pubs.bib

@COMMENT{{{ ** Nathan Dimmock's Publications **
           ** $Id: pubs.bib,v 1.7 2005/04/22 15:23:56 ned21 Exp $ **
bibtex2html -r -d -nokeys -dl -s webbib -t "Nathan Dimmock's Publications" -css lab.css --footer "`date`" pubs.bib
}}

@MISC{gossip:01,
  AUTHOR = {Nathan Dimmock},
  TITLE = {A Distributed Instant Messaging Server},
  HOWPUBLISHED = {Dissertation for Part II of the University of
                  Cambridge Computer Science Tripos },
  MONTH = {June},
  URL = {http://www-jcsu.jesus.cam.ac.uk/~ned21/gossip/},
  YEAR = 2001
}

@INPROCEEDINGS{percom:2003,
  AUTHOR = {Brian Shand and Nathan Dimmock and Jean Bacon},
  TITLE = {Trust for Transparent, Ubiquitous Collaboration},
  BOOKTITLE = {First IEEE Annual Conference on Pervasive Computing
                  and Communications (PerCom 2003)},
  PAGES = {153--160},
  YEAR = 2003,
  MONTH = MAR,
  ADDRESS = {Dallas-Ft.~Worth, TX, USA},
  PDF = {http://www.cl.cam.ac.uk/Research/SRG/opera/publications/Papers/percom03.pdf}
}

@ARTICLE{uncertainty:2003,
  AUTHOR = {Vinny Cahill and Brian Shand and Elizabeth Gray and
                  Ciarán Bryce and Nathan Dimmock and Andrew Twigg and
                  Jean Bacon and Colin English and Waleed Wagealla and
                  Sotirios Terzis and Paddy Nicon and Giovanna di
                  Marzo Serugendo and Jean-Marc Seigneur and Marco
                  Carbone and Karl Krukow and Christian Jensen and
                  Yong Chen and Mogens Nielsen},
  TITLE = {Using Trust for Secure Collaboration in Uncertain
                  Environments},
  JOURNAL = {IEEE Pervasive Computing},
  YEAR = 2003,
  VOLUME = 2,
  NUMBER = 3,
  PAGES = {52--61},
  MONTH = {August},
  URL = {http://csdl.computer.org/comp/mags/pc/2003/03/b3052abs.htm},
  PDF = {http://csdl.computer.org/dl/mags/pc/2003/03/b3052.pdf}
}

@INPROCEEDINGS{wetice:03,
  AUTHOR = {Nathan Dimmock},
  TITLE = {How much is 'enough'? {R}isk in Trust-based Access Control},
  BOOKTITLE = {IEEE International Workshops on Enabling
                  Technologies: Infrastructure for Collaborative
                  Enterprises: Enterprise Security (Special Session on
                  Trust Management) },
  YEAR = 2003,
  MONTH = {June},
  PAGES = {281--282},
  PS = {http://www.cl.cam.ac.uk/Research/SRG/opera/publications/Papers/ned21-wetice03.ps}
}

@INPROCEEDINGS{tbac-sacmat04,
  AUTHOR = {Nathan Dimmock and András Belokosztolszki and David
                  Eyers and Jean Bacon and Ken Moody},
  TITLE = {Using Trust and Risk in Role-Based Access Control
                  Policies},
  BOOKTITLE = {Proceedings of Symposium on Access Control Models
                  and Technologies},
  YEAR = 2004,
  MONTH = JUN,
  PUBLISHER = {ACM},
  PAGES = {156--162},
  PDF = {http://www.cl.cam.ac.uk/Research/SRG/opera/publications/Papers/sacmat04-tbac.pdf},
  PS = {http://www.cl.cam.ac.uk/Research/SRG/opera/publications/Papers/sacmat04-tbac.ps.gz}
}

@ARTICLE{xrds-spam:04,
  AUTHOR = {Nathan Dimmock and Ian Maddison},
  TITLE = {Peer-to-Peer Collaborative Spam Detection},
  JOURNAL = {ACM Crossroads},
  VOLUME = 11,
  NUMBER = 2,
  PAGES = {17--25},
  MONTH = DEC,
  YEAR = 2004
}

@INPROCEEDINGS{pst:04,
  AUTHOR = {Jean-Marc Seigneur and Nathan Dimmock and Ciarán
                  Bryce and Christian Damsgaard Jensen},
  TITLE = {{Combating Spam with TEA, Trustworthy Email
                  Addresses}},
  BOOKTITLE = {Proceedings of the Second Annual Conference on
                  Privacy, Security and Trust (PST'04)},
  YEAR = 2004,
  PAGES = {47--58},
  ADDRESS = {Fredericton, New Brunswick, Canada},
  MONTH = OCT
}

@ARTICLE{winet:2004,
  AUTHOR = {Brian Shand and Nathan Dimmock and Jean Bacon},
  TITLE = {Trust for ubiquitous, transparent collaboration},
  JOURNAL = {Wireless Networks},
  VOLUME = 10,
  NUMBER = 6,
  YEAR = 2004,
  ISSN = {1022-0038},
  PAGES = {711--721},
  URL = {http://dx.doi.org/10.1023/B:WINE.0000044030.65959.91},
  PUBLISHER = {Kluwer Academic Publishers},
  NOTE = {This is a revised and extended addition of the paper
                  that appeared at PerCom2003.},
  ADDRESS = {Hingham, MA, USA}
}

@INPROCEEDINGS{itrust:2005,
  AUTHOR = {Nathan Dimmock and Jean Bacon and David Ingram and
                  Ken Moody},
  TITLE = {Risk Models for Trust-Based Access Control {(TBAC)}},
  BOOKTITLE = {Proceedings of the Third Annual Conference on Trust
                  Management (iTrust 2005)},
  PAGES = {1--8},
  YEAR = 2005,
  VOLUME = 3477,
  SERIES = {LNCS},
  MONTH = {May},
  PUBLISHER = {Springer-Verlag},
  PS = {http://www.cl.cam.ac.uk/opera/publications/Papers/risk-tbac-itrust05.ps.gz},
  PDF = {http://www.cl.cam.ac.uk/opera/publications/Papers/risk-tbac-itrust05.pdf}
}

@INPROCEEDINGS{eval-method:2005,
  AUTHOR = {Ciarán Bryce and Nathan Dimmock and Karl Krukow and
                  Jean-Marc Seigneur and Vinny Cahill and Waleed
                  Wagella},
  TITLE = {Towards an Evaluation Methodology for Computational
                  Trust Systems},
  BOOKTITLE = {Proceedings of the Third Annual Conference on Trust
                  Management},
  PAGES = {290--305},
  YEAR = 2005,
  MONTH = MAY,
  VOLUME = {3477},
  SERIES = {LNCS}
}

@PHDTHESIS{thesis:2005,
  AUTHOR = {Nathan Dimmock},
  TITLE = {Using Trust and Risk for Access Control in Global Computing},
  SCHOOL = {University of Cambridge},
  URL = {http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-643.html},
  MONTH = APR,
  YEAR = 2005
}


This file has been generated by bibtex2html 1.75

Mon Aug 15 03:25:15 BST 2005