Professor Jason Crampton

  1. 2017
  2. Published

    On the Satisfiability of Workflows with Release Points

    Gutin, G., Crampton, J. & Watrigant, R. 21 Jun 2017 Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    A Framework for the Cryptographic Enforcement of Information Flow Policies

    Alderman, J., Crampton, J. & Farley, N. 7 Jun 2017 Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 143-154 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Attribute Expressions, Policy Tables and Attribute-Based Access Control

    Crampton, J. & Williams, C. 7 Jun 2017 SACMAT'17 : Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. ACM Press, p. 79-90 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Cryptographic Enforcement of Information Flow Policies without Public Information via Tree Partitions

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B. 31 May 2017 In : Journal of Computer Security. p. 1-25 25 p.

    Research output: Contribution to journalArticle

  6. E-pub ahead of print

    Parameterized Resiliency Problems via Integer Linear Programming

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R. 14 Apr 2017 CIAC 2017, 10th International Conference on Algorithms and Complexity May 26, 2017 - May 28, 2017. Springer, Vol. 10236, p. 164-176 13 p. (Lecture Notes in Computer Science; vol. 10236)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. E-pub ahead of print

    Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control

    Williams, C. & Crampton, J. 22 Mar 2017 7th ACM Conference on Data and Application Security and Privacy. ACM Press, p. 47-58 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    The bi-objective workflow satisfiability problem and workflow resiliency

    Crampton, J., Gutin, G., Karapetyan, D. & Watrigant, R. 16 Mar 2017 In : Journal of Computer Security. 25, p. 83-115 33 p.

    Research output: Contribution to journalArticle

  9. 2016
  10. Published

    On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations

    Crampton, J., Gagarin, A., Gutin, G., Jones, M. & Wahlstrom, M. 1 Dec 2016 In : ACM Transactions on Privacy and Security. 19, 3, p. 1-29 29 p.

    Research output: Contribution to journalArticle

  11. Published

    Inter-ReBAC: Inter-operation of Relationship-based Access Control Model Instances

    Crampton, J. & Sellwood, J. 2 Jul 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9766, p. 96-105 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Algorithms for the workflow satisfiability problem engineered for counting constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M. 1 Jul 2016 In : Journal of Combinatorial Optimization. 32, 1, p. 3–24 22 p.

    Research output: Contribution to journalArticle

  13. Published

    On Completeness in Languages for Attribute-base Access Control

    Crampton, J. & Williams, C. 6 Jun 2016 SACMAT'16 : Proceedings of the 21st ACM Symposium on Access Control Models and Technologies. New York: ACM Press, p. 149-160 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    ARPPM: Administration in the RPPM model

    Crampton, J. & Sellwood, J. 9 Mar 2016 CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. ACM, p. 219-230 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Hybrid Publicly Verifiable Computation

    Alderman, J., Janson, C., Crampton, J. & Cid, C. 2 Feb 2016 Topics in Cryptology - CT-RSA 2016. Sako, K. (ed.). Springer, Vol. 9610, p. 147-163 17 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    A Multivariate Approach for Checking Resiliency in Access Control

    Crampton, J., Gutin, G. & Watrigant, R. 2016 Proceedings of AAIM 2016. Springer-Verlag, (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. Published

    Cryptographic Tools for Cloud Environments

    Alderman, J., Crampton, J. & Martin, K. 2016 Guide to Security Assurance for Cloud Computing. Zhu, S. Y., Hill, R. & Trovati, M. (eds.). Springer, Vol. Guide to Security Assurance for Cloud Computing

    Research output: Chapter in Book/Report/Conference proceedingChapter

  18. Forthcoming

    Resiliency Policies in Access Control Revisited

    Crampton, J., Gutin, G. & Watrigant, R. 2016 Proceedings of 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016). ACM

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. 2015
  20. Published

    Obligations in PTaCL

    Williams, C. & Crampton, J. 22 Sep 2015 Security and Trust Management. Springer, Vol. 9331, p. 220 235 p. (Lecture Notes in Computer Science; vol. 9331)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Published

    Relationship-based Access Control for an Open-source Medical Records System

    Rizvi, S. Z. R., Fong, P. W. L., Crampton, J. & Sellwood, J. 1 Jun 2015 Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. ACM, Vol. 2015-June, p. 113-124 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Relationships, Paths and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J. 29 May 2015 In : ArXiv.org.

    Research output: Contribution to journalArticle

  23. Published

    Access Control in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J. 2015 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2015. ACM, p. 657-662

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Forthcoming

    Cryptographic Enforcement of Information Flow Policies without Public Information

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B. 2015 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Forthcoming

    On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval

    Crampton, J., Morisset, C. & Zannone, N. 2015 20th ACM Symposium on Access Control Models and Technologies. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Forthcoming

    On the Workflow Satisfiability Problem with Class-Independent Constraints

    Crampton, J., Gagarin, A., Gutin, G. & Jones, M. 2015 10th International Symposium on Parameterized and Exact Computation. Schloss Dagstuhl –Leibniz Center for Informatics, (LIPIcs)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  27. Forthcoming

    Optimal Constructions for Chain-based Cryptographic Enforcement of Information Flow Policies

    Crampton, J., Farley, N., Gutin, G. & Jones, M. 2015 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy: DBSec 2015. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  28. Published

    Valued Workflow Satisfiability Problem

    Crampton, J., Gutin, G. & Karapetyan, D. 2015 20th ACM SACMAT . p. 3-13

    Research output: Chapter in Book/Report/Conference proceedingChapter

  29. 2014
  30. Published

    Attribute-Based Encryption for Access Control Using Elementary Operations

    Crampton, J. & Pinto, A. 2014 27th Computer Security Foundations Symposium. IEEE, p. 125-139

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Authorized workflow schemas: deciding realizability through $\mathsf{LTL }(\mathsf{F })$ model checking

    Crampton, J., Huth, M. & Huan-Pu Kuo, J. 2014 In : International Journal on Software Tools for Technology Transfer. 16, 1, p. 31-48

    Research output: Contribution to journalArticle

  32. Published

    Caching and Auditing in the RPPM Model

    Crampton, J. & Sellwood, J. 2014 Security and Trust Management - 10th International Workshop. p. 49-64

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M. 2014 FAW 2014. (Lecture Notes in Computer Science; vol. 8497)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Iterative Plan Construction for the Workflow Satisfiability Problem

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M. 2014 In : Journal of Artificial Intelligence Research. 51, p. 555-577

    Research output: Contribution to journalArticle

  35. Published

    Monotonicity and Completeness in Attribute-Based Access Control

    Crampton, J. & Morisset, C. 2014 Security and Trust Management - 10th International Workshop. Springer, p. 33-48

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Path Conditions and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J. 2014 19th ACM Symposium on Access Control Models and Technologies. ACM, p. 187-198

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Revocation in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J. 2014 Proceedings of the 10th International Conference on Information Security and Cryptology - Inscrypt 2014. Springer, Vol. 8957, p. 51-71 (Lecture Notes in Computer Science - LNCS; vol. 8957)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. 2013
  39. Published

    Sleeping Android: The Danger of Dormant Permissions

    Sellwood, J. & Crampton, J. 8 Nov 2013 Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 55-66 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem

    Crampton, J., Gutin, G. & Yeo, A. Jun 2013 In : ACM Transactions on Information and System Security. 16, 1, 4

    Research output: Contribution to journalArticle

  41. Published

    Constraint Expressions and Workflow Satisability

    Crampton, J. & Gutin, G. 2013 18th ACM SACMAT. p. 73-84

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Fixed-Parameter Tractability of Workflow Satisability in the Presence of Seniority Constraints

    Crampton, J., Crowston, R., Gutin, G., Jones, M. & Ramanujan, M. S. 2013 FAW-AAIM 2013: Lecture Notes in Computer Science. Vol. 7924, p. 198-209

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. 2012
  44. Published

    On the parameterized complexity of the workflow satisfiability problem

    Crampton, J., Gutin, G. & Yeo, A. 2012 CCS '12 Proceedings of the 2012 ACM conference on Computer and communications security. New York: ACM, p. 857-868

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    PTaCL: A Language for Attribute-Based Access Control in Open Systems

    Crampton, J. & Morisset, C. 2012 POST 2012: Principles of Security and Trust - First International Conference. Degano, P. & Guttman, J. (eds.). Springer, p. 390-409 20 p. (Lecture Notes in Computer Science; vol. 7215)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. 2011
  47. Published

    Authorization recycling in hierarchical RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M. May 2011 In : ACM Transactions on Information and System Security. 14, 1, 29 p., 3

    Research output: Contribution to journalArticle

  48. Published

    Practical and efficient cryptographic enforcement of interval-based access control policies

    Crampton, J. May 2011 In : ACM Transactions on Information and System Security. 14, 1, 30 p., 14

    Research output: Contribution to journalArticle

  49. Published

    On the Modeling and Verification of Security-Aware and Process-Aware Information Systems

    Crampton, J. & Huth, M. 2011 Proceedings of the 2011 BPM Workshop on Workflow Security Audit and Certification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Risk-Aware Role-Based Access Control

    Chen, L. & Crampton, J. 2011 Proceedings of the 7th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published
  52. Published

    Synthesizing and Verifying Plans for Constrained Workflows: Transferring Tools from Formal Methods

    Crampton, J. & Huth, M. 2011 Proceedings of the 2011 Workshop on Verification and Validation of Planning and Scheduling Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Time-Storage Trade-Offs for Cryptographically-Enforced Access Control

    Crampton, J. 2011 ESORICS: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Atluri, V. & Diaz, C. (eds.). Springer, Vol. LNCS 6879, p. 245-261 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published
  55. Published

    User-friendly and certificate-free grid security infrastructure

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G. 2011 In : International Journal of Information Security. 10, 3, p. 137-153 17 p.

    Research output: Contribution to journalArticle

  56. 2010
  57. Published

    An authorization framework resilient to policy evaluation failures

    Crampton, J. & Huth, M. 2010 Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010: Proceedings. Springer, p. 472-487 16 p. (Lecture Notes in Computer Science; vol. 6345)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    An Auto-Delegation Mechanism for Access Control Systems

    Crampton, J. & Morisset, C. 2010 Proceedings of 6th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Constructing Key Assignment Schemes from Chain Partitions

    Crampton, J., Daud, R., Martin, K. M., Foresti, S. (ed.) & Jajodia, S. (ed.) 2010 Data and Applications Security and Privacy XXIV. Springer, Vol. 6166, p. 130-145 16 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Cryptographic Enforcement of Role-Based Access Control

    Crampton, J. 2010 Proceedings of 7th International Workshop on Formal Aspects of Security and Trust. Springer, p. 191-205 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Towards an Access-Control Framework for Countering Insider Threats

    Crampton, J. & Huth, M. 2010 Insider Threats in Cyber Security and Beyond. Bishop, M., Gollmann, D., Hunker, J. & Probst, C. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingChapter

  62. 2009
  63. Published

    A Framework for Enforcing Constrained RBAC Policies

    Crampton, J. & Khambhammettu, H. 2009 Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society Press, p. 195--200

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    An Access Control Framework for WS-BPEL Processes

    Paci, F., Bertino, E. & Crampton, J. 2009 Web Services Research for Emerging Applications: Discoveries and Trends. Zhang, L-J. (ed.). Information Science Reference, p. 492-515 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  65. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J. 2009 In : Journal of Logic and Algebraic Programming. 78, 8, p. 690-700 11 p.

    Research output: Contribution to journalArticle

  66. Published

    Detecting and Countering Insider Threats: Can Policy-Based Access Control Help?

    Crampton, J. & Huth, M. 2009 Proceedings of 5th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Set cover problems in role-based access control

    Chen, L. & Crampton, J. 2009 Proceedings of 14th European Symposium on Research in Computer Security. Springer, p. 689-704 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Trade-offs in cryptographic implementations of temporal access control

    Crampton, J. 2009 Proceedings of 14th Nordic Workshop on Secure IT Systems. Springer, p. 72-87 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. 2008
  70. Published

    An Access-Control Framework for WS-BPEL

    Paci, F., Bertino, E. & Crampton, J. 2008 In : International Journal of Web Services Research. 5, 3, p. 20-43 24 p.

    Research output: Contribution to journalArticle

  71. Published

    Authorization recycling in RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M. 2008 Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 63-72 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Delegation and satisfiability in workflow systems

    Crampton, J. & Khambhammettu, H. 2008 Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 31-40 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Delegation in role-based access control

    Crampton, J. & Khambhammettu, H. 2008 In : International Journal of Information Security. 7, 2, p. 123-136 14 p.

    Research output: Contribution to journalArticle

  74. Published

    On delegation and workflow execution models

    Crampton, J. & Khambhammettu, H. 2008 Proceedings of the 2008 ACM Symposium on Applied Computing. ACM Press, p. 2137-2144 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    On spatio-temporal constraints and inheritance in role-based access control

    Chen, L. & Crampton, J. 2008 Proceedings of ACM Symposium on Information, Computer and Communications Security. ACM Press, p. 205-216 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    RBAC administration in distributed systems

    Dekker, M., Crampton, J. & Etalle, S. 2008 Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 93--102 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Role signatures for access control in open distributed systems

    Crampton, J. & Lim, H. W. 2008 Proceedings of IFIP TC-11 23rd International Information Security Conference. Springer, p. 205-220 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Why we should take a second look at access control in Unix

    Crampton, J. 2008 Proceedings of 13th Nordic Workshop on Secure IT Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. 2007
  80. Published

    A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G. 2007 6th Annual PKI R&D Workshop 2007, Gaithersburg, MD, USA. 17-19 April.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  81. Published

    An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data

    Swift, S., Tucker, A., Crampton, J. & Garway-Heath, D. 2007 Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 2174-2181 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Applications of the oriented permission role-based access control model

    Crampton, J. & Chen, L. 2007 Proceedings of the 26th IEEE International Performance Computing and Communications Conference. IEEE Computer Society Press, p. 387-394 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Avoiding key redistribution in key assignment schemes

    Rowe, H. & Crampton, J. 2007 Proceedings of the Fourth International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. p. 127-140 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J. 2007 Proceedings of the 12th Nordic Workshop on Secure IT Systems. p. 49-60 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Efficiency updates for the restricted growth function GA for grouping problems

    Tucker, A., Swift, S. & Crampton, J. 2007 Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 1536 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Extended privilege inheritance in RBAC

    Dekker, M., Cederquist, J. G., Crampton, J. & Etalle, S. 2007 Proceedings of 2007 ACM Symposium on Information, Computer and Communications Security. Bao, F. & Miller, S. (eds.). ACM Press, p. 383-385 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Inter-domain role mapping and least privilege

    Chen, L. & Crampton, J. 2007 Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 157-162 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Security for distributed systems: Foundations of access control

    Bertino, E. & Crampton, J. 2007 Information Assurance: Survivability and Security in Networked Systems. Qian, Y., Tipper, D., Krishnamurthy, P. & Joshi, J. (eds.). Morgan Kaufman, p. 39-80 42 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  89. Published

    The monitorability of service-level agreements for application-service provision

    Skene, J., Skene, A., Crampton, J. & Emmerich, W. 2007 Proceedings of the 6th International Workshop on Software and Performance. Cortellessa, V., Uchitel, S. & Yankelevich, D. (eds.). ACM Press, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    What Can Identity-Based Cryptography Offer to Web Services?

    Crampton, J., Lim, H. W. & Paterson, K. G. 2007 Proceedings of the 5th ACM Workshop on Secure Web Services (SWS 2007), Alexandria, Virginia, USA.. ACM Press, p. 26-36 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  91. 2006
  92. Published

    Access control and authorization constraints for WS-BPEL

    Bertino, E., Crampton, J. & Paci, F. 2006 Proceedings of IEEE International Conference on Web Services. IEEE Computer Society Press, p. 275-284 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Applying hierarchical and role-based access control to XML documents

    Crampton, J. 2006 In : Computer Science and System Engineering. 21, 5, p. 325-338 14 p.

    Research output: Contribution to journalArticle

  94. Published

    Delegation in role-based access control

    Crampton, J. & Khambhammettu, H. 2006 Proceedings of 11th European Symposium on Research in Computer Security. Springer, p. 174-191 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Discretionary and Mandatory Control for Role-Based Administration

    Crampton, J. 2006 Data Applications and Security XX. Damiani, E. & Liu, P. (eds.). Springer, p. 194-208 15 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Information Security

    Crampton, J., Paterson, K. G., Piper, F. & Robshaw, M. J. B. 2006 Handbook of Security. Gill, M. (ed.). Palgrave Macmillan, p. 358-379 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  97. Published

    On Key Assignment for Hierarchical Access Control

    Crampton, J., Martin, K. M. & Wild, P. 2006 Proceedings of 19th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, p. 98-111 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    The interpretation and utility of three cohesion metrics for object-oriented design

    Counsell, S., Swift, S. & Crampton, J. 2006 In : ACM Transactions on Software Engineering and Methodology. 15, 2, p. 123-149 27 p.

    Research output: Contribution to journalArticle

  99. Published

    The secondary and approximate authorization model and its application to Bell-LaPadula policies

    Crampton, J., Leung, W. & Beznosov, K. 2006 Proceedings of the 11th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 111-120 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. 2005
  101. Published

    A reference monitor for workflow systems with constrained task execution

    Crampton, J. 2005 Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 38-47 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Data Structures for Constraint Enforcement in Role-Based Systems

    Crampton, J. & Khambhammettu, H. 2005 Proceedings of the 2005 IASTED Conference on Network and Information Security. p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. Published

    ICARUS: Intelligent Coupon Allocation for Retailers Using Search

    Swift, S., Shi, A., Crampton, J. & Tucker, A. 2005 Proceedings of 2005 IEEE Congress on Evolutionary Computation. IEEE Computer Society Press, p. 182-189 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  104. Published

    RGFGA: An efficient representation and crossover for grouping genetic algorithms

    Tucker, A., Crampton, J. & Swift, S. 2005 In : Evolutionary Computation. 13, 4, p. 477-500 24 p.

    Research output: Contribution to journalArticle

  105. Published

    Understanding and developing role-based administrative models

    Crampton, J. 2005 Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM Press, p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  106. 2004
  107. Published

    An Algebraic Approach to the Analysis of Constrained Workflow Systems

    Crampton, J. 2004 Proceedings of 3rd Workshop on Foundations of Computer Security (FCS'04). p. 61-74 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  108. Published

    Applying hierarchial and role-based access control to XML documents

    Crampton, J. 2004 Proceedings of 2004 ACM Workshop on Secure Web Services. ACM Press, p. 37-46 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Unpublished
  110. Published

    The consistency of task-based authorization constraints in workflow systems

    Tan, K., Crampton, J. & Gunter, C. 2004 Proceedings of 17th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, p. 155-169 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  111. 2003
  112. Published

    Access control in a distributed object environment using XML and roles

    Crampton, J. & Khambhammettu, H. 2003 Proceedings of 3rd Annual Information Security South Africa Conference (ISSA 2003). p. 75-88 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  113. Published

    Access control in a distributed object environment using XML and roles

    Crampton, J. & Khambhammettu, H. 2003 In : South African Computer Journal. 31, p. 2-8 7 p.

    Research output: Contribution to journalArticle

  114. Published

    Administrative Scope: A Foundation for Role-Based Administrative Models

    Crampton, J. & Loizou, G. 2003 In : ACM Transactions on Information and System Security. 6, 2, p. 201-231 31 p.

    Research output: Contribution to journalArticle

  115. Published

    Authorization and Certificates: Are We Pushing When We Should Be Pulling?

    Crampton, J. & Khambhammettu, H. 2003 Proceedings of IASTED Conference on Network and Information Security. p. 62-66 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 Next