Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Shamal Faily
2010 – today
- 2013
[c22]Shamal Faily, Lizzie Coles-Kemp, Paul Dunphy, Mike Just, Yoko Akama, Alexander De Luca: Designing interactive secure system: chi 2013 special interest group. CHI Extended Abstracts 2013: 2469-2472
[c21]
[c20]John Lyle, Claes Nilsson, Anders Isberg, Shamal Faily: Extending the web to support personal network services. SAC 2013: 711-716
[c19]Shamal Faily, David Power, Philip Armstrong, Ivan Flechais: Formal Evaluation of Persona Trustworthiness with EUSTACE - (Extended Abstract). TRUST 2013: 267-268
[e1]John Lyle, Shamal Faily, Marcel Winandy (Eds.): Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), Co-located with the 6th International Conference on Trust and Trustworthy Computing (TRUST 2013), London, United Kingdom, June 20, 2013. CEUR Workshop Proceedings 1011, CEUR-WS.org 2013- 2012
[c18]John Lyle, Shamal Faily, Ivan Flechais, André Paul, Ayse Göker, Hans I. Myrhaug, Heiko Desruelle, Andrew Martin: On the Design and Development of webinos: A Distributed Mobile Application Middleware. DAIS 2012: 140-147
[c17]John Lyle, Andrew J. Paverd, Justin King-Lacroix, Andrea S. Atzeni, Habib Virji, Ivan Flechais, Shamal Faily: Personal PKI for the Smart Device Era. EuroPKI 2012: 69-84
[c16]Shamal Faily, John Lyle, André Paul, Andrea S. Atzeni, Dieter Blomme, Heiko Desruelle, Krishna Bangalore: Requirements Sensemaking Using Concept Maps. HCSE 2012: 217-232
[c15]Shamal Faily, John Lyle, Cornelius Namiluko, Andrea S. Atzeni, Cesare Cameroni: Model-driven architectural risk analysis using architectural and contextualised attack patterns. MDsec 2012: 3
[c14]John Lyle, Salvatore Monteleone, Shamal Faily, Davide Patti, Fabio Ricciato: Cross-Platform Access Control for Mobile Web Applications. POLICY 2012: 37-44
[c13]Christian Fuhrhop, John Lyle, Shamal Faily: The webinos project. WWW (Companion Volume) 2012: 259-262- 2011
[j3]Shamal Faily, Ivan Flechais: Eliciting Policy Requirements for Critical National Infrastructure Using the IRIS Framework. IJSSE 2(4): 1-18 (2011)
[c12]Shamal Faily, Ivan Flechais: User-Centered Information Security Policy Development in a Post-Stuxnet World. ARES 2011: 716-721
[c11]Andrea S. Atzeni, Cesare Cameroni, Shamal Faily, John Lyle, Ivan Flechais: Here's Johnny: A Methodology for Developing Attacker Personas. ARES 2011: 722-727
[c10]
[c9]Shamal Faily: Bridging User-Centered Design and Requirements Engineering with GRL and Persona Cases. iStar 2011: 114-119
[c8]Shamal Faily, Ivan Flechais: Eliciting usable security requirements with misusability cases. RE 2011: 339-340- 2010
[j2]Shamal Faily, Ivan Flechais: Towards Tool-Support for Usable Secure Requirements Engineering with CAIRIS. IJSSE 1(3): 56-70 (2010)
[j1]Shamal Faily, Ivan Flechais: Designing and Aligning e-Science Security Culture with Design. Inf. Manag. Comput. Security 18(5): 339-349 (2010)
[c7]Shamal Faily, Ivan Flechais: Analysing and Visualising Security and Usability in IRIS. ARES 2010: 543-548
[c6]Shamal Faily, Ivan Flechais: Barry is not the weakest link: eliciting secure system requirements with personas. BCS HCI 2010: 124-132
[c5]
[c4]Shamal Faily, Ivan Flechais: The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design. HCSE 2010: 111-118
[c3]Shamal Faily, Ivan Flechais: To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. NSPW 2010: 73-84
2000 – 2009
- 2009
[c2]Shamal Faily, Ivan Flechais: Context-Sensitive Requirements and Risk Management with IRIS. RE 2009: 379-380- 2008
[c1]Shamal Faily: Towards Requirements Engineering Practice for Professional End User Developers: A Case Study. REET 2008: 38-44
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:00 CEST by the dblp team



