Author: Ian Oliver

5G: Security and Privacy

5G: Security and Privacy

An overview of security and privacy considerations in 5G te...

INFORMATION SPACES AS A BASIS FOR PERSONALISING THE SEMANTIC WEB

INFORMATION SPACES AS A BASIS FOR PERSONALISING THE SEMANTIC WEB

The future of the Semantic Web lies not in the ubiquity, ad...


Towards the Dynamic Semantic Web

Towards the Dynamic Semantic Web

We discuss future trends from the current state of the web...


The 1st IEEE International Workshop on 5G Security (IW5GS)

The 1st IEEE International Workshop on 5G Security (IW5GS)

The 1st IEEE International Workshop on 5G Security held in...


Surgical privacy: Information Handling in an Infectious Environment

Surgical privacy: Information Handling in an Infectious Environment

What has privacy engineering, data flow modelling and analy...


Simulation of Object Oriented Models using Animation

Simulation of Object Oriented Models using Animation

Using animation of formal specifications is a very useful t...


Sedvice: Triple-Space Computing Exploration Platform

Sedvice: Triple-Space Computing Exploration Platform

We describe a platform for exploring the notions of triple-...


Privacy Engineering Tutorial (TrustCom2015)

Privacy Engineering Tutorial (TrustCom2015)

Privacy Engineering Tutorial Slides from TrustCom 2015 in H...


Privacy Engineering Tutorial Programme @ TrustCom 2015

Privacy Engineering Tutorial Programme @ TrustCom 2015

Privacy Engineering Tutorial Session held in conjunction wi...


Privacy Engineering: A Data flow and Ontological Approach

Privacy Engineering: A Data flow and Ontological Approach

Information privacy is the major defining issue of today's...


Privacy Engineering Tutorial (TrustCom2015) - Opening Slides

Privacy Engineering Tutorial (TrustCom2015) - Opening Slides

Running Order 10h05-11h50 The Privacy Engineer’s Manifesto...


Privacy as a Safety Critical Concept

Privacy as a Safety Critical Concept

Privacy’s place in software engineering development is tent...


Utilisation of Homomorphic Encryption in Privacy Preserving Databases

Utilisation of Homomorphic Encryption in Privacy Preserving Databases

The goal of having a privacy preserving database, which sup...


M3 Information SmartSpaces Technology Overview

M3 Information SmartSpaces Technology Overview

This book contains a cross-section of work made during the...


Cross-Domain Interoperability: a Case Study

Cross-Domain Interoperability: a Case Study

We describe a case study of the behaviour of four agents us...


Introduction to Privacy and Privacy Engineering

Introduction to Privacy and Privacy Engineering

Lecture slides on Privacy Engineering from the EIT Summer S...


Integration "In The Large"

Integration "In The Large"

The original goals of the Semantic Web and in some degree a...


A UML Profile for Real-Time System Modelling with Rate Monotonic Analysis

A UML Profile for Real-Time System Modelling with Rate Monotonic Analysis

A UML profile for mapping models of real-time systems into...


Formal Methods in Conventional Software Development Environments

Formal Methods in Conventional Software Development Environments

Presentation from BCS FACS Workshop 17 December 2007. This...


Experiences of Formal Methods in `Conventional' Software and Systems Design

Experiences of Formal Methods in `Conventional' Software and Systems Design

We describe the results of the use of formal methods integr...


Design and Validation of a Distributed ComputationEnvironment for Mobile Devices

Design and Validation of a Distributed Computation Environment for Mobile Devices

Development of complex software systems is known to be dif...


Engineering Privacy Engineering

Engineering Privacy Engineering

One of the many challenges of privacy is that it has not su...


Data and Computation Interoperability in Internet Services

Data and Computation Interoperability in Internet Services

The rapid shift of technology towards cloud computing requi...