Toggle Main Menu Toggle Search

Open Access padlockePrints

Browsing publications by Dr Simon Parkin

Newcastle AuthorsTitleYearFull text
Dr Simon Parkin
Professor Graham Morgan
Toward reusable SLA monitoring capabilities2012
Dr Simon Parkin
Professor Aad van Moorsel
Cooperative Information Security Knowledge: Content Validation and incentives to contribute2011
Dr John Mace
Dr Simon Parkin
Professor Aad van Moorsel
A Collaborative Ontology Development Tool for Information Security Managers2010
Dr Simon Parkin
Professor Aad van Moorsel
A Stealth Approach to Usable Security: Helping IT Security Managers to Identify Workable Security Solutions2010
Dr Simon Parkin
Professor Aad van Moorsel
A stealth approach to usable security: helping IT security managers to identify workable security solutions2010
Daria Stepanova
Dr Simon Parkin
Professor Aad van Moorsel
A Knowledge Base for Justified Information Security Decision-Making2009
Daria Stepanova
Dr Simon Parkin
Professor Aad van Moorsel
A Knowledge Base for Justified Information Security Decision-Making2009
Dr Simon Parkin
Professor Aad van Moorsel
An Information Security Ontology Incorporating Human-Behavioral Implications2009
Dr Simon Parkin
Professor Aad van Moorsel
An Information Security Ontology Incorporating Human-Behavioural Implications2009
Maciej Machulak
Dr Simon Parkin
Professor Aad van Moorsel
Architecting Dependable Access Control Systems for Multi Domain Computing Environments2009
Maciej Machulak
Dr Simon Parkin
Professor Aad van Moorsel
Architecting dependable access control systems for multi-domain computing environments2009
Dr John Mace
Dr Simon Parkin
Professor Aad van Moorsel
Ontology Editing Tool for Information Security and Human Factors Experts2009
Maciej Machulak
Dr Simon Parkin
Professor Aad van Moorsel
Proceedings of the First Trust Economics Workshop2009
Dr Simon Parkin
Professor Aad van Moorsel
Risk Modelling of Access Control Policies with Human Behavioural Factors2009
Dr Simon Parkin
Rouaa Yassin Kassab
Professor Aad van Moorsel
The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies2008
12