mypubs.bib

@comment{{This file has been generated by bib2bib 1.95}}
@comment{{Command line: bib2bib.exe -oc mypubs-citations -ob mypubs.bib -c "author : 'tomlinson' " -s $year -s $type articles.bib}}
@comment{{jabref-meta: selector_publisher:#pub-ACM#;#pub-IEEE#;#pub-IEE
E:cs#;#pub-SV#;}}
@comment{{jabref-meta: selector_keywords:broadcast;crypto;grid;mobile;p
ervasive;protocols;security;trust;web;wireless;xml;}}
@comment{{jabref-meta: groupsversion:3;}}
@comment{{jabref-meta: groupstree:
0 AllEntriesGroup:;
1 ExplicitGroup:Automatically created groups\;2\;;
2 KeywordGroup:bid\;0\;keywords\;bid\;0\;0\;;
2 KeywordGroup:biometrics\;0\;keywords\;biometrics\;0\;0\;;
2 KeywordGroup:broadcast\;0\;keywords\;broadcast\;0\;0\;;
2 KeywordGroup:crypto\;0\;keywords\;crypto\;0\;0\;;
2 KeywordGroup:drm\;0\;keywords\;drm\;0\;0\;;
2 KeywordGroup:grid\;0\;keywords\;grid\;0\;0\;;
2 KeywordGroup:mobile\;0\;keywords\;mobile\;0\;0\;;
2 KeywordGroup:pervasive\;0\;keywords\;pervasive\;0\;0\;;
2 KeywordGroup:protocols\;0\;keywords\;protocols\;0\;0\;;
2 KeywordGroup:security\;0\;keywords\;security\;0\;0\;;
2 KeywordGroup:trust\;0\;keywords\;trust\;0\;0\;;
2 KeywordGroup:web\;0\;keywords\;web\;0\;0\;;
2 KeywordGroup:wireless\;0\;keywords\;wireless\;0\;0\;;
1 ExplicitGroup:Automatically created groups\;2\;;
2 KeywordGroup:1969\;0\;year\;1969\;0\;0\;;
2 KeywordGroup:1977\;0\;year\;1977\;0\;0\;;
2 KeywordGroup:1983\;0\;year\;1983\;0\;0\;;
2 KeywordGroup:1985\;0\;year\;1985\;0\;0\;;
2 KeywordGroup:1989\;0\;year\;1989\;0\;0\;;
2 KeywordGroup:1990\;0\;year\;1990\;0\;0\;;
2 KeywordGroup:1991\;0\;year\;1991\;0\;0\;;
2 KeywordGroup:1992\;0\;year\;1992\;0\;0\;;
2 KeywordGroup:1993\;0\;year\;1993\;0\;0\;;
2 KeywordGroup:1994\;0\;year\;1994\;0\;0\;;
2 KeywordGroup:1995\;0\;year\;1995\;0\;0\;;
2 KeywordGroup:1996\;0\;year\;1996\;0\;0\;;
2 KeywordGroup:1997\;0\;year\;1997\;0\;0\;;
2 KeywordGroup:1998\;0\;year\;1998\;0\;0\;;
2 KeywordGroup:1999\;0\;year\;1999\;0\;0\;;
2 KeywordGroup:2000\;0\;year\;2000\;0\;0\;;
2 KeywordGroup:2001\;0\;year\;2001\;0\;0\;;
2 KeywordGroup:2002\;0\;year\;2002\;0\;0\;;
2 KeywordGroup:2003\;0\;year\;2003\;0\;0\;;
2 KeywordGroup:2004\;0\;year\;2004\;0\;0\;;
2 KeywordGroup:2005\;0\;year\;2005\;0\;0\;;
1 ExplicitGroup:Automatically created groups\;2\;;
2 KeywordGroup:bid\;0\;keywords\;bid\;0\;0\;;
2 KeywordGroup:bid grid\;0\;keywords\;bid grid\;0\;0\;;
2 KeywordGroup:bid trust\;0\;keywords\;bid trust\;0\;0\;;
2 KeywordGroup:biometrics\;0\;keywords\;biometrics\;0\;0\;;
2 KeywordGroup:broadcast\;0\;keywords\;broadcast\;0\;0\;;
2 KeywordGroup:broadcast drm\;0\;keywords\;broadcast drm\;0\;0\;;
2 KeywordGroup:broadcast trust protocols mobile\;0\;keywords\;broadcas
t trust protocols mobile\;0\;0\;;
2 KeywordGroup:crypto\;0\;keywords\;crypto\;0\;0\;;
2 KeywordGroup:crypto protocols\;0\;keywords\;crypto protocols\;0\;0\;
;
2 KeywordGroup:crypto security\;0\;keywords\;crypto security\;0\;0\;;
2 KeywordGroup:crypto trust bid\;0\;keywords\;crypto trust bid\;0\;0\;
;
2 KeywordGroup:drm\;0\;keywords\;drm\;0\;0\;;
2 KeywordGroup:drm broadcast\;0\;keywords\;drm broadcast\;0\;0\;;
2 KeywordGroup:drm trust\;0\;keywords\;drm trust\;0\;0\;;
2 KeywordGroup:grid\;0\;keywords\;grid\;0\;0\;;
2 KeywordGroup:grid mobile\;0\;keywords\;grid mobile\;0\;0\;;
2 KeywordGroup:grid mobile web\;0\;keywords\;grid mobile web\;0\;0\;;
2 KeywordGroup:grid mobile wireless\;0\;keywords\;grid mobile wireless
\;0\;0\;;
2 KeywordGroup:grid mobile wireless web\;0\;keywords\;grid mobile wire
less web\;0\;0\;;
2 KeywordGroup:grid protocols\;0\;keywords\;grid protocols\;0\;0\;;
2 KeywordGroup:grid trust\;0\;keywords\;grid trust\;0\;0\;;
2 KeywordGroup:grid trust bid\;0\;keywords\;grid trust bid\;0\;0\;;
2 KeywordGroup:grid web\;0\;keywords\;grid web\;0\;0\;;
2 KeywordGroup:grid wireless\;0\;keywords\;grid wireless\;0\;0\;;
2 KeywordGroup:mobile\;0\;keywords\;mobile\;0\;0\;;
2 KeywordGroup:mobile broadcast\;0\;keywords\;mobile broadcast\;0\;0\;
;
2 KeywordGroup:mobile drm\;0\;keywords\;mobile drm\;0\;0\;;
2 KeywordGroup:mobile wireless\;0\;keywords\;mobile wireless\;0\;0\;;
2 KeywordGroup:mobile wireless broadcast\;0\;keywords\;mobile wireless
 broadcast\;0\;0\;;
2 KeywordGroup:mobile wireless grid\;0\;keywords\;mobile wireless grid
\;0\;0\;;
2 KeywordGroup:mobile wireless pervasive\;0\;keywords\;mobile wireless
 pervasive\;0\;0\;;
2 KeywordGroup:pervasive\;0\;keywords\;pervasive\;0\;0\;;
2 KeywordGroup:pervasive mobile wireless\;0\;keywords\;pervasive mobil
e wireless\;0\;0\;;
2 KeywordGroup:protocols\;0\;keywords\;protocols\;0\;0\;;
2 KeywordGroup:protocols crypto\;0\;keywords\;protocols crypto\;0\;0\;
;
2 KeywordGroup:protocols mobile\;0\;keywords\;protocols mobile\;0\;0\;
;
2 KeywordGroup:protocols wireless\;0\;keywords\;protocols wireless\;0\
;0\;;
2 KeywordGroup:security\;0\;keywords\;security\;0\;0\;;
2 KeywordGroup:security crypto\;0\;keywords\;security crypto\;0\;0\;;
2 KeywordGroup:security mobile\;0\;keywords\;security mobile\;0\;0\;;
2 KeywordGroup:security protocols\;0\;keywords\;security protocols\;0\
;0\;;
2 KeywordGroup:trust\;0\;keywords\;trust\;0\;0\;;
2 KeywordGroup:trust bid\;0\;keywords\;trust bid\;0\;0\;;
2 KeywordGroup:trust broadcast\;0\;keywords\;trust broadcast\;0\;0\;;
2 KeywordGroup:trust crypto\;0\;keywords\;trust crypto\;0\;0\;;
2 KeywordGroup:trust mobile\;0\;keywords\;trust mobile\;0\;0\;;
2 KeywordGroup:trust security\;0\;keywords\;trust security\;0\;0\;;
2 KeywordGroup:trust web\;0\;keywords\;trust web\;0\;0\;;
2 KeywordGroup:trust wireless\;0\;keywords\;trust wireless\;0\;0\;;
2 KeywordGroup:web\;0\;keywords\;web\;0\;0\;;
2 KeywordGroup:web protocols\;0\;keywords\;web protocols\;0\;0\;;
2 KeywordGroup:wireless\;0\;keywords\;wireless\;0\;0\;;
2 KeywordGroup:wireless broadcast\;0\;keywords\;wireless broadcast\;0\
;0\;;
2 KeywordGroup:wireless mobile\;0\;keywords\;wireless mobile\;0\;0\;;
2 KeywordGroup:wireless protocols\;0\;keywords\;wireless protocols\;0\
;0\;;
2 KeywordGroup:wireless protocols mobile\;0\;keywords\;wireless protoc
ols mobile\;0\;0\;;
2 KeywordGroup:xml\;0\;keywords\;xml\;0\;0\;;
}}
@article{Higgins2009a,
  author = {Fiona Higgins and Allan Tomlinson and Keith Martin},
  title = {Threats to the Swarm: Security Considerations for Swarm Robotics},
  journal = {International Journal on Advances in Security},
  year = {2009},
  volume = {2},
  pages = {288 -- 297},
  number = {3},
  editor = {Radu Calinescu and Fidel Liberal and Mauricio Marin and Lourdes Penalver
	Herrero and Carlos Turro and Manuela Popescu},
  owner = {Allan},
  publisher = {IARIA},
  timestamp = {2009.03.04},
  url = {http://www.iariajournals.org/security/tocv2n23.html}
}
@article{Malik2009,
  author = {Nazir A Malik and Allan Tomlinson},
  title = {Privacy and Consent in Pervasive Networks},
  journal = {Information Security Technical Report},
  year = {2009},
  volume = {14},
  pages = {138 -- 142},
  number = {3},
  month = {August},
  doi = {doi:10.1016/j.istr.2009.10.002},
  owner = {Allan},
  timestamp = {2011.08.31}
}
@article{Malik2009a,
  author = {Nazir A Malik and Allan Tomlinson},
  title = {Web-Services Architecture for Pervasive Computing Environment},
  journal = {Pakistan Journal of Science},
  year = {2009},
  volume = {61},
  pages = {153 -- 157},
  number = {3},
  month = {September},
  owner = {Allan},
  timestamp = {2011.08.31},
  url = {http://www.paas.com.pk/images/volume/pdf/2137802233-6(56-09-Corrected%20Copy)%20WEB-SERVICES%20ARCHITECTURE..............%20(N.A.%20Malik,%20A.%20Tonlinerson-U.K.)(Ref.%20Dr.%20Khalid%20Javed).pdf}
}
@article{Tomlinson2008b,
  author = {Allan Tomlinson},
  title = {Developments in mobile communications security},
  journal = {Information Security Technical Report},
  year = {2008},
  volume = {13},
  pages = {111 - 111},
  number = {3},
  doi = {doi: 10.1016/j.istr.2008.10.001},
  issn = {1363-4127},
  owner = {Allan},
  timestamp = {2009.03.04},
  url = {http://www.sciencedirect.com/science/article/B6VJC-4TN0M24-4/2/ca87fe73e344c545151b71ceee72617f}
}
@article{Tomlinson2007,
  author = {Allan Tomlinson},
  title = {Editorial},
  journal = {Information Security Technical Report},
  year = {2007},
  volume = {12},
  pages = {111--112},
  number = {3},
  doi = {doi:10.1016/j.istr.2007.05.004},
  owner = {Allan},
  timestamp = {2007.12.24},
  url = {http://www.sciencedirect.com/science/article/B6VJC-4R1W3RT-1/2/5cbe9bb902a68f48d82976b91070bffa}
}
@article{Modulomultiplierto1990,
  author = {Allan Tomlinson},
  title = {{M}odulo {M}ultiplier to enhance encryption rates},
  journal = {Electronic Engineering},
  year = {1990},
  volume = {62},
  pages = {25},
  number = {760},
  month = apr,
  keywords = {crypto}
}
@article{Bit-SerialModuloMultiplier1989,
  author = {Allan Tomlinson},
  title = {{B}it--{S}erial {M}odulo {M}ultiplier},
  journal = {Electronics Letters},
  year = {1989},
  volume = {25},
  pages = {1664},
  number = {24},
  month = nov,
  abstract = {{A} bit-serial modular multiplier is presented which uses a table
	look-up method to perform modular reduction. {S}ince the clock frequency
	is independent of word length, this design is most useful when dealing
	with large integers, and is required by many modern cryptographic
	system},
  file = {Bit-SerialModuloMultiplier1989.pdf:Articles\\OwnPapers\\Bit-SerialModuloMultiplier1989.pdf:PDF},
  keywords = {crypto}
}
@article{Single-chip2-portadapters1989,
  author = {Allan Tomlinson and A. R. Mirza},
  title = {{S}ingle--chip 2-port {A}dapters for {W}ave {D}igital {F}ilters},
  journal = {Electronics Letters},
  year = {1989},
  volume = {25},
  pages = {1553--1555},
  number = {23}
}
@article{Tomlinson2011,
  author = {Allan Tomlinson and Po-Wah Yau and John A. MacDonald},
  title = {Privacy Threats in a Mobile Enterprise Social Network},
  journal = {Information Security Technical Report},
  year = {2011},
  volume = {15},
  pages = {57 -- 66},
  number = {2},
  month = {May},
  doi = {doi:10.1016/j.istr.2010.10.004},
  owner = {Allan},
  timestamp = {2011.08.30}
}
@conference{George2011,
  author = {Clarenta George and Swee Keow Goo and Allan Tomlinson},
  title = {Theoretical Analysis of Security Attacks from a Swarm-like Perspective},
  booktitle = {Cyberforensics 2011},
  year = {2011},
  publisher = {University of Strathclyde Publishing},
  owner = {Allan},
  timestamp = {2011.08.30}
}
@conference{Yau2011,
  author = {Po-Wah Yau and Allan Tomlinson},
  title = {Towards privacy in a context-aware social network based recommendation
	system},
  booktitle = {SocialCom 2011, 3rd IEEE International Conference on Social Computing},
  year = {2011},
  address = {Boston},
  month = {October},
  publisher = {IEEE Computer Society},
  owner = {Allan},
  timestamp = {2011.08.30}
}
@conference{Yau2011a,
  author = {Po-Wah Yau and Allan Tomlinson},
  title = {Development of a privacy architecture for an Instant Knowledge system},
  booktitle = {2011 International Conference on E-Learning, E-Business, Enterprise
	Information Systems, \& E-Government, EEE 2011},
  year = {2011},
  address = {Las Vegas NV},
  month = {July},
  publisher = {CSREA Press},
  owner = {Allan},
  timestamp = {2011.08.30}
}
@conference{Yau2010,
  author = {Po-Wah Yau and Allan Tomlinson},
  title = {Misuse cases for an Instant Knowledge system},
  booktitle = {Wireless World Research Forum},
  year = {2010},
  publisher = {WWRF},
  owner = {Allan},
  timestamp = {2011.08.30}
}
@incollection{SecureDeliveryof2005,
  author = {Eimear Gallery and Allan Tomlinson},
  title = {{S}ecure {D}elivery of {C}onditional {A}ccess {A}pplications to {M}obile
	{R}eceivers},
  booktitle = {{T}rusted {C}omputing},
  publisher = {IEE},
  year = {2005},
  editor = {Chris J. Mitchell},
  abstract = {{T}his chapter describes two protocols for the secure download of
	content protection software to mobile devices. {T}he protocols apply
	concepts from trusted computing to demonstrate to the source of the
	software that a platform is in a suffciently trustworthy state before
	any application or associated keys are securely downloaded. {T}he
	protocols are described at an abstract level before being mapped
	on to specific trusted platform architectures. {T}he protocols are
	designed to allow mobile devices to receive broadcast content protected
	by proprietary conditional access applications. {T}hey may also be
	applied in the general case where demonstration of a secure execution
	environment is required before an application is downloaded.},
  file = {SecureDeliveryof2005.pdf:Articles\\OwnPapers\\SecureDeliveryof2005.pdf:PDF},
  keywords = {trust broadcast},
  owner = {Allan},
  timestamp = {2007.09.25}
}
@incollection{Gebhardt2008,
  author = {Gebhardt, Carlo and Tomlinson, Allan},
  title = {Trusted Virtual Disk Images},
  booktitle = {Future of Trust in Computing},
  publisher = {Vieweg \& Teubner},
  year = {2009},
  editor = {Gawrock, David and Reimer, Helmut and Sadeghi, Ahmad-Reza and Vishik,
	Claire},
  pages = {197-207},
  address = {Berlin},
  month = {July},
  note = {10.1007/978-3-8348-9324-6_21},
  affiliation = {University of London Royal Holloway London UK},
  isbn = {978-3-8348-9324-6},
  keyword = {Computer Science},
  owner = {Allan},
  timestamp = {2008.09.17},
  url = {http://dx.doi.org/10.1007/978-3-8348-9324-6_21}
}
@incollection{ExperiencesofSOLO1989,
  author = {Mike S. McGregor and Allan Tomlinson and Ooi Kiang Tan},
  title = {{E}xperiences of {SOLO 1000} in research at the {U}niversity of {E}dinburgh},
  booktitle = {{E}lectronics {C}omputer {A}ided {D}esign},
  publisher = {Manchester University Press},
  year = {1989},
  editor = {P.L. Jones and A. Buckley},
  pages = {182--184}
}
@incollection{Tomlinson2008,
  author = {Tomlinson, Allan},
  title = {Security For Video Broadcasting},
  booktitle = {Smart Cards, Tokens, Security and Applications},
  publisher = {Springer},
  year = {2008},
  pages = {139--154},
  abstract = {This chapter presents an overview of a well known application of smart
	card technology, namely that of pay-TV systems. The focus is on the
	security issues of this particular application and the mechanisms
	available to meet the security requirements. The chapter begins by
	establishing the requirements for the application and then looks
	in detail at the security mechanisms provided by current broadcast
	standards.},
  doi = {doi:10.1016/j.istr.2008.10.001},
  journal = {Smart Cards, Tokens, Security and Applications},
  owner = {Allan},
  timestamp = {2007.12.24}
}
@incollection{Tomlinson2008a,
  author = {Tomlinson, Allan},
  title = {Introduction to the TPM},
  booktitle = {Smart Cards, Tokens, Security and Applications},
  publisher = {Springer},
  year = {2008},
  pages = {155--172},
  abstract = {The Trusted Platform Module (TPM) and smart card devices have many
	features in common. Both are low cost, tamper resistant, small footprint
	devices used to provide the basis of a secure computing environment.
	This chapter presents an introduction to the security mechanisms
	provided by the TPM highlighting those not typically found on a smart
	card. The concept of “ownership� is one of the major differences
	between the TPM and a smart card and this is described in some detail
	before concluding with a review of some of the security services
	uniquely provided by the TPM.},
  doi = {http://dx.doi.org/10.1007/978-0-387-72198-9_7},
  journal = {Smart Cards, Tokens, Security and Applications},
  owner = {Allan},
  timestamp = {2007.12.24}
}
@inproceedings{MutualAuthenticationof2004,
  author = {Karen Louise Billington and Allan Tomlinson},
  title = {{M}utual {A}uthentication of {B3G} devices within {P}ersonal {D}istributed
	{E}nvironments},
  booktitle = {{F}ifth {I}nternational {C}onference on {3G} {M}obile {C}ommunications
	{T}echnologies, {3G 2004}},
  year = {2004},
  pages = {452--456},
  address = {London, UK},
  month = oct,
  publisher = {IEE},
  abstract = {{T}he {P}ersonal {D}istributed {E}nvironment ({PDE}) is a new concept
	arising in personal communications beyond 3{G} ({B}3{G}). {T}his
	paper briefly describes the environment, surveys the protocols available
	to provide {PDE} authentication, and assesses their suitability for
	adaptation to the {PDE}},
  file = {MutualAuthenticationof2004.pdf:Articles\\OwnPapers\\MutualAuthenticationof2004.pdf:PDF},
  keywords = {mobile}
}
@inproceedings{RegionalBlackoutsProtection2004,
  author = {Alexander W. Dent and Allan Tomlinson},
  title = {{R}egional {B}lackouts: {P}rotection of {B}roadcast {C}ontent on
	{3G N}etworks},
  booktitle = {{F}ifth {I}nternational {C}onference on {3G} {M}obile {C}ommunications
	{T}echnologies, {3G 2004}},
  year = {2004},
  pages = {442--446},
  address = {London, UK},
  month = oct,
  publisher = {IEE},
  abstract = {{O}ne of the driving forces behind the development of 3{G} systems
	is the potential to deliver complex content to consumers. {T}his
	is evident from the growing collaboration between broadcast and mobile
	network operators, and the expectation that future broadcast receivers
	will be able to forward content to mobile devices. {O}ne challenge
	in providing such a service is the requirement for content protection.
	{A}n aspect of this that is particularly relevant to mobile systems
	is the ability to control where content is viewed. {A}lthough 3{G}
	networks can provide location of a user’s receiver, this device may
	be in a different location from the device that renders the content.
	{T}hus the provider cannot be certain where the content will be viewed.
	{T}his paper proposes two protocols that will provide the location
	of the end device in a secure manner that can be trusted by the content
	provider.},
  file = {RegionalBlackoutsProtection2004.pdf:Articles\\OwnPapers\\RegionalBlackoutsProtection2004.pdf:PDF},
  keywords = {mobile wireless broadcast}
}
@inproceedings{ConditionalAccessin2005,
  author = {Eimear Gallery and Allan Tomlinson},
  title = {{C}onditional {A}ccess in {M}obile {S}ystems: {S}ecuring the {A}pplication},
  booktitle = {{T}he {F}irst {I}nternational {C}onference on {D}istributed {F}rameworks
	for {M}ultimedia {A}pplications {DFMA 05}},
  year = {2005},
  pages = {190-197},
  address = {Los Alamitos, CA, USA},
  month = feb,
  publisher = {IEEE Computer Society},
  abstract = {{T}his paper describes two protocols for the secure download of content
	protection software to mobile devices. {T}he protocols apply concepts
	from trusted computing to demonstrate that a platform is in a sufficiently
	trustworthy state before any application or associated keys are securely
	downloaded. {T}he protocols are designed to allow mobile devices
	to receive broadcast content protected by proprietary conditional
	access applications. {T}hey may also be applied in the general case
	where demonstration of a secure execution environment is required
	before an application is downloaded.},
  doi = {http://doi.ieeecomputersociety.org/10.1109/DFMA.2005.17},
  file = {ConditionalAccessin2005.pdf:Articles\\OwnPapers\\ConditionalAccessin2005.pdf:PDF},
  isbn = {0-7695-2273-4},
  keywords = {trust broadcast}
}
@inproceedings{Gallery2005,
  author = {Eimear Gallery and Allan Tomlinson},
  title = {{P}rotection of {D}ownloadable {S}oftware on {SDR} {D}evices},
  booktitle = {{S}oftware {D}efined {R}adio {T}echnical {C}onference {SDR05}},
  year = {2005},
  month = nov,
  file = {Gallery2005.pdf:Articles\\2005\\Gallery2005.pdf:PDF},
  keywords = {broadcast trust protocols mobile}
}
@inproceedings{Gebhardt2010,
  author = {Carl Gebhardt and Chris I. Dalton and Allan Tomlinson},
  title = {Separating Hypervisor Trusted Computing Base Supported by Hardware.},
  booktitle = {Proceedings of the fifth ACM workshop on Scalable trusted computing},
  year = {2010},
  series = {STC '10},
  pages = {79--84},
  address = {Chicago},
  month = {October},
  publisher = {ACM Press},
  acmid = {1867648},
  doi = {http://doi.acm.org/10.1145/1867635.1867648},
  isbn = {978-1-4503-0095-7},
  keywords = {hardware extension, trusted computing base, virtualisation},
  location = {Chicago, Illinois, USA},
  numpages = {6},
  owner = {Allan},
  review = {A workshop held in conjunction with the 17th ACM Conference on Computer
	and Communications Security (ACM CCS 2010)},
  timestamp = {2010.09.27},
  url = {http://doi.acm.org/10.1145/1867635.1867648}
}
@inproceedings{Goo2006,
  author = {Swee Keow Goo and James Irvine and Allan Tomlinson},
  title = {{A}n {O}verview of the {F}ormal {V}erification on the {D}igital {M}arketplace
	{C}ryptographic {P}rotocols},
  booktitle = {4th {I}nternationall {C}onference on {A}pplied {C}ryptography and
	{N}etwork {S}ecurity ({ACNS})},
  year = {2006},
  month = jun,
  timestamp = {2006.10.02}
}
@inproceedings{Goo2009,
  author = {Swee Keow Goo and James M. Irvine and Ivan Andonovic and Allan Tomlinson},
  title = {Preserving Privacy in Assistive Technologies},
  booktitle = {First International Workshop on Medical Applications Networking (MAN
	2009)},
  year = {2009},
  pages = {110 -- 115},
  address = {Dresden},
  month = {June},
  publisher = {IEEE},
  doi = {10.1109/ICCW.2009.5208079},
  owner = {Allan},
  timestamp = {2009.03.04}
}
@inproceedings{SecurityRequirementsMobile2005,
  author = {Swee Keow Goo and James M. Irvine and John Dunlop and Allan Tomlinson
	and Scarlet Schwiderski-Grosche},
  title = {{S}ecurity {R}equirements for {M}obile {S}ervice {P}rovision via
	a {D}igital {M}arketplace ({I}nvited {P}aper)},
  booktitle = {11th {E}uropean {W}ireless {C}onference, {EW '05}},
  year = {2005},
  volume = {2},
  pages = {573--581},
  address = {Nicosia, Cyprus},
  month = apr,
  organization = {VDE},
  publisher = {{VDE V}erlag},
  abstract = {{I}ncreasing network choice and service diversity makes choosing the
	best transport network for a particular communication difficult.
	{A} freely operating market has the potential to solve this problem,
	and the {M}obile {VCE}’s {D}igital {M}arketplace ({DMP}) is an example
	of such a system. {S}hort term service contracts can be tendered
	to network operators in a dynamic and competitive manner down to
	a call level. {W}hile showing great promise, many security concerns
	involving the various {DMP} entities remain unresolved. {T}his paper
	reviews the current sate of the art in electronic marketplaces, and
	examines the particular security issues and security requirements
	of the {DMP}, so as to create a secure service negotiation platform
	for trading communication services},
  file = {SecurityRequirementsMobile2005.pdf:Articles\\OwnPapers\\SecurityRequirementsMobile2005.pdf:PDF},
  keywords = {mobile},
  url = {http://www.vde-verlag.de/data/buecher.php?action=bookdetail&vertriebsnr=562886}
}
@inproceedings{DesigningandVerifying2005,
  author = {Swee Keow Goo and James M. Irvine and Allan Tomlinson and Scarlet
	Schwiderski-Grosche},
  title = {{D}esigning and {V}erifying {S}ecure {P}rotocols of the {D}igital
	{M}arketplace},
  booktitle = {{I}nternational {W}orkshop on {S}atellite and {S}pace {C}ommunications
	2005 ({IWSSC 2005})},
  year = {2005},
  address = {Sienna, Italy},
  publisher = {IEEE},
  abstract = {{T}he {M}obile {VCE}’s {D}igital {M}arketplace ({DMP}) is a system,
	which allows very short term trading of radio resources. {I}t uses
	autonomous agents to request and negotiate the provision of communications
	services in a dynamic and competitive manner. {W}hile showing great
	promise, many security concerns involving the adoption of the {DMP}
	infrastructure by the future mobile communications industry remain
	unresolved. {T}his paper examines the cryptographic protocol that
	plays an essential influencing role in creating a secure service
	negotiation platform},
  file = {DesigningandVerifying2005.pdf:Articles\\2005\\DesigningandVerifying2005.pdf:PDF},
  keywords = {wireless protocols mobile}
}
@inproceedings{Helmhout2009,
  author = {Martin Helmhout and Craig Saunders and Allan Tomlinson and John A.
	MacDonald and Jame M. Irvine and Alisdair McDiarmid},
  title = {Instant Knowledge: a Secure Mobile Context-Aware Distributed Recommender
	System},
  booktitle = {ICT -- MobileSummit 2009},
  year = {2009},
  editor = {Paul Cunningham and Miriam Cunningham},
  address = {Santander},
  month = {June},
  publisher = {IIMC International Information Management Corporation},
  owner = {Allan},
  timestamp = {2009.03.04}
}
@inproceedings{Higgins2009,
  author = {Fiona Higgins and Allan Tomlinson and Keith Martin},
  title = {Survey on Security Challenges for Swarm Robotics},
  booktitle = {Fifth International Conference on Autonomic and Autonomous Systems
	(ICAS 2009)},
  year = {2009},
  editor = {Radu Calinescu and Fidel Liberal and Mauricio Marin and Lourdes Penalver
	Herrero and Carlos Turro and Manuela Popescu},
  pages = {307-- 312},
  address = {Valencia},
  month = {April},
  publisher = {IEEE Computer Society},
  doi = {10.1109/ICAS.2009.62},
  owner = {Allan},
  timestamp = {2010.02.12}
}
@inproceedings{MobileVCEArchitecture2005,
  author = {Paul Pangalos and Kar Ann Chew and Nima Sattari and Allan Tomlinson
	and Robert Atkinson and Hamid Aghvami and Rahim Tafazolli},
  title = {{T}he {M}obile {VCE} {A}rchitecture for the {I}nterworking of {M}obile
	and {B}roadcast {N}etworks},
  booktitle = {11th {E}uropean {W}ireless {C}onference, {EW '05}},
  year = {2005},
  volume = {2},
  pages = {823--828},
  address = {Nicosia, Cyprus},
  month = apr,
  organization = {VDE},
  publisher = {{VDE V}erlag},
  abstract = {{T}he {C}ore 3 {R}esearch {P}rogramme of the {V}irtual {C}entre of
	{E}xcellence in {M}obile and {P}ersonal {C}ommunications ({M}obile
	{VCE} {C}ore3) takes a generic approach for the co-operation between
	mobile and broadcasting network, such that the solution is more widely
	applicable and easily adopted by network operators, service providers
	and customer owners. {T}his also reflects the industrial reality
	of the competitiveness that exists between the broadcast and telecommunications
	industry – both believe in convergence. {T}his paper presents and
	describes the low level functional elements of the inter-working
	of networks {M}obile {VCE} architecture. {I}n particular, it focuses
	on the network components and briefly describes the structure and
	key functionalities of three of them namely mobility management,
	security and the personal distributed environment},
  file = {MobileVCEArchitecture2005.pdf:Articles\\OwnPapers\\MobileVCEArchitecture2005.pdf:PDF},
  keywords = {mobile wireless broadcast},
  url = {http://www.vde-verlag.de/data/buecher.php?action=bookdetail&vertriebsnr=562886}
}
@inproceedings{SecurityChallengesin2004,
  author = {Scarlet Schwiderski-Grosche and Allan Tomlinson and Swee Keow Goo
	and James M. Irvine},
  title = {{S}ecurity {C}hallenges in the {P}ersonal {D}istributed {E}nvironment},
  booktitle = {60th {V}ehicular {T}echnology {C}onference, {VTC} {F}all '04},
  year = {2004},
  pages = {3267 -- 3270},
  address = {Los Angeles, {USA}},
  month = sep,
  publisher = {IEEE},
  abstract = {{F}uture communications systems are expected to enable interaction
	between an increasingly diverse range of devices, both mobile and
	fixed. {T}his will allow users to construct their own {P}ersonal
	{D}istributed {E}nvironments using a combination of different communications
	technologies. {D}epending on the services’ availability, the communication
	configuration could be, for instance, via a cellular system; a wireless
	ad hoc network; a digital broadcast system; or a fixed telephone
	network. {T}his new form of communication configuration inherently
	imposes strict requirements on security, especially when the number
	of involved entities, accessible network nodes, and service providers
	increases. {T}he creation of such heterogeneous, dynamic, and distributed
	networks raises many technical issues. {T}his paper discusses the
	particular problems involved in securing such an environment and
	establishes a series of requirements that future security architectures
	can be based on.},
  doi = {10.1109/VETECF.2004.1404667},
  file = {SecurityChallengesin2004.pdf:Articles\\OwnPapers\\SecurityChallengesin2004.pdf:PDF},
  keywords = {mobile wireless}
}
@inproceedings{ApplicationofGrid2004,
  author = {Allan Tomlinson and Scarlet Schwiderski-Grosche},
  title = {{A}pplication of {G}rid {S}ecurity to {P}ersonal {D}istributed {E}nvironments},
  booktitle = {{F}irst {I}nternational {W}orkshop on {G}rid {C}omputing and its
	{A}pplication to {D}ata {A}nalysis {GADA '04}},
  year = {2004},
  editor = {Robert Meersman and Zahir Tari and Angelo Corsaro},
  volume = {3292},
  series = {LNCS {OTM W}orkshops},
  pages = {68--78},
  address = {Cyprus},
  month = oct,
  publisher = {Springer-Verlag},
  abstract = {{A}s {G}rid technology evolves it is becoming evident that the inclusion
	of mobile devices in a {G}rid environment will benefit both the {G}rid
	and mobile network communities. {M}any mobile devices, however, have
	limits on their computational resources that make it difficult to
	achieve this goal. {T}he {P}ersonal {D}istributed {E}nvironment ({PDE})
	is a new concept in mobile networks which, by constraining the problem,
	overcomes the resource limitation. {T}his paper introduces the concept
	of the {PDE} and compares it with the {G}rid environment. {T}he paper
	focuses on the specific problem of how to secure the mobile device
	and in particular how {G}rid security may be applied to this new
	environment. {T}he {PDE} allows simple {G}rid security mechanisms
	to be adapted and applied within the {PDE} boundaries, while allowing
	a gateway device to support open standards as they emerge. {I}n adopting
	a hybrid approach, a migration path to open standards is provided,
	as the computational resources of mobile devices increase.},
  doi = {10.1007/b102133},
  file = {ApplicationofGrid2004.pdf:Articles\\OwnPapers\\ApplicationofGrid2004.pdf:PDF},
  keywords = {mobile wireless grid}
}
@inproceedings{Yau2007,
  author = {P.-W. Yau and A. Tomlinson},
  title = {{U}sing {T}rusted {C}omputing in {C}ommercial {G}rids},
  booktitle = {{P}roceedings of the 15th {I}nternational {W}orkshops on {C}onceptual
	{S}tructures ({ICCS} 2007), {S}heffield, {UK}, {J}uly 22-27, 2007},
  year = {2007},
  editor = {Babak Akhgar},
  pages = {31--36},
  month = jul,
  publisher = {Springer-Verlag},
  file = {Yau2007.pdf:Articles\\OwnPapers\\Yau2007.pdf:PDF},
  owner = {Allan},
  timestamp = {2007.09.17}
}
@inproceedings{Yau2009,
  author = {Po-Wah Yau and Allan Tomlinson},
  title = {Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation},
  booktitle = {International Conference on Grid Computing and Applications (GCA
	09)},
  year = {2009},
  pages = {113 -- 119},
  address = {Las Vegas, NV},
  owner = {Allan},
  timestamp = {2009.05.27}
}
@inproceedings{Yau2008,
  author = {Po-Wah Yau and Allan Tomlinson and Shane Balfe and Eimear Gallery},
  title = {Securing Grid Workflows with Trusted Computing},
  booktitle = {ICCS 2008 8th International Conference on International Conference
	on Computational Science},
  year = {2008},
  editor = {Marian Bubak and Geert Dick van Albada and Jack Dongarra and Peter
	M.A. Sloo},
  volume = {5103-0510},
  series = {LNCS},
  pages = {510--519},
  address = {Krakow, Poland},
  month = {June},
  publisher = {Springer},
  abstract = {We propose a novel scheme that uses Trusted Computing technology to
	secure Grid workflows. This scheme allows the selection of trustworthy
	resource providers based on their platform states. The integrity
	and confidentiality of workflow jobs are provided using cryptographic
	keys that can only be accessed when resource provider platforms are
	in trustworthy states. In addition, platform attestation is used
	to detect potential workflow execution problems, and the information
	collected can be used for process provenance.},
  journal = {Computational Science ICCS 2008},
  owner = {Allan},
  timestamp = {2008.09.17},
  url = {http://dx.doi.org/10.1007/978-3-540-69389-5_58}
}
@inproceedings{Yau2008a,
  author = {Po-Wah Yau and Allan Tomlinson and Shane Balfe and Eimear Gallery},
  title = {Securing Grid Workflows with Trusted Computing (Extended Abstract)},
  booktitle = {Eighth IEEE International Symposium on Cluster Computing and the
	Grid (CCGRID)},
  year = {2008},
  pages = {700},
  doi = {http://doi.ieeecomputersociety.org/10.1109/CCGRID.2008.77}
}
@misc{Dent2005,
  author = {Alexander W. Dent and Allan Tomlinson},
  title = {{C}ontrolling {T}ransmission of {B}roadcast {C}ontent},
  howpublished = {US patent filing, 11/056 681},
  month = feb,
  year = {2005},
  keywords = {mobile broadcast}
}
@misc{Dent2004,
  author = {Alexander W. Dent and Allan Tomlinson},
  title = {{C}ontrolling {T}ransmission of {B}roadcast {C}ontent},
  howpublished = {GB patent filing, GB0403218.1},
  month = feb,
  year = {2004},
  keywords = {mobile broadcast}
}
@techreport{ApplicationofTrusted2005,
  author = {Eimear Gallery and Allan Tomlinson and Rob Delicata},
  title = {{A}pplication of {T}rusted {C}omputing to {S}ecure {V}ideo {B}roadcasts
	to {M}obile {R}eceivers},
  institution = {Department of Mathematics, Royal Holloway, University of London},
  year = {2005},
  number = {RHUL--MA--2005--11},
  month = jun,
  note = {(submitted to IEEE Trans. on Vehicular Technology)},
  abstract = {{T}his paper addresses the problem of configuring mobile devices to
	receive broadcast services protected by legacy conditional access
	systems. {T}he protocols apply the concepts of trusted computing
	to allow a mobile host to demonstrate that it is secure, before any
	application or associated keys are securely downloaded. {T}hus the
	protocols are applicable anywhere a secure download is required.
	{A} general analysis of the security of the protocols is presented,
	followed by the results of formal verification.},
  file = {ApplicationofTrusted2005.pdf:Articles\\OwnPapers\\ApplicationofTrusted2005.pdf:PDF},
  keywords = {broadcast trust protocols mobile},
  url = {http://www.ma.rhul.ac.uk/static/techrep/2005/RHUL-MA-2005-11.pdf}
}
@techreport{Gebhardt2008b,
  author = {Carl Gebhardt and Allan Tomlinson},
  title = {Security consideration for virtualization},
  institution = {Department of Mathematics, Royal Holloway, University of London},
  year = {2008},
  number = {RHUL--MA--2008--16},
  owner = {Allan},
  timestamp = {2009.03.04},
  url = {http://www.ma.rhul.ac.uk/static/techrep/2008/RHUL-MA-2008-16.pdf}
}
@techreport{Schwiderski-Grosche2005TowardsSecureInitialisation,
  author = {Scarlet Schwiderski-Grosche and Allan Tomlinson and David B. Pearce},
  title = {{T}owards the {S}ecure {I}nitialisation of a {P}ersonal {D}istributed
	{E}nvironment},
  institution = {Department of Mathematics, Royal Holloway, University of London},
  year = {2005},
  number = {RHUL--MA--2005--09},
  month = jul,
  abstract = {{T}he {P}ersonal {D}istributed {E}nvironment, or {PDE}, represents
	a new concept of a computer network that takes a user-centric view
	of personal devices to create a purely virtual personal network.
	{A} {PDE} integrates all devices that are relevant to a user, regardless
	of their location, current role, or their specific capabilities.
	{I}n this paper we present an overview of the {PDE} concept and describe
	how such an environment may be constructed. {S}ince the user’s devices
	may be located in several different security domains, our focus is
	on the secure initialisation of the {PDE} and to that end, we introduce
	a step-by-step procedure describing how user’s devices will join
	the network in a secure manner.},
  file = {Schwiderski-Grosche2005TowardsSecureInitialisation.pdf:Articles\\OwnPapers\\Schwiderski-Grosche2005TowardsSecureInitialisation.pdf:PDF},
  keywords = {mobile wireless pervasive},
  url = {http://www.ma.rhul.ac.uk/static/techrep/2005/RHUL-MA-2005-9.pdf}
}

This file was generated by bibtex2html 1.95.