近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
Schreuders, Z., McGill, T., Payne, C., (2013), The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls, Computers & Security, 32, , pages 219 - 241.
Schreuders, Z., Payne, C., McGill, T., (2013), The functionality-based application confinement model, International Journal of Information Security, 12, 5, pages 393 - 422.
Schreuders, Z., McGill, T., Payne, C., (2012), Towards usable application-oriented access controls: Qualitative results from a usability study of SELinux, AppArmor and FBAC-LSM., International Journal of Information Security and Privacy, 6, 1, pages 57 - 76.
Schreuders, Z., McGill, T., Payne, C., (2011), Empowering end users to confine their own applications: The results of a usability study comparing SELinux, AppArmor, and FBAC-LSM, ACM Transactions on Information and System Security, 14, 2, pages 1 - 28.
Payne, C., (2002), On the security of open source software, Information systems journal, 12, , pages 61 - 78.
Schreuders, Z., Payne, C., McGill, T., (2011),Techniques for automating policy specification for application-oriented access controls,In: 6th International Conference on Availability, Reliability and Security (ARES) (2011).
Schreuders, Z., Payne, C., McGill, T., (2011),A policy language for abstraction and automation in application-oriented access controls: The functionality-based application confinement policy language,In: 2011 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY) (2011).
Schreuders, Z., Payne, C., (2008),Functionality-Based Application Confinement: Parameterised Hierarchical Application Restrictions,In: International Conference on Security and Cryptography (SECRYPT) (2008).
Payne, C., (2007),An Improved Model for Secure Cryptographic Integrity Verification of Local Code,In: International Conference on Security and Cryptography (SECRYPT) (2007).
Payne, C., (2007),A Cryptographic Access Control Architecture Secure against Privileged Attackers,In: 1st Computer Security Architecture Workshop (2007).
Payne, C., (2004),Enhanced Security Models for Operating Systems: A Cryptographic Approach,In: 28th Annual International Computer Software and Applications Conference (COMPSAC) (2004).
Payne, C., (2000),The Role of the Development Process in Operating System Security,In: Information Security: Third International Workshop, ISW 2000.
Payne, C., (2000),Format String Vulnerabilities and their Implications for Secure Systems,In: Proceedings of WAWISR 2000 (CD-Rom).
McGill, T., Payne, C., Bennett, D., Carter, K., Chong, A., Hornby, G., Lim, L., (2000),System Quality, User Satisfaction and End User Development,In: 11th Australasian Conference on Information Systems (ACIS) (2000).
C. Payne, “Establishing terms in contracts formed by electronic agents in online stores”, Computers & Law Journal (Under Review).
Z. C. Schreuders, C. Payne, T. McGill, “The functionality-based application confinement model”, International Journal of Information Security, Vol. 12, Issue 5, 2013.
Z. C. Schreuders, T. McGill, and C. Payne, “Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC LSM”, International Journal of Information Security and Privacy, Vol. 6, Issue 1, 2012.
Z. C. Schreuders, T. McGill, and C. Payne, “ Empowering End Users to Confine Their Own Applications: the Results of a Usability Study Comparing SELinux, AppArmor and FBAC LSM”, ACM Transactions on Information and System Security, Vol. 14, Issue 2, 2011.
C. Payne, “On the Security of Open Source Software”, Information Systems Journal, 2002.
Z. C. Schreuders, C. Payne, and T. McGill, “Techniques for Automating Policy Specification for Application-Oriented Access Controls”, in Proceedings of 6th International Conference on Availability, Reliability and Security (ARES 2011), IEEE Computer Society, 2011.