[go: up one dir, main page]

Follow
Charles Morisset
Charles Morisset
Associate Professor, Durham University
Verified email at durham.ac.uk - Homepage
Title
Cited by
Cited by
Year
Risk-based security decisions under uncertainty
I Molloy, L Dickens, C Morisset, PC Cheng, J Lobo, A Russo
Proceedings of the second ACM conference on Data and Application Security …, 2012
942012
PTaCL: A language for attribute-based access control in open systems
J Crampton, C Morisset
International Conference on Principles of Security and Trust, 390-409, 2012
872012
Securing the electric vehicle charging infrastructure
R Metere, M Neaimeh, C Morisset, C Maple, X Bellekens, RM Czekster
arXiv preprint arXiv:2105.02905, 2021
572021
rCOS: Theory and tool for component-based model driven development
Z Liu, C Morisset, V Stolz
International Conference on Fundamentals of Software Engineering, 62-80, 2009
552009
Adversarial machine learning in network intrusion detection domain: A systematic review
HA Alatwi, C Morisset
arXiv preprint arXiv:2112.03315, 2021
502021
Robustness testing for software components
B Lei, X Li, Z Liu, C Morisset, V Stolz
Science of Computer Programming 75 (10), 879-897, 2010
402010
Modelling load-changing attacks in cyber-physical systems
L Arnaboldi, RM Czekster, C Morisset, R Metere
Electronic Notes in Theoretical Computer Science 353, 39-60, 2020
352020
State based robustness testing for components
B Lei, Z Liu, C Morisset, X Li
Electronic Notes in Theoretical Computer Science 260, 173-188, 2010
352010
Quantitative workflow resiliency
JC Mace, C Morisset, A Van Moorsel
European Symposium on Research in Computer Security, 344-361, 2014
342014
Formalisation and implementation of access control models
M Jaume, C Morisset
International Conference on Information Technology: Coding and Computing …, 2005
342005
Design and verification of fault-tolerant components
M Zhang, Z Liu, C Morisset, AP Ravn
Methods, models and tools for fault tolerance, 57-84, 2009
322009
A formal approach to implement access control
M Jaume, C Morisset
Journal of Information Assurance and Security 1 (2), 137-148, 2006
302006
Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging
I Yevseyeva, C Morisset, J Turland, L Coventry, T Groß, C Laing, ...
Procedia Technology 16, 508-517, 2014
292014
An auto-delegation mechanism for access control systems
J Crampton, C Morisset
International Workshop on Security and Trust Management, 1-16, 2010
292010
Quantitative access control with partially-observable markov decision processes
F Martinelli, C Morisset
Proceedings of the second ACM conference on Data and Application Security …, 2012
272012
On missing attributes in access control: Non-deterministic and probabilistic attribute retrieval
J Crampton, C Morisset, N Zannone
Proceedings of the 20th ACM Symposium on Access Control Models and …, 2015
242015
From qualitative to quantitative enforcement of security policy
F Martinelli, I Matteucci, C Morisset
International Conference on Mathematical Methods, Models, and Architectures …, 2012
232012
Cost-aware runtime enforcement of security policies
P Drábik, F Martinelli, C Morisset
International Workshop on Security and Trust Management, 1-16, 2012
212012
Formal definition and comparison of access control models
L Habib, M Jaume, C Morisset
Journal of information assurance and security (JIAS) 4 (4), 372-381, 2009
212009
Towards a formal specification of access control
M Jaume, C Morisset
Workshop on Foundations of Computer Security and Automated Reasoning for …, 2006
212006
The system can't perform the operation now. Try again later.
Articles 1–20