sakanga, N., Augusto, J., Brodie, L. and Marzano, L. 2022. Quality traceability for user-centric context-aware systems in intelligent environments. Work-07: Digital Innovation for people well-being: Healthcare and Agriculture perspectives . Yokohama, Japan 07 Nov 2022 IEEE. https://doi.org/10.1109/WF-IoT54382.2022.10152209
Explanation by automated reasoning using the Isabelle Infrastructure framework
Kammueller, F. 2022. Explanation by automated reasoning using the Isabelle Infrastructure framework. Human Computer Interaction International. Virtual 26 Jun - 01 Jul 2022
Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders
Kammueller, F. and Alvarado, C. 2022. Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders. Moallem, A. (ed.) HCI-CPT: 4th International Conference on HCI for Cybersecurity, Privacy and Trust. Virtual 26 Jun - 01 Jul 2022 Springer. pp. 340-357 https://doi.org/10.1007/978-3-031-05563-8_22
Gamification for healthier lifestyle – user retention
Fatima, S., Augusto, J., Moseley, R. and Urbonas, P. 2022. Gamification for healthier lifestyle – user retention. 3rd Workshop on Smart Data Integration and Processing on Service Based Environments (STRAPS 2021). Dubai, UAE 22 Nov 2021 Springer. pp. 217-227 https://doi.org/10.1007/978-3-031-14135-5_17
Explanation by automated reasoning using the Isabelle Infrastructure framework
Kammueller, F. 2021. Explanation by automated reasoning using the Isabelle Infrastructure framework. arxiv.org. https://doi.org/10.48550/arXiv.2112.14809
Explanation of black box AI for GDPR related privacy using Isabelle
Kammueller, F. 2022. Explanation of black box AI for GDPR related privacy using Isabelle. Garcia-Alfaro, J., Navarro-Arribas, G. and Dragoni, N. (ed.) 17th DPM International Workshop on Data Privacy Management. Copenhagen, Denmark 29 - 30 Sep 2022 Cham Springer. https://doi.org/10.1007/978-3-031-25734-6_5
Introduction to the Proceedings of WoRIE’22
Rodríguez-Domínguez, C., Santokhee, A., Hornos, M. and Augusto, J. 2022. Introduction to the Proceedings of WoRIE’22. in: Alvarez Valera, H. and Luštrek, M. (ed.) Intelligent Environments 2022: Workshops at 18th International Conference on Intelligent Environments (IE2022) IOS Press.
Engineering context updates
Augusto, J. 2022. Engineering context updates. 5th Citizen-Centric Smart Cities Services (CCSCS'2022) Workshop. Biarritz, France 20 - 21 Jun 2022 IOS Press. pp. 293-301 https://doi.org/10.3233/aise220056
Contexts and context-awareness revisited from an intelligent environments perspective
Augusto, J. 2022. Contexts and context-awareness revisited from an intelligent environments perspective. Applied Artificial Intelligence. 36 (1), pp. 694-725. https://doi.org/10.1080/08839514.2021.2008644
AnAbEL: Towards empowering people living with dementia in ambient assisted living
Gimenez Manuel, J., Augusto, J. and Stewart, J. 2022. AnAbEL: Towards empowering people living with dementia in ambient assisted living. Universal Access in the Information Society. 21 (2), pp. 457-476. https://doi.org/10.1007/s10209-020-00760-5
Dependability engineering in Isabelle
Kammueller, F. 2021. Dependability engineering in Isabelle. arxiv.org.
Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders
Kammueller, F. and Alvarado, C. 2021. Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders. arxiv.org.
The Life-cycle of artificial contexts
Augusto, J. and Dickins, T. 2021. The Life-cycle of artificial contexts. Modeling and Using Context. 4 (Sp Iss), pp. 1-7. https://doi.org/10.21494/ISTE.OP.2021.0685
Smart cities: state of the art and future challenges
Augusto, J. 2021. Smart cities: state of the art and future challenges. in: Augusto, J. (ed.) Handbook of Smart Cities Cham, Switzerland Springer Nature. pp. 1693-1702
Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2022. Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems. Computational Intelligence. 38 (3), pp. 811-828. https://doi.org/10.1111/coin.12421
Applying the Isabelle insider framework to airplane security
Kammueller, F. and Kerber, M. 2021. Applying the Isabelle insider framework to airplane security. Science of Computer Programming. 206. https://doi.org/10.1016/J.SCICO.2021.102623
Context-aware support for cardiac health monitoring using federated machine learning
Ogbuabor, G., Augusto, J., Moseley, R. and Van Wyk, A. 2021. Context-aware support for cardiac health monitoring using federated machine learning. Bramer, M. and Ellis, R. (ed.) 41st SGAI International Conference on Artificial Intelligence (AI-2021). Cambridge, England [Online] 14 - 16 Dec 2021 Springer. pp. 267-281 https://doi.org/10.1007/978-3-030-91100-3_22
Introduction to the Proceedings of WoRIE’21
Rodríguez-Domínguez, C., Santokhee, A., Hornos, M. and Augusto, J. 2021. Introduction to the Proceedings of WoRIE’21. in: Bashir, E. and Luštrek, M. (ed.) Intelligent Environments 2021: Workshop Proceedings of the 17th International Conference on Intelligent Environments IOS Press.
A smart campus template
Augusto, J. 2021. A smart campus template. Bashir, E. and Luštrek, M. (ed.) 3rd International Workshop on Intelligent Environments and Buildings (IEB’21). Virtual Event 21 Jun 2021 IOS Press. pp. 71-80 https://doi.org/10.3233/aise210083
Using argumentation to solve conflicting situations in users' preferences in ambient assisted living
Oguego, C., Augusto, J., Springett, M., Quinde, M. and James-Reynolds, C. 2021. Using argumentation to solve conflicting situations in users' preferences in ambient assisted living. Applied Artificial Intelligence. 35 (15), pp. 2327-2369. https://doi.org/10.1080/08839514.2021.1966986
Using technology to encourage a healthier lifestyle in people with Down's syndrome
Mohammedi, A. and Augusto, J. 2021. Using technology to encourage a healthier lifestyle in people with Down's syndrome. Universal Access in the Information Society. 20 (2), pp. 343-358. https://doi.org/10.1007/s10209-020-00721-y
A formal development cycle for security engineering in Isabelle
Kammueller, F. 2020. A formal development cycle for security engineering in Isabelle. arxiv.org.
Applying the Isabelle Insider framework to airplane security
Kammueller, F. and Kerber, M. 2020. Applying the Isabelle Insider framework to airplane security. arxiv.org.
Context-aware systems architecture (CaSA)
Augusto, J., Quinde, M., Oguego, C. and Gimenez Manuel, J. 2022. Context-aware systems architecture (CaSA). Cybernetics and Systems. 53 (4), pp. 319-345. https://doi.org/10.1080/01969722.2021.1985226
Masterminding change by combining secure system design with security risk assessment
Kammueller, F., Legay, A. and Schivo, S. 2021. Masterminding change by combining secure system design with security risk assessment. International Journal on Software Tools for Technology Transfer. 23 (1), pp. 69-70. https://doi.org/10.1007/s10009-020-00595-8
Combining secure system design with risk assessment for IoT healthcare systems
Kammueller, F. 2019. Combining secure system design with risk assessment for IoT healthcare systems. SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of Things, colocated with IEEE PerCom 2019. Kyoto, Japan 11 - 15 Mar 2019 Institute of Electrical and Electronics Engineers (IEEE). pp. 961-966 https://doi.org/10.1109/PERCOMW.2019.8730776
Achieving multi-user capabilities through an indoor positioning system based on BLE beacons
Quinde, M., Gimenez Manuel, J., Oguego, C. and Augusto, J. 2020. Achieving multi-user capabilities through an indoor positioning system based on BLE beacons. IE2020: Intelligent Environments. Madrid, Spain 20 - 23 Jul 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 13-20
Context-aware approach for cardiac rehabilitation monitoring
Ogbuabor, G., Augusto, J., Moseley, R. and Van Wyk, A. 2020. Context-aware approach for cardiac rehabilitation monitoring. Iglesias, C., Novella, J., Ricci, A., Pinto, D. and Roman, D. (ed.) 4th International Workshop on Citizen-Centric Smart Cities Services (CCSCS 2020). Madrid, Spain 22 - 23 Jun 2020 IOS Press. pp. 167-176 https://doi.org/10.3233/AISE200039
Managing preference profiles in multi-user intelligent environments
Augusto, J. and Muñoz, A. 2020. Managing preference profiles in multi-user intelligent environments. Iglesias, C., Novella, J., Ricci, A., Pinto, D. and Roman, D. (ed.) 4th International Workshop on Citizen-Centric Smart Cities Services (CCSCS 2020). Madrid, Spain 22 - 23 Jun 2020 IOS Press. pp. 217-226 https://doi.org/10.3233/AISE200044
Context-aware system for cardiac condition monitoring and management: a survey
Ogbuabor, G., Augusto, J., Moseley, R. and Van Wyk, A. 2020. Context-aware system for cardiac condition monitoring and management: a survey. Behaviour and Information Technology. 41 (4), pp. 759-776. https://doi.org/10.1080/0144929X.2020.1836255
ADAPT: Approach to Develop context-Aware solutions for Personalised asthma managemenT
Quinde, M., Augusto, J., Khan, N. and Van Wyk, A. 2020. ADAPT: Approach to Develop context-Aware solutions for Personalised asthma managemenT. Journal of Biomedical Informatics. 111, pp. 1-20. https://doi.org/10.1016/j.jbi.2020.103586
Modeling and analyzing the Corona-virus warning app with the Isabelle infrastructure framework
Kammueller, F. and Lutz, B. 2020. Modeling and analyzing the Corona-virus warning app with the Isabelle infrastructure framework. Garcia-Alfaro, J., Navarro-Arribas, G. and Herrera-Joancomarti, J. (ed.) International Workshop of Data Privacy Management, DPM'20. University of Surrey, UK 17 - 18 Sep 2020 Springer. pp. 128-144 https://doi.org/10.1007/978-3-030-66172-4_8
Inter-blockchain protocols with the Isabelle Infrastructure framework
Kammueller, F. and Nestmann, U. 2020. Inter-blockchain protocols with the Isabelle Infrastructure framework. Bernardo, B. and Marmsoler, D. (ed.) 2nd Workshop on Formal Methods for Blockchain, co-located with CAV'20. Los Angeles, CA, USA Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH. pp. 11:1-11:12 https://doi.org/10.4230/OASIcs.FMBC.2020.11
Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems
Kammueller, F. 2020. Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems.
5G smart and innovative healthcare services: opportunities, challenges and prospective solutions
Bekaroo, G., Santokhee, A. and Augusto, J. 2020. 5G smart and innovative healthcare services: opportunities, challenges and prospective solutions. in: Bojkovic, Z., Milovanovic, D. and Fowdur, T. (ed.) 5G Multimedia Communication Technology, Multiservices, and Deployment Boca Raton CRC Press. pp. 279-297
Describing and simulating concurrent quantum systems
Bornat, R., Boender, J., Kammueller, F., Poly, G. and Nagarajan, R. 2020. Describing and simulating concurrent quantum systems. Biere, A. and Parker, D. (ed.) International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 20). Dublin 27 - 30 Apr 2020 Springer. pp. 271-277 https://doi.org/10.1007/978-3-030-45237-7_16
A smart environments architecture (Search)
Augusto, J., Gimenez Manuel, J., Quinde, M., Oguego, C., Ali, M. and James-Reynolds, C. 2020. A smart environments architecture (Search). Applied Artificial Intelligence. 34 (2), pp. 155-186. https://doi.org/10.1080/08839514.2020.1712778
Context-aware solutions for asthma condition management: a survey
Quinde, M., Khan, N., Augusto, J., Van Wyk, A. and Stewart, J. 2020. Context-aware solutions for asthma condition management: a survey. Universal Access in the Information Society. 19 (3), pp. 571-593. https://doi.org/10.1007/s10209-018-0641-5
Assessing vulnerabilities in IoT-based ambient assisted living systems
Cristescu, I., Gimenez Manuel, J. and Augusto, J. 2020. Assessing vulnerabilities in IoT-based ambient assisted living systems. in: Hernaandez Ramos, J. and Skarmeta, A. (ed.) Security and privacy in Internet of Things: challenges and solutions IOS Press.
Managing multi-user smart environments through BLE based system
Sora, D. and Augusto, J. 2018. Managing multi-user smart environments through BLE based system. Chatzigiannakis, I., Tobe, Y., Novais, P. and Amft, O. (ed.) 3rd International Workshop on Smart Sensing Systems (IWSSS'18). Rome, Italy 25 - 28 Jun 2018 IOS Press. pp. 234-244 https://doi.org/10.3233/978-1-61499-874-7-234
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. ICC’17. Cambridge University, Cambridge 22 Mar 2019 ICC’17, Cambridge, United Kingdom © 2017 ACM.. pp. 1-6 https://doi.org/10.1145/3018896.3056795
Context-aware systems testing and validation
Augusto, J., Quinde, M. and Oguego, C. 2019. Context-aware systems testing and validation. 10th International Conference Dependable Systems, Services and Technologies. Leeds, United Kingdom 05 - 07 Jun 2019 IEEE. pp. 7-12 https://doi.org/10.1109/DESSERT.2019.8770048
Using formal methods to guide the development of an asthma management system
Augusto, J., Quinde, M. and Khan, N. 2019. Using formal methods to guide the development of an asthma management system. 10th International Conference Dependable Systems, Services and Technologies. Leeds, United Kingdom 05 - 07 Jun 2019 IEEE. pp. 57-62 https://doi.org/10.1109/DESSERT.2019.8770017
The SEArch smart environments architecture
Augusto, J., Quinde, M., Gimenez Manuel, J., Ali, M., Oguego, C. and James-Reynolds, C. 2019. The SEArch smart environments architecture. 15th International Conference on Intelligent Environments. Rabat, Morocco 24 - 27 Jun 2019 Institute of Electrical and Electronics Engineers (IEEE). pp. 60-63 https://doi.org/10.1109/IE.2019.00010
Evaluation of crowdsourcing Wi-Fi radio map creation in a real scenario for AAL applications
Belmonte-Fernandez, O., Gasco-Compte, A., Sansano-Sansano, E., Quinde, M., Gimenez Manuel, J. and Augusto, J. 2019. Evaluation of crowdsourcing Wi-Fi radio map creation in a real scenario for AAL applications. 15th International Conference on Intelligent Environments. Rabat, Morocco 24 - 27 Jun 2019 Institute of Electrical and Electronics Engineers (IEEE). pp. 30-36 https://doi.org/10.1109/IE.2019.00005
An interface for managing users' preferences in AmI
Oguego, C., Augusto, J., Springett, M., Quinde, M. and James-Reynolds, C. 2019. An interface for managing users' preferences in AmI. 15th International Conference on Intelligent Environments. Rabat, Morocco 24 - 27 Jun 2019 Institute of Electrical and Electronics Engineers (IEEE). pp. 56-59 https://doi.org/10.1109/IE.2019.00009
Context in Mobile learning: the point of view of the learners
Chouchane, K., Ali, A., Augusto, J. and Okba, K. 2019. Context in Mobile learning: the point of view of the learners. Symposium on Future Intelligent Educational Environments (SOFIEE'19). Rabat, Morocco IOS Press. pp. 280-289 https://doi.org/10.3233/AISE190053
Attack trees in Isabelle
Kammueller, F. 2018. Attack trees in Isabelle. 20th International Conference on Information and Communications Security, ICICS 2018. Lille, France 29 - 31 Oct 2018 Springer. pp. 611-628 https://doi.org/10.1007/978-3-030-01950-1_36
Preface to the 10th anniversary issue of the Journal on Ambient Intelligence and Smart Environments
Augusto, J. and Aghajan, H. 2019. Preface to the 10th anniversary issue of the Journal on Ambient Intelligence and Smart Environments. Journal of Ambient Intelligence and Smart Environments. 11 (1), pp. 1-3. https://doi.org/10.3233/AIS-180511
Improving the adaptation process for a new smart home user
Ali, S., Augusto, J. and Windridge, D. 2019. Improving the adaptation process for a new smart home user. Bramer, M. and Petridis, M. (ed.) 39th SGAI International Conference on Artificial Intelligence. Cambridge, UK 17 - 19 Dec 2019 Springer. https://doi.org/10.1007/978-3-030-34885-4_32
User preferences in intelligent environments
Augusto, J. and Muñoz, A. 2019. User preferences in intelligent environments. Applied Artificial Intelligence. 33 (12), pp. 1069-1091. https://doi.org/10.1080/08839514.2019.1661596
Attack trees in Isabelle extended with probabilities for Quantum Cryptography
Kammueller, F. 2019. Attack trees in Isabelle extended with probabilities for Quantum Cryptography. Computers and Security. 87. https://doi.org/10.1016/j.cose.2019.101572
Collaborative educational environments incorporating mixed reality technologies: a systematic mapping study
Ali, A., Dafoulas, G. and Augusto, J. 2019. Collaborative educational environments incorporating mixed reality technologies: a systematic mapping study. IEEE Transactions on Learning Technologies. 12 (3), pp. 321-332. https://doi.org/10.1109/TLT.2019.2926727
Case-based reasoning for context-aware solutions supporting personalised asthma management
Quinde, M., Khan, N. and Augusto, J. 2019. Case-based reasoning for context-aware solutions supporting personalised asthma management. 18th International Conference on Artificial Intelligence and Soft Computing. Zakopane, Poland 16 - 20 Jun 2019 Cham Springer. https://doi.org/10.1007/978-3-030-20915-5_24
A Human-in-The-Loop context-aware system allowing the application of case-based reasoning for asthma management
Quinde, M., Khan, N., Augusto, J. and Van Wyk, A. 2019. A Human-in-The-Loop context-aware system allowing the application of case-based reasoning for asthma management. Duffy, V. (ed.) 21st International Conference on Human-Computer Interaction (HCI International 2019). Orlando, USA 26 - 31 Jul 2019 Springer. pp. 125-140 https://doi.org/10.1007/978-3-030-22219-2_10
Towards a general framework for evaluating intelligent environments methodologies
Santokhee, A., Augusto, J. and Brodie, L. 2019. Towards a general framework for evaluating intelligent environments methodologies. 3rd International Worrkshop on Citizen-Centric Smart Cities Services (CCSCS'2019). Rabat, Morocco 24 - 27 Jun 2019 IOS Press. pp. 17-25 https://doi.org/10.3233/AISE190018
A survey of user-centred approaches for smart home transfer learning and new user home automation adaptation
Ali, M., Augusto, J. and Windridge, D. 2019. A survey of user-centred approaches for smart home transfer learning and new user home automation adaptation. Applied Artificial Intelligence. 33 (8), pp. 747-774. https://doi.org/10.1080/08839514.2019.1603784
Context aware virtual assistant with case-based conflict resolution in multi-user smart home environment
Ospan, B., Khan, N., Augusto, J., Quinde, M. and Nurgaliyev, K. 2018. Context aware virtual assistant with case-based conflict resolution in multi-user smart home environment. 2018 International Conference on Computing and Network Communications (CoCoNet). Astana, Kazakhstan 15 - 17 Aug 2018 IEEE Computer Society. pp. 36-44 https://doi.org/10.1109/CoCoNet.2018.8476898
RC-ASEF: An open-source tool-supported requirements elicitation framework for context-aware systems development
Alegre, U., Augusto, J. and Evans, C. 2018. RC-ASEF: An open-source tool-supported requirements elicitation framework for context-aware systems development. Annals of Computer Science and Information Systems. 15, pp. 829-838. https://doi.org/10.15439/2018F136
Edit distance Kernelization of NP theorem proving for polynomial-time machine learning of proof heuristics
Windridge, D. and Kammueller, F. 2020. Edit distance Kernelization of NP theorem proving for polynomial-time machine learning of proof heuristics. FICC 2019: Future of Information and Communications Conference. San Francisco, USA 14 - 15 Mar 2019 Springer. pp. 271-283 https://doi.org/10.1007/978-3-030-12385-7_22
Formal modeling and analysis of data protection for GDPR compliance of IoT healthcare systems
Kammueller, F. 2018. Formal modeling and analysis of data protection for GDPR compliance of IoT healthcare systems. IEEE SMC 2018: IEEE International Conference on Systems, Man and Cybernetics. Miyazaki, Japan 08 - 10 Oct 2018 Institute of Electrical and Electronics Engineers (IEEE).
Collecting sensor-generated data for assessing teamwork and individual contributions in computing student teams
Dafoulas, G., Cardoso Maia, C., Ali, A. and Augusto, J. 2018. Collecting sensor-generated data for assessing teamwork and individual contributions in computing student teams. EDULEARN18: 10th annual International Conference on Education and New Learning Technologies. Palma de Mallorca, Spain 02 - 04 Jul 2018 IATED. pp. 11156-11162 https://doi.org/10.21125/edulearn.2018.2759
Personalisation of context-aware solutions supporting asthma management
Quinde, M., Khan, N. and Augusto, J. 2018. Personalisation of context-aware solutions supporting asthma management. 16th International Conference on Computers Helping People with Special Needs. University of Linz, Austria 11 - 13 Jul 2018 Springer. pp. 510-519 https://doi.org/10.1007/978-3-319-94274-2_75
A survey on the evolution of the notion of context-awareness
Augusto, J., Aztiria, A., Kramer, D. and Alegre, U. 2017. A survey on the evolution of the notion of context-awareness. Applied Artificial Intelligence. 31 (7-8), pp. 613-642. https://doi.org/10.1080/08839514.2018.1428490
Interaction patterns for smart spaces: a confident interaction design solution for pervasive sensitive IoT services
Vega-Barbas, M., Pau, I., Augusto, J. and Seoane, F. 2018. Interaction patterns for smart spaces: a confident interaction design solution for pervasive sensitive IoT services. IEEE Access. 6, pp. 1126-1136. https://doi.org/10.1109/ACCESS.2017.2777999
Formalization and analysis of a resource allocation security protocol for secure service migration
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2018. Formalization and analysis of a resource allocation security protocol for secure service migration. IEEE/ACM International Conference on Utility and Cloud Computing (UCC2018). Zurich, Switzerland 17 - 20 Dec 2018 IEEE. pp. 207-212 https://doi.org/10.1109/UCC-Companion.2018.00058
Sensorial computing
Varsani, P., Moseley, R., Jones, S., James-Reynolds, C., Chinellato, E. and Augusto, J. 2018. Sensorial computing. in: Filimowicz, M. and Tzankova, V. (ed.) New Directions in Third Wave Human-Computer Interaction: Volume 1 - Technologies Cham, Switzerland Springer. pp. 265-284
Investigating the role of biometrics in education – the use of sensor data in collaborative learning
Dafoulas, G., Cardoso Maia, C., Samuels-Clarke, J., Ali, A. and Augusto, J. 2018. Investigating the role of biometrics in education – the use of sensor data in collaborative learning. 12th International Conference on e-Learning. Madrid, Spain 17 - 19 Jul 2018 IADIS. pp. 115-123
Engineering intelligent environments: preliminary findings of a systematic review
Santokhee, A., Augusto, J. and Evans, C. 2018. Engineering intelligent environments: preliminary findings of a systematic review. 2nd Workshop on Citizen Centric Smart Cities Solutions (CCSCS'18), The 14th International Conference on Intelligent Environments. Rome, Italy 25 - 28 Jun 2018 IOS Press Ebook. pp. 57-66 https://doi.org/10.3233/978-1-61499-874-7-57
Perspectives on engineering more usable context-aware systems
Alegre, U., Augusto, J. and Evans, C. 2018. Perspectives on engineering more usable context-aware systems. Journal of Ambient Intelligence and Humanized Computing. 9 (5), pp. 1593-1609. https://doi.org/10.1007/s12652-018-0863-7
Using argumentation to manage users' preferences
Oguego, C., Augusto, J., Muñoz, A. and Springett, M. 2018. Using argumentation to manage users' preferences. Future Generation Computer Systems. 81, pp. 235-243. https://doi.org/10.1016/j.future.2017.09.040
A survey on managing users' preferences in ambient intelligence
Oguego, C., Augusto, J., Muñoz Ortega, A. and Springett, M. 2018. A survey on managing users' preferences in ambient intelligence. Universal Access in the Information Society. 17 (1), pp. 97-114. https://doi.org/10.1007/s10209-017-0527-y
The user-centred intelligent environments development process as a guide to co-create smart technology for people with special needs
Augusto, J., Kramer, D., Alegre, U., Covaci, A. and Santokhee, A. 2018. The user-centred intelligent environments development process as a guide to co-create smart technology for people with special needs. Universal Access in the Information Society. 17 (1), pp. 115-130. https://doi.org/10.1007/s10209-016-0514-8
A proof calculus for attack trees in Isabelle
Kammueller, F. 2017. A proof calculus for attack trees in Isabelle. 12th International Workshop on Data Privacy Management (DPM 2017). Oslo, Norway 14 - 15 Sep 2017 Springer. pp. 3-18 https://doi.org/10.1007/978-3-319-67816-0_1
Understanding collaboration in Global Software Engineering (GSE) teams with the use of sensors: introducing a multi-sensor setting for observing social and human aspects in project management
Dafoulas, G., Cardoso Maia, C., Ali, A., Augusto, J. and Lopez, V. 2017. Understanding collaboration in Global Software Engineering (GSE) teams with the use of sensors: introducing a multi-sensor setting for observing social and human aspects in project management. IE 2017 - 13th International Conference on Intelligent Environments (IE’17). Seoul, Korea (South) 21 - 25 Aug 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 114-121 https://doi.org/10.1109/IE.2017.40
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. 2nd International Conference on Internet of Things, Data and Cloud Computing (ICC 2017). Churchill College, University of Cambridge, United Kingdom 22 - 23 Mar 2017 Association for Computing Machinery (ACM). https://doi.org/10.1145/3018896.3056795
Model based analysis of insider threats
Chen, T., Han, T., Kammueller, F., Nemli, I. and Probst, C. 2016. Model based analysis of insider threats. 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). London, United Kingdom 13 - 14 Jun 2016 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/CyberSecPODS.2016.7502350
Formal modeling and analysis with humans in infrastructures for IoT health care systems
Kammueller, F. 2017. Formal modeling and analysis with humans in infrastructures for IoT health care systems. 5th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2017. Vancouver, BC, Canada 09 - 14 Jul 2017 Springer. pp. 339-352 https://doi.org/10.1007/978-3-319-58460-7_24
Human centric security and privacy for the IoT using formal techniques
Kammueller, F. 2018. Human centric security and privacy for the IoT using formal techniques. 3rd International Conference on Human Factors in Cybersecurity. Los Angeles, CA, United States 17 - 21 Jul 2017 Springer. pp. 106-116 https://doi.org/10.1007/978-3-319-60585-2_12
Insider threats for auctions: formalization, mechanized proof, and code generation
Kammueller, F., Kerber, M. and Probst, C. 2017. Insider threats for auctions: formalization, mechanized proof, and code generation. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). 8 (1), pp. 44-78. https://doi.org/10.22667/JOWUA.2017.03.31.044
Improved multi-user interaction in a smart environment through a preference-based conflict resolution virtual assistant
Nurgaliyev, K., Di Mauro, D., Khan, N. and Augusto, J. 2017. Improved multi-user interaction in a smart environment through a preference-based conflict resolution virtual assistant. 13th International Conference on Intelligent Environments (IE’17). Seoul, South Korea 23 - 25 Aug 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 100-107 https://doi.org/10.1109/IE.2017.21
New methods for stress assessment and monitoring at the workplace
Carneiro, D., Novais, P., Augusto, J. and Payne, N. 2019. New methods for stress assessment and monitoring at the workplace. IEEE Transactions on Affective Computing. 10 (2), pp. 237-254. https://doi.org/10.1109/TAFFC.2017.2699633
Is Context-aware Reasoning = Case-based Reasoning?
Khan, N., Alegre, U., Kramer, D. and Augusto, J. 2017. Is Context-aware Reasoning = Case-based Reasoning? Tenth Interdisciplinary Conference on Modelling and Using Context. Paris, France 20 - 23 Jun 2017 Springer. pp. 418-431 https://doi.org/10.1007/978-3-319-57837-8_35
A framework for distributed interaction in intelligent environments
DiMauro, D., Augusto, J., Origlia, A. and Cutugno, F. 2017. A framework for distributed interaction in intelligent environments. AmI 2017: 2017 European Conference on Ambient Intelligence. Malaga, Spain 26 - 28 Apr 2017 Springer. pp. 136-151 https://doi.org/10.1007/978-3-319-56997-0_11
Supporting context-aware engineering based on stream reasoning
Kramer, D. and Augusto, J. 2017. Supporting context-aware engineering based on stream reasoning. CONTEXT'17: 10th International and Interdisciplinary Conference on Modeling and Using Context. Paris, France 20 - 23 Jun 2017 Springer. pp. 440-453 https://doi.org/10.1007/978-3-319-57837-8_37
Modeling and verification of insider threats using logical analysis
Kammueller, F. and Probst, C. 2017. Modeling and verification of insider threats using logical analysis. IEEE Systems Journal. 11 (2), pp. 534-545. https://doi.org/10.1109/JSYST.2015.2453215
A formal methodology to design and deploy dependable wireless sensor networks
Testa, A., Cinque, M., Coronato, A. and Augusto, J. 2017. A formal methodology to design and deploy dependable wireless sensor networks. Sensors. 17 (1). https://doi.org/10.3390/s17010019
A stigmergic approach to indoor localization using bluetooth low energy beacons
Palumbo, F., Barsocchi, P., Chessa, S. and Augusto, J. 2015. A stigmergic approach to indoor localization using bluetooth low energy beacons. 3rd Workshop on Activity Monitoring by Multiple Distributed Sensing (AMMDS). Karslrhue, Germany 25 - 28 Aug 2015 IEEE. pp. 1-6 https://doi.org/10.1109/AVSS.2015.7301734
Towards formal analysis of insider threats for auctions
Kammueller, F., Kerber, M. and Probst, C. 2016. Towards formal analysis of insider threats for auctions. ACM-CCS Workshop on Management of Security of Insider Threats. Vienna, Austria 28 Oct 2016 Association for Computing Machinery (ACM). pp. 23-34 https://doi.org/10.1145/2995959.2995963
Isabelle Modelchecking for insider threats
Kammueller, F. 2016. Isabelle Modelchecking for insider threats. 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016. Heraklion, Crete, Greece 26 - 27 Sep 2016 Springer. pp. 196-210 https://doi.org/10.1007/978-3-319-47072-6_13
Refactoring preserves security
Kammueller, F. 2016. Refactoring preserves security. 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016. Heraklion, Crete, Greece 26 - 27 Sep 2016 Springer. pp. 238-245 https://doi.org/10.1007/978-3-319-47072-6_17
Verification of statecharts using data abstraction
Helke, S. and Kammueller, F. 2016. Verification of statecharts using data abstraction. International Journal of Advanced Computer Science and Applications. 7 (1), pp. 571-583. https://doi.org/10.14569/IJACSA.2016.070179
Formal modelling and analysis of socio-technical systems
Probst, C., Kammueller, F. and Hansen, R. 2016. Formal modelling and analysis of socio-technical systems. in: Semantics, Logics, and Calculi Springer International.
Attack tree analysis for insider threats on the IoT using Isabelle
Kammueller, F., Nurse, J. and Probst, C. 2016. Attack tree analysis for insider threats on the IoT using Isabelle. 4th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2016. Toronto, ON, Canada 17 - 24 Jul 2016 Springer International. pp. 234-246 https://doi.org/10.1007/978-3-319-39381-0_21
Engineering context-aware systems and applications: a survey
Alegre, U., Augusto, J. and Clark, T. 2016. Engineering context-aware systems and applications: a survey. Journal of Systems and Software. 117, pp. 55-83. https://doi.org/10.1016/j.jss.2016.02.010
The heuristic strategies for assessing wireless sensor network: an event-based formal approach
Testa, A., Cinque, M., Coronato, A., De Pietro, G. and Augusto, J. 2015. The heuristic strategies for assessing wireless sensor network: an event-based formal approach. Journal of Heuristics. 21 (2), pp. 145-175. https://doi.org/10.1007/s10732-014-9258-x
Flexible context aware interface for ambient assisted living
McNaull, J., Augusto, J., Mulvenna, M. and McCullagh, P. 2014. Flexible context aware interface for ambient assisted living. Human-centric Computing and Information Sciences. 4 (1). https://doi.org/10.1186/2192-1962-4-1
An investigation into the efficacy of avatar-based systems for student advice
Currie, E., Harvey, P., Daryanani, P., Augusto, J., Arif, R. and Ali, A. 2016. An investigation into the efficacy of avatar-based systems for student advice. EAI Endorsed Transactions on e-Learning. 3 (11). https://doi.org/10.4108/eai.15-6-2016.151450
Co-creation of smart technology with (and for) people with special needs
Augusto, J., Kramer, D., Alegre, U., Covaci, A. and Santokhee, A. 2016. Co-creation of smart technology with (and for) people with special needs. 7th International Conference on Software Development and Technologies for Enhancing Accessibility and Fighting Info-exclusion. Vila Real, Portugal 01 - 03 Dec 2016 Association for Computing Machinery (ACM). pp. 39-46 https://doi.org/10.1145/3019943.3019950
Investigating airplane safety and security against insider threats using logical modeling
Kammueller, F. and Kerber, M. 2016. Investigating airplane safety and security against insider threats using logical modeling. 2016 IEEE Security and Privacy Workshops SPW'16: Workshop on Research in Insider Threats WRIT'16. San Jose, CA, USA 22 - 26 May 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 304-313 https://doi.org/10.1109/SPW.2016.47
Enhancing student support with a virtual assistant
Harvey, P., Currie, E., Daryanani, P. and Augusto, J. 2016. Enhancing student support with a virtual assistant. Vincenti, G., Bucciero, A. and Vaz de Carvalho, C. (ed.) eLEOT 2015: 2nd EAI International Conference on e-Learning e-Education and Online Training. Novedrate, Italy 16 - 18 Sep 2015 Springer. pp. 101-109 https://doi.org/10.1007/978-3-319-28883-3_13
Temporal reasoning for intuitive specification of context-awareness
Alegre, U., Augusto, J. and Aztiria, A. 2014. Temporal reasoning for intuitive specification of context-awareness. 10th International Conference on Intelligent Environments - IE'14. Shanghai, China 30 Jun - 04 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 234-241
Advancing ambient assisted living with caution
Huyck, C., Augusto, J., Gao, X. and Botia, J. 2015. Advancing ambient assisted living with caution. in: Helfert, M., Holzinger, A., Ziefle, M., Fred, A., O'Donoghue, J. and Röcker, C. (ed.) Information and Communication Technologies for Ageing Well and e-Health: First International Conference, ICT4AgeingWell 2015, Lisbon, Portugal, May 20-22, 2015. Revised Selected Papers Springer.
Secure refactoring with Java information flow
Helke, S., Kammueller, F. and Probst, C. 2016. Secure refactoring with Java information flow. 10th International Workshop on Data Privacy Management (DPM 2015). Vienna, Austria 21 - 22 Sep 2015 Springer. pp. 264-272 https://doi.org/10.1007/978-3-319-29883-2_19
Assessing real world imagery in virtual environments for people with cognitive disabilities
Covaci, A., Kramer, D., Augusto, J., Rus, S. and Braun, A. 2015. Assessing real world imagery in virtual environments for people with cognitive disabilities. Intelligent Environments 2015. Prague, Czech Republic 15 - 17 Jul 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 41-48
Transforming graphical system models to graphical attack models
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2016. Transforming graphical system models to graphical attack models. 2nd International Workshop on Graphical Models for Security, GraMSec 2015, co-located with CSF2015. Verona, Italy 13 Jul 2015 Springer. pp. 82-96 https://doi.org/10.1007/978-3-319-29968-6_6
Attack tree generation by policy invalidation
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2015. Attack tree generation by policy invalidation. 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015). Heraklion, Crete, Greece 24 - 25 Aug 2015 Springer. pp. 249-259 https://doi.org/10.1007/978-3-319-24018-3_16
Formalization of quantum protocols using Coq
Boender, J., Kammueller, F. and Nagarajan, R. 2015. Formalization of quantum protocols using Coq. The 12th International Workshop on Quantum Physics and Logic (QPL 2015). Oxford, United Kingdom 15 - 17 Jul 2015 pp. 71-83
Spatial health systems: the state of the art
Gottfried, B., Aghajan, H., Wong, K., Augusto, J., Guesgen, H., Kirste, T. and Lawo, M. 2014. Spatial health systems: the state of the art. in: Holzinger, A., Ziefle, M. and Roecker, C. (ed.) Smart health. State of the art Springer Verlag. pp. 41-70
Developing navigational services for people with Down's Syndrome
Kramer, D., Covaci, A. and Augusto, J. 2015. Developing navigational services for people with Down's Syndrome. 2015 International Conference on Intelligent Environments. Prague, Czech Republic 15 - 17 Jul 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 128-131 https://doi.org/10.1109/IE.2015.26
Invalidating policies using structural information
Kammueller, F. and Probst, C. 2013. Invalidating policies using structural information. IEEE CS Security and Privacy Workshops, SPW, WRIT'13.
Network information flow control: proof of concept
Alghothami, A. and Kammueller, F. 2013. Network information flow control: proof of concept. IEEE Int. Conf. on Systems, Man, and Cybernetics, SMC. Manchester, UK 13 - 16 Oct 2013 IEEE. pp. 2957-2962 https://doi.org/10.1109/SMC.2013.504
Privacy analysis of a hidden friendship protocol
Kammueller, F. and Preibusch, S. 2013. Privacy analysis of a hidden friendship protocol. The 8th International Workshop on Data Privacy Management, DPM 2013. Egam, UK 12 - 13 Sep 2013 Springer. pp. 83-99
Externalizing behaviour for analysing system models
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2013. Externalizing behaviour for analysing system models. 5th International Workshop on Managing Insider Security Threats, MIST, 2013..
Verification of quantum protocols using Coq
Boender, J., Kammueller, F. and Nagarajan, R. 2014. Verification of quantum protocols using Coq. 17th Conference on Quantum Information Processing (QIP). Barcelona, Spain 03 - 07 Feb 2014
Reviews for the American Mathematical Society (AMS): Paul Howells, Mark d’Inverno. Specifying termination in CSP. Theoretical Computer Science, 503:31–61, 2013.
Kammueller, F. 2014. Reviews for the American Mathematical Society (AMS): Paul Howells, Mark d’Inverno. Specifying termination in CSP. Theoretical Computer Science, 503:31–61, 2013. MathSciNet: Mathematical Reviews.
Combining generated data models with formal invalidation for insider threat analysis
Kammueller, F. and Probst, C. 2014. Combining generated data models with formal invalidation for insider threat analysis. 2014 IEEE Security and Privacy Workshops (SPW): Workshop on Research for Insider Threat (WRIT 2014). San Jose, California, USA 17 - 18 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 229-235 https://doi.org/10.1109/SPW.2014.45
Verification of DNSsec delegation signatures
Kammueller, F. 2014. Verification of DNSsec delegation signatures. 21st International IEEE Conference on Telecommunication. Lisbon 04 - 07 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 298-392 https://doi.org/10.1109/ICT.2014.6845127
Invalidating policies using structural information
Kammueller, F. and Probst, C. 2014. Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 5 (2), pp. 59-79. https://doi.org/10.22667/JOWUA.2014.06.31.059
Modeling human behaviour with higher order logic: insider threats
Boender, J., Kammueller, F., Ivanova, M. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust. Vienna Technical University, Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 31-39
A probabilistic analysis framework for malicious insider threats
Chen, T., Kammueller, F., Nemli, I. and Probst, C. 2015. A probabilistic analysis framework for malicious insider threats. 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2015, held as part of HCI International 2015. Los Angeles, California, USA 02 - 07 Aug 2015 Springer. pp. 178-189
Confinement for active objects
Kammueller, F. 2015. Confinement for active objects. International Journal of Advanced Computer Science and Applications. 6 (2), pp. 246-261. https://doi.org/10.14569/IJACSA.2015.060236
Modeling human behaviour with higher order logic: insider threats
Boender, J., Ivanova, M., Kammueller, F. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST 2014). Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers. pp. 31-39 https://doi.org/10.1109/STAST.2014.13
Context-awareness to increase inclusion of people with DS in society
Kramer, D., Augusto, J. and Clark, T. 2014. Context-awareness to increase inclusion of people with DS in society. AAAI 14: Workshop on Artificial Intelligence Applied to Assistive Technologies and Smart Environments (ATSE 2014). Quebec City, Quebec, Canada 27 - 31 Jul 2014 Association for the Advancement of Artificial Intelligence (AAAI). pp. 27-31
Night optimised care technology for users needing assisted lifestyles
Augusto, J., Mulvenna, M., Zheng, H., Wang, H., Martin, S., McCullagh, P. and Wallace, J. 2014. Night optimised care technology for users needing assisted lifestyles. Behaviour and Information Technology. 33 (12), pp. 1261-1277. https://doi.org/10.1080/0144929X.2013.816773
Personalized smart environments to increase inclusion of people with Down's Syndrome
Augusto, J., Grimstad, T., Wichert, R., Schulze, E., Braun, A., Rødevand, G. and Ridley, V. 2013. Personalized smart environments to increase inclusion of people with Down's Syndrome. Augusto, J., Wichert, R., Collier, R., Keyson, D., Salah, A. and Tan, A. (ed.) International Joint Conference on Ambient Intelligence. Dublin, Ireland Springer International. https://doi.org/10.1007/978-3-319-03647-2_16
Reflections on ambient intelligence systems handling of user preferences and needs
Augusto, J. 2014. Reflections on ambient intelligence systems handling of user preferences and needs. The 10th International Conference on Intelligent Environments (IE'14). Shanghai, P.R. China 29 Jun - 04 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 369-371
AAL4DS (Can AAL technology help people with Down’s Syndrome to live better lives?)
Augusto, J. 2012. AAL4DS (Can AAL technology help people with Down’s Syndrome to live better lives?). Proceedings of AALForum2012 (Tomorrow in Sight: from Design to Delivery). Eindhoven, The Netherlands 26 Sep 2012 pp. 79-83
A group decision making model for partially ordered preference under uncertainty
Chen, S., Liu, J., Wang, H. and Augusto, J. 2015. A group decision making model for partially ordered preference under uncertainty. Information Fusion. 25, pp. 32-41. https://doi.org/10.1016/j.inffus.2014.11.001
eFRIEND: an ethical framework for intelligent environments development
Jones, S., Hara, S. and Augusto, J. 2015. eFRIEND: an ethical framework for intelligent environments development. Ethics and Information Technology. 17 (1), pp. 11-25. https://doi.org/10.1007/s10676-014-9358-1
Requirements for context-aware systems
Evans, C., Brodie, L. and Augusto, J. 2014. Requirements for context-aware systems. 20th International Working Conference on Requirements Engineering: Foundations for Software Quality (REFSQ). Essen, Germany 07 - 10 Apr 2014 pp. 137-138
Requirements engineering for intelligent environments
Evans, C., Brodie, L. and Augusto, J. 2014. Requirements engineering for intelligent environments. The 10th International Conference on Intelligent Environments. Shanghai, China 29 Jun - 04 Jul 2014 pp. 154-161
A user-centric software development process
Augusto, J. 2014. A user-centric software development process. The 10th International Conference on Intelligent Environments (IE'14). Shanghai, P.R. China 29 Jun - 04 Jul 2014 pp. 252-255
Sensors for Ambient Assisted Living (AAL) and smart homes
Martinez Madrid, N., Martinez Fernandez, J., Seepold, R. and Augusto, J. 2013. Sensors for Ambient Assisted Living (AAL) and smart homes. in: Filippini, D. (ed.) Autonomous Sensor Networks: Collective Sensing Strategies for Analytical Purposes Springer.
Context-aware discovery of human frequent behaviours through sensor information interpretation
Aztiria, A. and Augusto, J. 2013. Context-aware discovery of human frequent behaviours through sensor information interpretation. in: Guesgen, H. and Marsland, S. (ed.) Human Behavior Recognition Technologies: Intelligent Applications for Monitoring and Security IGI Global. pp. 14-32
A hierarchical human activity recognition framework based on automated reasoning
Chen, S., Liu, J., Wang, H. and Augusto, J. 2013. A hierarchical human activity recognition framework based on automated reasoning. IEEE International Conference on Systems, Man and Cybernetics (SMC2013). Manchester, UK 13 - 16 Oct 2013
A linguistic multi-criteria decision making approach based on logical reasoning
Chen, S., Liu, J., Wang, H. and Augusto, J. 2014. A linguistic multi-criteria decision making approach based on logical reasoning. Information Sciences. 258, pp. 266-276. https://doi.org/10.1016/j.ins.2013.08.040
Participatory research to design a novel system to support the night-time needs of people with dementia; NOCTURNAL
Martin, S., Augusto, J., McCullagh, P., Carswell, W., Zheng, H., Wang, H., Wallace, J. and Mulvenna, M. 2013. Participatory research to design a novel system to support the night-time needs of people with dementia; NOCTURNAL. International Journal of Environmental Research and Public Health. 10 (12), pp. 6764-6782. https://doi.org/10.3390/ijerph10126764
Self-aware trader: a new approach to safer trading
Martínez Fernández, J., Augusto, J., Trombino, G., Seepold, R. and Martinez Madrid, N. 2013. Self-aware trader: a new approach to safer trading. Journal of Universal Computer Science. 19 (15), pp. 2292-2319.
Learning frequent behaviours of the users in intelligent environments
Aztiria, A., Augusto, J., Basagoiti, R., Izaguirre, A. and Cook, D. 2013. Learning frequent behaviours of the users in intelligent environments. IEEE Transactions on Systems Man and Cybernetics: Systems. 43 (6), pp. 1265-1278. https://doi.org/10.1109/TSMC.2013.2252892
Intelligent environments: a manifesto
Augusto, J., Callaghan, V., Kameas, A., Cook, D. and Satoh, I. 2013. Intelligent environments: a manifesto. Human-centric Computing and Information Sciences. 3 (12). https://doi.org/10.1186/2192-1962-3-12
eFRIEND: an ethical framework for intelligent environment development
Jones, S., Augusto, J. and Hara, S. 2014. eFRIEND: an ethical framework for intelligent environment development. The 7th ACM International Conference on Pervasive Technologies Related to Assistive Environments: PETRA 2014. Rhodes, Greece 27 - 30 May 2014 Association for Computing Machinery (ACM). https://doi.org/10.1145/2674396.2674410
Visualization of data for ambient assisted living services
Mulvenna, M., Carswell, W., McCullagh, P., Augusto, J., Zheng, H., Jeffers, P., Wang, H. and Martin, S. 2011. Visualization of data for ambient assisted living services. IEEE Communications Magazine. 49 (1), pp. 110-117. https://doi.org/10.1109/MCOM.2011.5681023
Mass function derivation and combination in multivariate data spaces
Wang, H., Liu, J. and Augusto, J. 2010. Mass function derivation and combination in multivariate data spaces. Information Sciences. 180 (6), pp. 813-819. https://doi.org/10.1016/j.ins.2009.08.027
Design and evaluation of an ambient assisted living system based on an argumentative multi-agent system
Muñoz, A., Augusto, J., Villa, A. and Botía, J. 2011. Design and evaluation of an ambient assisted living system based on an argumentative multi-agent system. Personal and Ubiquitous Computing. 15 (4), pp. 377-387. https://doi.org/10.1007/s00779-010-0361-1
Ordering based decision making: a survey
Chen, S., Liu, J., Wang, H. and Augusto, J. 2013. Ordering based decision making: a survey. Information Fusion. 14 (4), pp. 521-531. https://doi.org/10.1016/j.inffus.2012.10.005
Software simulation and verification to increase the reliability of intelligent environments
Augusto, J. and Hornos, M. 2013. Software simulation and verification to increase the reliability of intelligent environments. Advances in Engineering Software. 58, pp. 18-34. https://doi.org/10.1016/j.advengsoft.2012.12.004
Using patterns position distribution for software failure detection
Li, C., Chen, Z., Du, H., Wang, H., Wilkie, G., Augusto, J. and Liu, J. 2013. Using patterns position distribution for software failure detection. International Journal of Computational Intelligence Systems. 6 (2), pp. 234-243. https://doi.org/10.1080/18756891.2013.768442
A sensor technology survey for a stress aware trading process
Fernandez, J., Augusto, J., Seepold, R. and Madrid, N. 2012. A sensor technology survey for a stress aware trading process. Transactions on Systems, Man and Cybernetics - Part C. 42 (6), pp. 809-824. https://doi.org/10.1109/TSMCC.2011.2179028
Discovering frequent user-environment interactions in intelligent environments
Aztiria, A., Augusto, J., Basagoiti, R., Izaguirre, A. and Cook, D. 2012. Discovering frequent user-environment interactions in intelligent environments. Personal and Ubiquitous Computing. 16 (1), pp. 91-103. https://doi.org/10.1007/s00779-011-0471-4
A linguistic truth-value temporal reasoning (LTR) system and its application to the design of an intelligent environment
Lu, Z., Augusto, J., Liu, J. and Wang, H. 2012. A linguistic truth-value temporal reasoning (LTR) system and its application to the design of an intelligent environment. International Journal of Computational Intelligence Systems. 5 (1), pp. 173-196. https://doi.org/10.1080/18756891.2012.670529
Static verification of wireless sensor networks with formal methods
Testa, A., Coronato, A., Cinque, M. and Augusto, J. 2012. Static verification of wireless sensor networks with formal methods. 8th International Conference on Signal Image Technology and Internet Based Systems (SITIS 2012). Naples, Italy 25 - 29 Nov 2012 pp. 587-594
Modeling eating disorders of cognitive impaired people
Coronato, A., De Pietro, G. and Augusto, J. 2012. Modeling eating disorders of cognitive impaired people. HumanCom'2012. Gwangju, South Korea pp. 165-172
DNSsec in Isabelle – replay attack and origin authentication
Kammueller, F., Kirsal-Ever, Y. and Cheng, X. 2013. DNSsec in Isabelle – replay attack and origin authentication. SMC 2013: IEEE International Conference on Systems, Man, and Cybernetics. Manchester, UK 13 - 16 Oct 2013 IEEE. pp. 4772-4777 https://doi.org/10.1109/SMC.2013.812
An evidential reasoning based approach for decision making with partially ordered preference under uncertainty
Chen, S., Liu, J., Wang, H. and Augusto, J. 2013. An evidential reasoning based approach for decision making with partially ordered preference under uncertainty. 2013 International Conference on Machine Learning and Cybernetics. Tianjin, China 14 - 17 Jul 2013 IEEE. pp. 1712-1717 https://doi.org/10.1109/ICMLC.2013.6890874
A semi-lattice model for multi-lateral security
Kammueller, F. 2013. A semi-lattice model for multi-lateral security. in: Data privacy management and autonomous spontaneous security Berlin, Germany Springer.
A security model for functional active objects
Kammueller, F. 2012. A security model for functional active objects. Francisco, C., Kim, V., Miguel, C. and Andreas, K. (ed.) First International Symposium Communicability, Computer Graphics and Innovative Design for Interactive Systems (CCGIDIS 2011). Berlin Springer. https://doi.org/10.1007/978-3-642-33760-4_4
A security model for functional active objects with an implementation in Erlang
Fleck, A. and Kammueller, F. 2011. A security model for functional active objects with an implementation in Erlang. in: Ficarra, F., Kratky, A., Veltman, K., Ficarra, M., Nicol, E. and Brie, M. (ed.) Computational informatics, social factors and new information technologies: hypermedia perspectives and avant-garde experiences in the era of communicability expansion Bergamo, Italy Blue Herons.
Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol.
Kammueller, F., Mapp, G., Patel, S. and Sani, A. 2012. Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol. International Conference on Internet Monitoring and Protection (ICIMP 2012). Stuttgart, Germany 27 May - 01 Jun 2012 Xpert Publishing Service.
Review for the American Mathematical Society (AMS): A. Francalanza et al. Permission-based separation logic for message-passing concurrency. Logical methods in computer science, 7: 1-47, 2011
Kammueller, F. 2012. Review for the American Mathematical Society (AMS): A. Francalanza et al. Permission-based separation logic for message-passing concurrency. Logical methods in computer science, 7: 1-47, 2011. Mathematical Reviews.
Reviews for the American Mathematical Society (AMS): Russell O’Connor. Classical mathematics for a constructive world. MSCS (21): 861–882, Cambridge University Press. 2010.
Kammueller, F. 2012. Reviews for the American Mathematical Society (AMS): Russell O’Connor. Classical mathematics for a constructive world. MSCS (21): 861–882, Cambridge University Press. 2010. Mathematical Reviews.
A locally nameless theory of objects
Henrio, L., Kammueller, F., Lutz, B. and Sudhof, H. 2010. A locally nameless theory of objects. SAFA Annual Workshop on Formal Techniques (SAFA’2010). 2229 Route des Crêtes, 06560, Valbonne, Provence-Alpes-Côte d'Azur, France
Locally nameless sigma calculus
Henrio, L., Kammueller, F., Lutz, B. and Sudhof, H. 2010. Locally nameless sigma calculus. Archive of Formal Proof.
Formalizing statecharts using hierarchical automata
Helke, S. and Kammueller, F. 2010. Formalizing statecharts using hierarchical automata. Archive of Formal Proof.
Radius-SHA256 – verified remote authentication with secure hashing.
Kammueller, F. and Patel, S. 2011. Radius-SHA256 – verified remote authentication with secure hashing. First Global Conference on Communication, Science and Information Engineering, CCSIE’11. Middlesex University 25 - 27 Jul 2011
ASPfun: a typed functional active object calculus
Henrio, L., Kammueller, F. and Lutz, B. 2012. ASPfun: a typed functional active object calculus. Science of Computer Programming. 77 (7-8), pp. 823-847. https://doi.org/10.1016/j.scico.2010.12.008
Application of verification techniques to security: model checking insider attacks
Kammueller, F., Probst, C. and Raimondi, F. 2012. Application of verification techniques to security: model checking insider attacks. 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability. Venice, Italy 28 - 29 Mar 2012 Blue Herons editions.
A reasoning system for uncertain and dynamic environments
Lu, Z., Augusto, J., Liu, J., Wang, H. and Aztiria, A. 2012. A reasoning system for uncertain and dynamic environments. International Journal on Artificial Intelligence Tools. 21 (5). https://doi.org/10.1142/S0218213012500236
Data and information quality issues in ambient assisted living systems
McNaull, J., Augusto, J., Mulvenna, M. and McCullagh, P. 2012. Data and information quality issues in ambient assisted living systems. Journal of Data and Information Quality. 4 (1), pp. 1-15. https://doi.org/10.1145/2378016.2378020
Modelchecking non-functional requirements for interface specifications.
Kammueller, F. and Preibusch, S. 2008. Modelchecking non-functional requirements for interface specifications. European Joint Conference on Theory and Practice of Software, 2008, (Foundations of Interface technologies). Budapest 29 Mar - 06 Apr 2008
Compositionality of aspect weaving.
Kammueller, F. and Sudhof, H. 2008. Compositionality of aspect weaving. in: Mahr, B. and Sheng, H. (ed.) Autonomous systems: self-organisation, management, and control. Springer Verlag. pp. 87-96
Interactive theorem proving in software engineering.
Kammueller, F. 2008. Interactive theorem proving in software engineering. Saarbrücken, Germany VDM Verlag Dr. Mueller.
Using functional active objects to enforce privacy
Kammueller, F. 2010. Using functional active objects to enforce privacy. 5th Conference on Network Architectures and Information Systems Security. Menton, France 18 - 21 May 2010
Enhancing privacy implementations of database enquiries
Kammueller, F. and Kammueller, R. 2009. Enhancing privacy implementations of database enquiries. IEEE. pp. 45-50 https://doi.org/10.1109/ICIMP.2009.15
Implementing privacy with Erlang active objects
Fleck, A. and Kammueller, F. 2010. Implementing privacy with Erlang active objects. International Conference on Internet Monitoring and Protection. Barcelona 09 - 15 May 2010 IEEE. pp. 141-146 https://doi.org/10.1109/ICIMP.2010.27
Privacy by flexible parameterization with Erlang active objects.
Fleck, A. and Kammueller, F. 2010. Privacy by flexible parameterization with Erlang active objects. International Journal on Advances in Software. 3 (3-4), pp. 461-473.
Functional active objects: typing and formalisation
Henrio, L. and Kammueller, F. 2009. Functional active objects: typing and formalisation. Elsevier. https://doi.org/10.1016/j.entcs.2009.10.026
Feature link propagation across variability representations with Isabelle/HOL
Kammueller, F., Rein, A. and Reiser, M. 2010. Feature link propagation across variability representations with Isabelle/HOL. Rubin, J., Botterweck, G., Mezini, M., Maman, I. and Lero, A. (ed.) New York Association for Computing Machinery (ACM). pp. 48-53
Checking the TWIN elevator system by translating object-Z to SMV
Preibusch, S. and Kammueller, F. 2008. Checking the TWIN elevator system by translating object-Z to SMV. Lecture Notes in Computer Science. 4916, pp. 38-55. https://doi.org/10.1007/978-3-540-79707-4
Composing safely: a type system for aspects
Kammueller, F. and Sudhof, H. 2008. Composing safely: a type system for aspects. Lecture Notes in Computer Science. 4954, pp. 231-247. https://doi.org/10.1007/978-3-540-78789-1_18
Security analysis of private data enquiries in Erlang
Kammueller, F. and Kammueller, R. 2009. Security analysis of private data enquiries in Erlang. International Journal on Advances in Security. 2 (2&3), pp. 242-255.
An asynchronous distributed component model and its semantics
Henrio, L., Kammueller, F. and Rivera, M. 2009. An asynchronous distributed component model and its semantics. Lecture Notes in Computer Science. 5751, pp. 159-179. https://doi.org/10.1007/978-3-642-04167-9_9
A framework for reasoning on component composition
Henrio, L., Kammueller, F. and Khan, M. 2010. A framework for reasoning on component composition. Lecture Notes in Computer Science. 6286, pp. 1-20. https://doi.org/10.1007/978-3-642-17071-3_1
Formalizing non-interference for a simple bytecode language in Coq
Kammueller, F. 2008. Formalizing non-interference for a simple bytecode language in Coq. Formal Aspects of Computing. 20 (3), pp. 259-275.
Mechanical analysis of finite idempotent relations
Kammueller, F. 2011. Mechanical analysis of finite idempotent relations. Fundamenta Informaticae. 107 (1), pp. 43-65. https://doi.org/10.3233/FI-2011-392
Privacy enforcement and analysis for functional active objects
Kammueller, F. 2011. Privacy enforcement and analysis for functional active objects. Lecture Notes in Computer Science. 6514, pp. 93-107. https://doi.org/10.1007/978-3-642-19348-4_8
Living without a safety net in an Intelligent Environment
Augusto, J., McCullagh, P. and Augusto-Walkden, J. 2011. Living without a safety net in an Intelligent Environment. ICST Transactions on Ambient Systems. 11 (10-12). https://doi.org/10.4108/trans.amsys.2011.e6