Cyber Security Research
Published Research
I have published, or am due to publish, the following research.
Where you have access to a publisher's repository, please consider supporting them by downloading the work using the publisher link.
Indicators of Compromise (IoCs) and Their Role in Attack Defence
Internet Engineering Task Force (IETF) 2021
12 July 2021
Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances
IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec) 2016
ARPPM: Administration in the RPPM Model
ACM Conference on Data and Application Security and Privacy (CODASPY) 2016
Relationship-Based Access Control for an Open-Source Medical Records System
ACM Symposium on Access Control Models and Technologies (SACMAT) 2015
Relationships, Paths and Principal Matching: A New Approach to Access Control
Computing Research Repository (CoRR) 2015
Caching and Auditing in the RPPM Model
International Workshop on Security and Trust Management (STM) 2014
Path Conditions and Principal Matching: A New Approach to Access Control
ACM Symposium on Access Control Models and Technologies (SACMAT) 2014
Sleeping Android: The Danger of Dormant Permissions
ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) 2013
Sleeping Android: Exploit through Dormant Permission Requests
Royal Holloway Information Security Group (ISG) 2012