Follow
Charles Morisset
Charles Morisset
Reader in Security, Newcastle University
Verified email at ncl.ac.uk - Homepage
Title
Cited by
Cited by
Year
Risk-based security decisions under uncertainty
I Molloy, L Dickens, C Morisset, PC Cheng, J Lobo, A Russo
Proceedings of the second ACM conference on Data and Application Security …, 2012
862012
PTaCL: A language for attribute-based access control in open systems
J Crampton, C Morisset
Principles of Security and Trust: First International Conference, POST 2012 …, 2012
802012
rCOS: Theory and tool for component-based model driven development
Z Liu, C Morisset, V Stolz
International Conference on Fundamentals of Software Engineering, 62-80, 2009
512009
Robustness testing for software components
B Lei, X Li, Z Liu, C Morisset, V Stolz
Science of Computer Programming 75 (10), 879-897, 2010
362010
State based robustness testing for components
B Lei, Z Liu, C Morisset, X Li
Electronic Notes in Theoretical Computer Science 260, 173-188, 2010
352010
Formalisation and implementation of access control models
M Jaume, C Morisset
International Conference on Information Technology: Coding and Computing …, 2005
332005
Design and verification of fault-tolerant components
M Zhang, Z Liu, C Morisset, AP Ravn
Methods, models and tools for fault tolerance, 57-84, 2009
312009
A formal approach to implement access control models
M Jaume, C Morisset
Journal of Information Assurance and Security 1 (2), 137-148, 2006
312006
Quantitative workflow resiliency
JC Mace, C Morisset, A Van Moorsel
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
282014
An auto-delegation mechanism for access control systems
J Crampton, C Morisset
International Workshop on Security and Trust Management, 1-16, 2010
282010
Modelling load-changing attacks in cyber-physical systems
L Arnaboldi, RM Czekster, C Morisset, R Metere
Electronic Notes in Theoretical Computer Science 353, 39-60, 2020
272020
Securing the electric vehicle charging infrastructure
R Metere, M Neaimeh, C Morisset, C Maple, X Bellekens, RM Czekster
arXiv preprint arXiv:2105.02905, 2021
262021
Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging
I Yevseyeva, C Morisset, J Turland, L Coventry, T Groß, C Laing, ...
Procedia Technology 16, 508-517, 2014
252014
Quantitative access control with partially-observable markov decision processes
F Martinelli, C Morisset
Proceedings of the second ACM conference on Data and Application Security …, 2012
242012
On missing attributes in access control: Non-deterministic and probabilistic attribute retrieval
J Crampton, C Morisset, N Zannone
Proceedings of the 20th ACM Symposium on Access Control Models and …, 2015
222015
Towards a formal specification of access control
M Jaume, C Morisset
Proceedings of the Joint Workshop on Foundations of Computer Security and …, 2006
222006
Formal definition and comparison of access control models
L Habib, M Jaume, C Morisset
Journal of information assurance and security (JIAS) 4 (4), 372-381, 2009
212009
Adversarial machine learning in network intrusion detection domain: A systematic review
HA Alatwi, C Morisset
arXiv preprint arXiv:2112.03315, 2021
202021
From qualitative to quantitative enforcement of security policy
F Martinelli, I Matteucci, C Morisset
Computer Network Security: 6th International Conference on Mathematical …, 2012
192012
Cost-aware runtime enforcement of security policies
P Drábik, F Martinelli, C Morisset
International Workshop on Security and Trust Management, 1-16, 2012
182012
The system can't perform the operation now. Try again later.
Articles 1–20