Cyber Security Research

Published Research


I have published, or am due to publish, the following research.
 Where you have access to a publisher's repository, please consider supporting them by downloading the work using the publisher link. 

Indicators of Compromise (IoCs) and Their Role in Attack Defence

Internet Engineering Task Force (IETF) 2021
12 July 2021

RPPM: A Relationship-based Access Control Model utilising Relationships, Paths and Principal Matching

Royal Holloway Information Security Group (ISG) 2017
01 May 2017

Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances

IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec) 2016

ARPPM: Administration in the RPPM Model

ACM Conference on Data and Application Security and Privacy (CODASPY) 2016

Relationship-Based Access Control for an Open-Source Medical Records System

ACM Symposium on Access Control Models and Technologies (SACMAT) 2015

Caching and Auditing in the RPPM Model

International Workshop on Security and Trust Management (STM) 2014

Path Conditions and Principal Matching: A New Approach to Access Control

ACM Symposium on Access Control Models and Technologies (SACMAT) 2014

Sleeping Android: The Danger of Dormant Permissions

ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) 2013

Sleeping Android: Exploit through Dormant Permission Requests

Royal Holloway Information Security Group (ISG) 2012