Follow
Charles Morisset
Charles Morisset
Senior Lecturer in Security, Newcastle University
Verified email at ncl.ac.uk - Homepage
Title
Cited by
Cited by
Year
Risk-based security decisions under uncertainty
I Molloy, L Dickens, C Morisset, PC Cheng, J Lobo, A Russo
Proceedings of the second ACM conference on Data and Application Security …, 2012
842012
PTaCL: A language for attribute-based access control in open systems
J Crampton, C Morisset
Principles of Security and Trust: First International Conference, POST 2012 …, 2012
782012
rCOS: Theory and tool for component-based model driven development
Z Liu, C Morisset, V Stolz
Fundamentals of Software Engineering: Third IPM International Conference …, 2010
522010
State based robustness testing for components
B Lei, Z Liu, C Morisset, X Li
Electronic Notes in Theoretical Computer Science 260, 173-188, 2010
372010
Robustness testing for software components
B Lei, X Li, Z Liu, C Morisset, V Stolz
Science of Computer Programming 75 (10), 879-897, 2010
362010
Formalisation and implementation of access control models
M Jaume, C Morisset
International Conference on Information Technology: Coding and Computing …, 2005
332005
A formal approach to implement access control models
M Jaume, C Morisset
Journal of Information Assurance and Security 1 (2), 137-148, 2006
312006
An auto-delegation mechanism for access control systems
J Crampton, C Morisset
Security and Trust Management: 6th International Workshop, STM 2010, Athens …, 2011
282011
Design and verification of fault-tolerant components
M Zhang, Z Liu, C Morisset, AP Ravn
Methods, models and tools for fault tolerance, 57-84, 2009
282009
Quantitative workflow resiliency
JC Mace, C Morisset, A Van Moorsel
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
262014
Quantitative access control with partially-observable markov decision processes
F Martinelli, C Morisset
Proceedings of the second ACM conference on Data and Application Security …, 2012
252012
Modelling load-changing attacks in cyber-physical systems
L Arnaboldi, RM Czekster, C Morisset, R Metere
Electronic Notes in Theoretical Computer Science 353, 39-60, 2020
232020
On missing attributes in access control: Non-deterministic and probabilistic attribute retrieval
J Crampton, C Morisset, N Zannone
Proceedings of the 20th ACM Symposium on Access Control Models and …, 2015
222015
Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging
I Yevseyeva, C Morisset, J Turland, L Coventry, T Groß, C Laing, ...
Procedia Technology 16, 508-517, 2014
222014
Towards a formal specification of access control
M Jaume, C Morisset
Proceedings of the Joint Workshop on Foundations of Computer Security and …, 2006
222006
Formal definition and comparison of access control models
L Habib, M Jaume, C Morisset
Journal of information assurance and security (JIAS) 4 (4), 372-381, 2009
212009
From qualitative to quantitative enforcement of security policy
F Martinelli, I Matteucci, C Morisset
Computer Network Security: 6th International Conference on Mathematical …, 2012
192012
Cost-aware runtime enforcement of security policies
P Drábik, F Martinelli, C Morisset
Security and Trust Management: 8th International Workshop, STM 2012, Pisa …, 2013
182013
Specification and Validation of Behavioural Protocols in the rCOS Modeler.
Z Chen, C Morisset, V Stolz
FSEN, 387-401, 2009
172009
Securing the electric vehicle charging infrastructure
R Metere, M Neaimeh, C Morisset, C Maple, X Bellekens, RM Czekster
arXiv preprint arXiv:2105.02905, 2021
162021
The system can't perform the operation now. Try again later.
Articles 1–20