| Trusted computing and provenance: Better together J Lyle, A Martin TaPP’10: 2nd Workshop on the Theory and Practice of Provenance, 2010 | 87 | 2010 |
| Challenges for provenance in cloud computing IM Abbadi, J Lyle 3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP’11 …, 2011 | 63 | 2011 |
| Here's Johnny: A Methodology for Developing Attacker Personas A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011 | 59 | 2011 |
| The webinos project C Fuhrhop, J Lyle, S Faily Proceedings of the 21st international conference on World Wide Web, 259-262, 2012 | 43 | 2012 |
| Guidelines for integrating personas into software engineering tools S Faily, J Lyle Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013 | 37 | 2013 |
| Trustworthy Services Through Attestation J Lyle | 35* | 2011 |
| On the challenges of building a web-based ubiquitous application platform H Desruelle, J Lyle, S Isenberg, F Gielen Proceedings of the 2012 ACM conference on ubiquitous computing, 733-736, 2012 | 34 | 2012 |
| Cross-platform access control for mobile web applications J Lyle, S Monteleone, S Faily, D Patti, F Ricciato 2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012 | 30 | 2012 |
| Usability and security by design: a case study in research and development S Faily, J Lyle, I Fléchais, A Simpson Internet Society, 2015 | 28 | 2015 |
| Requirements sensemaking using concept maps S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore International conference on human-centred software engineering, 217-232, 2012 | 26 | 2012 |
| Provenance as a security control A Martin, J Lyle, C Namilkuo Proceedings of the 4th USENIX conference on Theory and Practice of …, 2012 | 24 | 2012 |
| Managing application whitelists in trusted distributed systems JH Huh, J Lyle, C Namiluko, A Martin Future Generation Computer Systems 27 (2), 211-226, 2011 | 21* | 2011 |
| Trustable remote verification of web services J Lyle International Conference on Trusted Computing, 153-168, 2009 | 21 | 2009 |
| On the Design and Development of webinos: A Distributed Mobile Application Middleware J Lyle, S Faily, I Fléchais, A Paul, A Göker, H Myrhaug, H Desruelle, ... IFIP International Conference on Distributed Applications and Interoperable …, 2012 | 16 | 2012 |
| Model-driven architectural risk analysis using architectural and contextualised attack patterns S Faily, J Lyle, C Namiluko, A Atzeni, C Cameroni Proceedings of the Workshop on Model-Driven Security, 1-6, 2012 | 14 | 2012 |
| Personal PKI for the Smart Device Era J Lyle, A Paverd, J King-Lacroix, A Atzeni, H Virji, I Flechais, S Faily European Public Key Infrastructure Workshop, 69-84, 2012 | 13 | 2012 |
| Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project T Su, J Lyle, A Atzeni, S Faily, H Virji, C Ntanos, C Botsikas Haifa Verification Conference, 145-150, 2013 | 12 | 2013 |
| Trustworthy log reconciliation for distributed virtual organisations JH Huh, J Lyle TRUST, Lecture Notes in Computer Science, Springer, 169-182, 2009 | 10 | 2009 |
| Secure system? challenge accepted: Finding and resolving security failures using security premortems S Faily, J Lyle, S Parkin BISL, 2012 | 8 | 2012 |
| Multi-device application middleware: leveraging the ubiquity of the Web with webinos H Desruelle, S Isenberg, J Lyle, F Gielen The Journal of Supercomputing 66 (1), 4-20, 2013 | 7 | 2013 |