Publications::2010

Theses and Dissertations

  1. B. Andrachnik, “Transformation of BPMN Security Annotations with Workflow Patterns”, bachelor thesis, IPD, KIT, Karlsruhe, Germany, 2010.
  2. I. Andragna-Löwen, “Investigating Execution States of Active BPEL Process Instances for Access Control in a Workflow Management System”, diploma thesis, IPD, KIT, Karlsruhe, Germany, 2010.
  3. A. M. Ferreira, “Modelling Access Control for Healthcare Information Systems – How to control access through policies, human processes and legislation”, PhD thesis, University of Kent and University of Porto (jointly submitted to), Kent and Porto, 2010.
  4. G. Ouandja Ngassam, “Structural BPMN/BPEL Process Adaptation and Application to Intalio”, diploma thesis, IPD, KIT, Karlsruhe, Germany, 2010.
  5. A. Fedüschkin, “Specification and Support of Security Properties of Workflows as BPMN annotations”, diploma thesis, IPD, KIT, Karlsruhe, Germany, 2010.

Books

  1. C. Bartolini, A. Bertolino, F. Lonetti and E. Marchetti, “Approaches to functional, structural and security SOA testing”, in Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, V. Cardellini et al., Hershey, PA: IGI International, 2010, pp. 96-120.
  2. A. Bertolino et al., “Trends and research issues in SOA validation”, in Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, V. Cardellini et al., Hershey, PA: IGI International, 2010.

Periodicals

  1. C. Bartolini, A. Bertolino, S. Elbaum and E. Marchetti, “Bringing White-Box Testing to Service Oriented Architectures through a Service Oriented Approach”, The Journal of Systems and Software, 2010.
  2. K. Böhm, S. Etalle, J. Den Hartog, C. Hütter, S. Trabelsi, D. Trivellato and N. Zannone, “A flexible architecture for privacy-aware trust management”, Journal of Theoretical and Applied Electronic Commerce Research, vol. 5, no. 2, pp. 77-96, Aug. 2010.
  3. D. W. Chadwick, G. Inman and N. Klingenstein, “A conceptual model for attribute aggregation”, Future Generation Computer Systems, vol. 26, no. 7, pp. 1043-1052, Jul. 2010.
  4. G. Inman, D. Chadwick, “A Privacy Preserving Attribute Aggregation Model for Federated Identity Managements Systems”, Upgrade, vol. XI, no. 1, pp. 21-26, Feb. 2010.
  5. T. Kirkham, S. Winfield, A. Smallwood, K. Coolin, S. Wood and L. Searchwell, “Introducing Live ePortfolios to Support Self Organised Learning”, Educational Technology & Society, vol. 12, no. 3, pp. 107-114, 2010.
  6. T. Kirkham, I. Dahn, D. Chadwick, M. Santos and S. Winfield, “Aggregating policies in user centric, real-time and distributed applications”, International Conference for Internet Technology and Secured Transactions, pp. 1-6, Nov. 2010.
  7. S. Ferreira, L. Antunes, D. Chadwick and R. Correi, “Grounding Information Security in Healthcare”, International Journal of Medical Informatics, vol. 79, pp. 268-283, Apr. 2010.

Standards

  1. D. W. Chadwick, S. F. Lievens, “Break The Glass Profile For XACML V2.0 and V3.0″, November 25 2010.

Papers Presented at Conferences

  1. J. den Hartog, C. Hütter and S. Trabelsi, “Combined Trust Management Architecture”, presented at the Proceedings of the International Conference on Mobility, Individualisation, Socialisation and Connectivity, 2010.
  2. T. Kirkham, S. Winfield, K. Coolin, S. Wood and A. Smallwood, “An ecosystem for user centric learning: revolution or evolution?”, presented at the Learning Forum London, 2010.
  3. J. Müller, J. Mülle, S. von Stackelberg and K. Böhm, “Secure Business Processes in Service-Oriented Architectures – A Requirements Analysis”, presented at the 8th IEEE European Conference on Web Services, Cyprus, 2010.
  4. T. Kirkham et al., “Ensuring ePortfolio Data Remains Personal in Next Generation Distributed Computing Applications”, presented at the EChallenges e-2010, Warsaw, 2010.
  5. A. Pashalidis, S. Schiffner, “Evaluating Adversarial Partitions”, presented at the 15th European Symp. on Research in Computer Security, Athens, Greece, 2010.

Published Conference Proceedings

  1. T. Kirkham, I. Dahn, D. Chadwick, M. Santos and S. Winfield, “Aggregating policies in user centric, real-time and distributed applications”, in 4th International Conference for Internet Technology and Secured Transactions, London, UK, 2010, pp. 1-6.
  2. K. Fatema, D. W. Chadwick and S. Lievens, “A Privacy Policy Enforcement System”, in PrimeLife / IFIP Summer School, Helsingbord, Sweden, 2010.
  3. A. Ferreira, R. Correia, D. W. Chadwick and L. Antunes, “Access Control in Healthcare: the methodology from legislation to practice”, in 13th World Congress on Medical and Health Informatics, Medinfo 2010, Cape Town, South Africa, 2010.
  4. C. von der Weth, K. Böhm and C. Hütter, “Optimizing Multiple Centrality Computations for Reputation Systems”, in Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010, pp. 160-167.
  5. C. Hütter, J. Yue, C. von der Weth and K. Böhm, “Strategic Provider Selection in a Policy-Based Helping Scenario”, in Proceedings of the 12th IEEE International Conference on Commerce and Enterprise Computing, 2010, pp. 104-111.
  6. J. Müller, J. Mülle, S. von Stackelberg and K. Böhm, “Secure Business Processes in Service-Oriented Architectures – A Requirements Analysis”, in Proceedings of the 8th IEEE European Conference on Web Services, Cyprus, 2010, pp. 35-42.
  7. S. Winfield, T. Kirkham, “Let’s Keep It Personal: ePortfolio Data in Next Generation Distributed Computing Applications”, in Learning Forum London 2010 Proceedings, 2010, pp. 219-220.
  8. F. Lonetti, E. Marchetti, “X-MuT: A Tool for the Generation of XSLT Mutants”, in Proceedings of the 7th International Conference on the Quality of Information and Communications Technology, Porto, Portugal, 2010, pp. 280-285.
  9. F. de Angelis, A. Polini and G. de Angelis, “A Counter-Example Testing Approach for Orchestrated Services”, in Proceedings of the 3rd International Conference on Software Testing, Verification and Validation, Paris, France, 2010, pp. 373-382.
  10. Q. Reul, G. Zhao and R. Meersman, “Ontology-based Access Control Policy Interoperability”, in Proceedings of the 1st International Conference on Mobility, Individualisation, Socialisation, and Connectivity, London, UK, January 2010.
  11. C. Debruyne, Q. Reul and R. Meersman, “GOSPL: Grounding Ontologies with Social Processes and Natural Language”, in Proceedings of the 7th International Conference on Information Technology: New Generations, Las Vegas, NV, 2010, pp. 1255-1256.
  12. Q. Reul, G. Zhao, “Enabling Access to Web Resources through SecPODE-Based Annotations”, in Proceedings of the 6th International Workshop on Semantic Web and Web Semantics, Crete, Greece, 2010, pp. 596-605.
  13. D. W. Chadwick, G. Inman and P. Coxwell, “CardSpace in the cloud”, in Proceedings of the 17th ACM conference on Computer and communications security, New York, NY, 2010, pp. 657-659.
  14. A. Bertolino, F. Lonetti and E. Marchetti, “Systematic XACML Request Generation for Testing Purposes”, in Proc. of EUROMICRO Conference on Software Engineering and Advanced Applications, Lille, France, 2010, pp. 3-11.