Aad van Moorsel
26 published titles
IP traceback in a switched ethernet network
(Contributor)
1 edition
- University of Newcastle upon Tyne, Computing Science
- 2007
- Details
Mitigating provider uncertainty in service provision contracts
(Contributor)
1 edition
- University of Newcastle upon Tyne
- 2007
- Details
Evaluation of P2P search algorithms for discovering trust paths
(Contributor)
1 edition
- University of Newcastle upon Tyne, Computing Science
- 2007
- Details
A trust-economic perspective on information security technologies
(Contributor)
1 edition
- University of Newcastle upon Tyne, Computing Science
- 2007
- Details
The impact of unavailability on the effectiveness of enterprise information security technologies
(Contributor)
1 edition
- Newcastle University, Computing Science
- 2008
- Details
Risk modelling of access control policies with human behavioural factors
(Contributor)
1 edition
- Computer Sciences, Newcastle University
- 2009
- Details
A novel approach to access control for the Web
(Contributor)
1 edition
- Computing Science, Newcastle University
- 2009
- Details
Decision support for intelligent traffic and environment management
(Contributor)
1 edition
- Computing Science, Newcastle University
- 2009
- Details
Architecture and protocol for user-controlled access management in Web 2.0 applications
(Contributor)
1 edition
- Computing Science, Newcastle University
- 2010
- Details
A collaborative ontology development tool for information security managers
(Contributor)
1 edition
- University of Newcastle upon Tyne, Computing Science
- 2010
- Details
Design and implementation of user-managed access framework for Web 2.0 applications
(Contributor)
1 edition
- Computing Science, Newcastle University
- 2010
- Details
Quantitative evaluation of enterprise DRM technology
(Contributor)
1 edition
- Newcastle University, Computing Science
- 2011
- Details
Cooperative information security knowledge : content validation and incentives to contribute
(Contributor)
1 edition
- Newcastle University, computer Science
- 2011
- Details
The case for dynamic security solutions in public cloud workflow deployments
(Contributor)
1 edition
- Newcastle University, Computing Science
- 2011
- Details
Formal mapping of WSLA contracts on stochastic models
(Contributor)
1 edition
- Newcastle University, Computing Science
- 2011
- Details
Uncertainty and uncertainty tolerance in service provisioning
(Contributor)
1 edition
Digital strategy for the social inclusion of survivors of domestic violence
(Contributor)
1 edition
- Newcastle University, Computing Science
- 2011
- Details
Driving privacy controls with social context
(Contributor)
1 edition
- University of Newcastle upon Tyne, Computing Science
- 2012
- Details
A generic logging template for infrastructure as a service cloud
(Contributor)
1 edition
Risks of offline verify PIN on contactless cards
(Contributor)
1 edition
- Newcastle University, Computing Science
- 2013
- Details
Impact of policy design on workflow resiliency computation time
(Contributor)
1 edition
- University of Newcastle Upon Tyne, Computing Science
- 2015
- Details
POS terminal authentication protocol to protect EMV contactless payment cards
(Contributor)
1 edition
- Newcastle University, Computing Science
- Details
Logging solutions to mitigate risks associated with threats in infrastructure as a service cloud
(Contributor)
1 edition
- Computing Science, Newcastle University
- Details
Modelling user availability in workflow resiliency analysis
(Contributor)
1 edition
- Newcastle University, Computing Science
- Details
Quantitative workflow resiliency
(Contributor)
1 edition
- Newcastle University, Computing Science
- Details
Rigorous design and implementation of an emulator for EMV contactless payments
(Contributor)
1 edition
- Newcastle University, Computing Science
- Details