%% Generated by http://bibtexml.sf.net/ %% output encoding is UTF-8, you need to %% -- escape reserved latex characters %% -- convert non-ascii characters to latex control sequences %% see http://www.bitjungle.com/~isoent/ %% -- to do this use the _____ program @inproceedings{querciastrudel06, author = {Daniele Quercia and Manish Lad and Stephen Hailes and Licia Capra and Saleem Bhatti}, title = {STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions}, booktitle = {Proceedings of the 21st ACM Symposium on Applied Computing}year = {2006}, month = {April}, pages = {1870-1874}, address = {Dijon, France}, theme = {security}, url = {http://www.cs.ucl.ac.uk/staff/d.quercia/publications/querciaSTRUDEL06.pdf}, } @inproceedings{querciaTATA06, author = {Daniele Quercia and Stephen Hailes and Licia Capra}, title = {TATA: Towards Anonymous Trusted Authentication}, booktitle = {Proceedings of the 4th International Conference on Trust Management. LNCS}year = {2006}, month = {May}, pages = {313-323}, address = {Pisa, Italy}, theme = {security}, url = {http://www.cs.ucl.ac.uk/staff/d.quercia/publications/querciaTATA06.pdf}, } @inproceedings{querciaB-trust06, author = {Daniele Quercia and Stephen Hailes and Licia Capra}, title = {B-trust: Bayesian Trust Framework for Pervasive Computing}, booktitle = {Proceedings of the 4th International Conference on Trust Management. LNCS}year = {2006}, month = {May}, pages = {298-312}, address = {Pisa, Italy}, theme = {security}, url = {http://www.cs.ucl.ac.uk/staff/d.quercia/publications/querciaB-trust06.pdf}, } @inproceedings{querciamotet05, author = {Quercia Daniele and Stephen Hailes}, title = {MOTET: Mobile Transactions using Electronic Tickets}, booktitle = {Proceedings of the 1st IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks}, year = {2005}, month = {September}, pages = {374-383}, publisher = {}, address = {Athens, Greece}, theme = {security,URL = {http://www.cs.ucl.ac.uk/staff/d.quercia/publications/querciaMOTET05.pdf}, } @article{quercia06survivable, author = {Daniele Quercia and Manish Lad and Stephen Hailes and Licia Capra and Saleem Bhatti}, year = {2006}, title = {Survivable Wireless Networking: Autonomic Bandwidth Sharing in Mesh Networks}, journal = {BT Technology Journal. Kluwer.}, volume = {24}, month = {July}, pages = {99-107}, theme = {security}, url = {http://www.cs.ucl.ac.uk/staff/d.quercia/publications/quercia06survivable.pdf}, number = {3}, } @inproceedings{ahmedstatistical05, author = {Mohamed Ahmed and Quercia Daniele and Stephen Hailes}, title = {A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations}, booktitle = {Proceedings of the 1st IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing}, year = {2005}, month = {June}, pages = {}, address = {Athens, Greece}, theme = {security}, url = {http://www.cs.ucl.ac.uk/staff/d.quercia/publications/querciaSTATISTICAL05.pdf}, } @article{quercia07mate, author = {Daniele Quercia and Stephen Hailes}, title = {MATE: Mobility and Adaptation with Trust and Expected-utility}, year = {2007}, journal = {International Journal Internet Technology and Secured Transactions (IJITST)}, volume = {1}, month = {}, pages = {}, theme = {security}, url = {http://www.cs.ucl.ac.uk/staff/d.quercia/publications/quercia06mate.pdf}, } @inproceedings{querciarisk05, author = {Quercia Daniele and Stephen Hailes}, title = {Risk Aware Decision Framework for Trusted Mobile Interactions}, booktitle = {Proceedings of the 1st IEEE/CreateNet SECOVAL Workshop on the Value of Security through Collaboration}, year = {2005}, month = {September}, pages = {}, address = {Athens, Greece}, theme = {security}, url = {http://www.cs.ucl.ac.uk/staff/d.quercia/publications/querciaRISK05.pdf}, } @inproceedings{cap07, author = {L. Capra}, title = {MaLM: Machine Learning Middleware to Tackle Ontology Heterogeneity}, booktitle = {4th Intl. Workshop on Middleware Support for Pervasive Computing (co-located with PerCom 2007)}, year = {2007}, month = {MAR}, address = {New York, USA}, theme = {middleware}, } @inproceedings{mmc06, author = {L. McNamara and C. Mascolo and L. Capra}, title = {Trust and Mobility aware Service Provision for Pervasive Computing}, booktitle = {Int. Workshop on Requirements and Solutions for Pervasive Software Infrastructures (co-located with Pervasive 2006)}, year = {2006}, month = {MAY}, address = {Dublin, Ireland}, url = {http://www.cs.ucl.ac.uk/staff/l.capra/publications/trustmob.pdf}, theme = {middleware}, } @inproceedings{Cap06, author = {L. Capra}, title = {Reasoning about Trust Groups to Coordinate Mobile Ad-Hoc Systems}, booktitle = {Proc. of the 1st IEEE Workshop on the Value of Security Through Collaboration, in conjunction with IEEE/CreateNet SecureComm 2005}, year = {2005}, month = {September}, address = {Athens, Greece}, url = {http://www.cs.ucl.ac.uk/staff/l.capra/publications/secoval05.pdf}, theme = {security}, } @inproceedings{CapMus06:Autonomic, author = {L. Capra and M. Musolesi}, booktitle = {IEEE Workshop on Trusted and Autonomic ComputingSystems 2006 (TACS '06)}, title = {Autonomic Trust Prediction for Pervasive Systems}, address = {Vienna, Austria}, month = {APR}, pages = {481-488}, year = {2006}, publisher = {IEEE Computer Society Press}, url = {http://dx.doi.org/10.1109/AINA.2006.113}, theme = {security}, } @inproceedings{MMB06:Data, author = {C. Mascolo and M. Musolesi and B. Pastzor}, title = {Demo Abstract: Data Collection in Delay Tolerant Mobile Sensor Networks using SCAR}, booktitle = {Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems (SenSys 2006)}, location = {Boulder, CO, USA}, month = {NOV}, year = {2006}, publisher = {ACM Press}, url = {http://www.cs.ucl.ac.uk/staff/m.musolesi/papers/Sensys06.pdf}, theme = {sensor}, } @inproceedings{MM06:Controlled, author = {M. Musolesi and C. Mascolo}, title = {Controlled Epidemic-style Dissemination Middleware for Mobile Ad Hoc Networks}, booktitle = {Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networks and Services (MOBIQUITOUS 2006)}, year = {2006}, month = {JUL}, publisher = {IEEE Computer Society Press}, url = {http://www.cs.ucl.ac.uk/staff/m.musolesi/papers/mobiquitous06.pdf}, theme = {middleware}, } @inproceedings{MM06:SCAR, author = {C. Mascolo and M. Musolesi}, title = {SCAR: Context-aware Adaptive Routing in DelayTolerant Mobile Sensor Networks}, booktitle = {Proceedings of the Delay Tolerant NetworksSymposium. ACM International Wireless Communications and Mobile Computing Conference (IWCMC) 2006}, month = {JUN}, year = {2006}, pages = {533-538}, location = {Vancouver, Canada}, publisher = {ACM Press}, url = {http://dx.doi.org/10.1145/1143549.1143656}, theme = {sensor}, } @inproceedings{MM06:Predictability, author = {M. Musolesi and C. Mascolo}, booktitle = {Proceedings of 2nd IEEE Workshop on AutonomicCommunications and Computing (ACC'06). Co-located with 7th IEEE Int.Symp. WoWMoM'06}, title = {Evaluating Context Information Predictability forAutonomic Communication}, address = {Niagara Falls, NY}, month = {JUN}, pages = {495-499}, year = {2006}, publisher = {IEEE Computer Society Press}, url = {http://dx.doi.org/10.1109/WOWMOM.2006.41}, theme = {delay}, } @inproceedings{MM06:Community, author = {M. Musolesi and C. Mascolo}, title = {A Community based Mobility Model for Ad HocNetwork Research}, booktitle = {Proceedings of the 2nd ACM/SIGMOBILE InternationalWorkshop on Multi-hop Ad Hoc Networks: from theory to reality (REALMAN'06)}, month = {MAY}, year = {2006}, pages = {31-38}, location = {Florence, Italy}, publisher = {ACM Press}, url = {http://dx.doi.org/10.1145/1132983.1132990}, theme = {mobile}, } @inproceedings{CapMus06:Autonomic, author = {L. Capra and M. Musolesi}, booktitle = {IEEE Workshop on Trusted and Autonomic ComputingSystems 2006 (TACS '06)}, title = {Autonomic Trust Prediction for Pervasive Systems}, address = {Vienna, Austria}, month = {APR}, pages = {481-488}, year = {2006}, publisher = {IEEE Computer Society Press}, url = {http://dx.doi.org/10.1109/AINA.2006.113}, theme = {security}, } @inproceedings{MusMas06:Spatio, author = {Mirco Musolesi and Cecilia Mascolo}, booktitle = {Proceedings of 3th MiNEMA Workshop}, title = {Spatio-Temporal Communication Primitives for DelayTolerant Systems}, address = {Leuven, Belgium }, month = {FEB}, year = {2006}, url = {http://www.cs.ucl.ac.uk/staff/m.musolesi/papers/minema06.pdf}, theme = {middleware}, } @inproceedings{ZM03:Adaptable, author = {S. Zachariadis and C. Mascolo}, booktitle = {Proc. of 1st UK-UbiNet Workshop}, title = {Adaptable Mobile Applications Through SATIN: Exploiting Logical Mobility in Mobile Computing Middleware}, url = {http://www.cs.ucl.ac.uk/staff/s.zachariadis/papers/ubinet03.pdf}, year = {2003}, month = {September}, theme = {middleware}, } @article{MPR04:CodeWeave, author = {C. Mascolo and G. P. Picco and G.-C. Roman}, journal = {Journal of Automated Software Engineering (Special Issue on Mobility)}, title = {CODEWEAVE: Exploring Fine-grained Mobility of Code}, year = {2004}, volume = {11}, month = {June}Number = {3}, pages = {207-243}, theme = {formal}, } @incollection{MCE04:Principles, author = {C. Mascolo and L. Capra and W. Emmerich}, booktitle = {Middleware for Communications}, editor = {Q. Mahmoud}, publisher = {John Wiley}, title = {Principles of Mobile Computing Middleware}, year = {2004}, pages = {261-280}, url = {http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470862068.html}, theme = {middleware}, } @inproceedings{maposter, author = {C. Mascolo and W. Emmerich and A. Finkelstein}, booktitle = {Proc. of the 2nd Int. Symposium on Agent Systems and Applications and Mobile Agents (ASA/MA2000) September}, publisher = {ASA/MA}, title = {XMILE: An Incremental Code Mobility System based on XMLTechnologies}, url = {http://www.cs.ucl.ac.uk/staff/A.Finkelstein/papers/maposter.pdf}, theme = {middleware}, } @incollection{CEM01:Reflective, author = {L. Capra and W. Emmerich and C. Mascolo}, booktitle = {Metalevel Architectures and Separation of Crosscutting Concerns - Proc. of Reflection 2001, Kyoto, Japan}, editor = {A. Yonezawa and S. Matsuoka}, pages = {126-133}, publisher = {Springer Verlag}, series = {Lecture Notes in Computer Science}, title = {Reflective Middleware Solutions for Context-Aware Applications}, volume = {2192}, year = {2001}, url = {http://www.cs.ucl.ac.uk/staff/w.emmerich/publications/Reflection01/reflection01.pdf}, theme = {middleware}, } @inproceedings{CEM02:AMicroEconomic, author = {L. Capra and W. Emmerich and C. Mascolo}, booktitle = {Proc. of the 10th ACM SIGSOFT Foundations of Software Engineering Conference}, pages = {31-40}, publisher = {ACM Press}, title = {A Micro-Economic Approach to Conflict Resolution in Mobile Computing}, year = {2002}, url = {http://www.cs.ucl.ac.uk/staff/w.emmerich/publications/FSE10/MicroEconomics/index.html}, theme = {middleware}, } @inproceedings{CEM01:Exploiting, author = {L. Capra and W. Emmerich and C. Mascolo}, booktitle = {Proc. of Workshop on Mobile Computing Middleware, Heidelberg, Germany}, month = {November}, title = {Exploiting Reflection and Metadata to Build Mobile Computing Middleware}, year = {2001}, url = {http://www.cs.ucl.ac.uk/staff/c.mascolo/www/mmc01.pdf}, theme = {middleware}, } @inproceedings{ZCME02:Component, author = {S. Zachariadis and L. Capra and C. Mascolo and W. Emmerich}, booktitle = {Proc. of the 24th Int. Conference on Software Engineering, Orlando, Florida}, pages = {712}, publisher = {ACM Press}, title = {XMIDDLE: Information Sharing Middleware for a Mobile Environment}, year = {2002}, url = {http://www.cs.ucl.ac.uk/staff/c.mascolo/www/icse02d.pdf}, theme = {middleware}, } @article{MCZE01:xmiddle, author = {C. Mascolo and L. Capra and Z. Zachariadis and W. Emmerich}, journal = {Wireless Personal Communications}, pages = {77-103}, publisher = {Kluwer}, title = {XMIDDLE: A Data-Sharing Middleware for Mobile Computing}, volume = {21}, year = {2002}, url = {http://www.cs.ucl.ac.uk/staff/w.emmerich/publications/WPC/index.html}, theme = {middleware}, } @article{CEM03:CARISMA, author = {L. Capra and W. Emmerich and C. Mascolo}, journal = {IEEE Transactions on Software Engineering}, number = {10}, pages = {929-945}, title = {CARISMA: Context-Aware Reflective mIddleware System for Mobile Applications}, volume = {29}, year = {2003}, url = {http://www.cs.ucl.ac.uk/staff/w.emmerich/publications/TSE/charisma/index.html}, theme = {middleware}, } @article{MZE02:XMILE, author = {C. Mascolo and L. Zanolin and W. Emmerich}, journal = {Automated Software Engineering}, number = {2}, pages = {151-165}, title = {XMILE: an XML based Approach for Incremental Code Mobility and Update}, volume = {9}, year = {2002}, url = {http://www.cs.ucl.ac.uk/staff/w.emmerich/publications/ASE/Mobility/index.html}, theme = {middleware}, } @article{CBM+02:ExploitingReflection, author = {L. Capra and G. Blair and C. Mascolo and W. Emmerich and P. Grace}, journal = {ACM Mobile Computing and Communications Review}, number = {4}, pages = {34-44}, title = {Exploiting Reflection in Mobile Computing Middleware}, volume = {6}, year = {2002}, url = {http://www.cs.ucl.ac.uk/staff/w.emmerich/publications/Middleware01/MC2R}, theme = {middleware}, } @techreport{AGME02:Incentives, author = {T. Ackemann and R. Gold and C.Mascolo and W. Emmerich}, institution = {UCL-CS}, number = {02/24}, title = {Incentives in Peer-to-Peer and Grid Networking}, type = {Research Note}, year = {2002}, url = {http://www.cs.ucl.ac.uk/staff/w.emmerich/publications/CCGrid03/index.html}, theme = {middleware}, } @inproceedings{MEM01:XMILE, author = {C. Mascolo and W. Emmerich and H. de Meer}, booktitle = {AISB Symposium on Software Mobility and Adaptive Behaviour. York, UK. March 2001}, note = {ISBN 1 902956 22 1}, publisher = {AISB}, title = {XMILE: An XML-based Approach for Programmable Networks}, year = {2001}, url = {http://www.cs.ucl.ac.uk/staff/w.emmerich/publications/AISB01/index.html}, theme = {middleware}, } @inproceedings{CMZE01:Towards, author = {L. Capra and C. Mascolo and S. Zachariadis and W. Emmerich}, booktitle = {Proc. of the 8th IEEE Workshop on Future Trends in Distributed Computing Systems, Bologna, Italy}, month = {October}, pages = {148-154}, publisher = {IEEE Computer Society Press}, title = {Towards a Mobile Computing Middleware: A Synergy of Reflection and Mobile Code Techniques}, year = {2001}, url = {http://www.cs.ucl.ac.uk/staff/c.mascolo/www/ftdcs.pdf}, theme = {middleware}, } @inproceedings{EMF00:Implementing, author = {C. Mascolo and W. Emmerich and A. Finkelstein}, booktitle = {Proc. of the 22nd Int. Conference on Software Engineering, Limerick, Ireland}, pages = {397-406}, publisher = {ACM Press}, title = {Implementing Incremental Code Mobility with XML}, year = {2000}, url = {http://www.cs.ucl.ac.uk/staff/w.emmerich/publications/ICSE2000/MobXML/index.html}, theme = {middleware}, } @inproceedings{CFM98, address = {Japan}, author = {P. Ciancarini and F. Franze and C. Mascolo}, booktitle = {Proc. 9th IEEE Int. Workshop on Software Specification and Design (IWSSD)}, pages = {96-105}, publisher = {IEEE Computer Society Press}, title = {A Coordination Model to Specify Systems including Mobile Agents}, year = {1998}, theme = {formal}, } @incollection{ZME03, author = {S. Zachariadis and C. Mascolo and W. Emmerich}, booktitle = {Proceedings of 5th Int. Workshop on Mobile Agents for Telecommunication Applications (MATA03)}, editor = {E. Horlait and T. Magedanz and R. H. Glitho}, month = {October}, pages = {170-179}, publisher = {Springer Verlag}, series = {Lecture Notes in Computer Science}, title = {Adaptable Mobile Applications: Exploiting Logical Mobility in Mobile Computing}, volume = {2881}, year = {2003}, url = {http://www.cs.ucl.ac.uk/staff/w.emmerich/publications/MATA03/index.html}, theme = {middleware}, } @inproceedings{GolMas01, author = {R. Gold and C. Mascolo}, booktitle = {Proc. of the 8th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS'2001)}, pages = {142-147}, publisher = {IEEE Computer Society Press}, title = {Use of Context-Awareness in Mobile Peer-to-Peer Networks}, year = {2001}, url = {http://www.cs.ucl.ac.uk/staff/c.mascolo/www/cm-ftdcs2001.pdf}, theme = {middleware}, } @inproceedings{CiaMas98b, address = {Orlando, FL}, author = {P. Ciancarini and C. Mascolo}, booktitle = {Proc. 3rd Int. Software Architecture Workshop (ISAW-3)}, editor = {D. Perry and J. Magee}, month = {November}, pages = {21-24}, publisher = {ACM Press}, title = {Software Architecture and Mobility}, year = {1998}, url = {http://www.cs.ucl.ac.uk/staff/c.mascolo/www/isaw98.ps.gz}, theme = {formal}, } @article{CFM00, author = {P. Ciancarini and F. Franze and C. Mascolo}, journal = {ACM Transactions on Software Engineering and Methodology}, number = {2}, pages = {167-198}, title = {Using a Coordination Language to Specify and Analyze Systems containing Mobile Components}, volume = {9}, year = {2000}, url = {http://www.cs.ucl.ac.uk/staff/c.mascolo/www/tosem.ps.gz}, theme = {formal}, } @incollection{Mas99, author = {C. Mascolo}, booktitle = { Proc. 3rd Int. Conf. on Coordination Languages and Models (COORDINATION '99)}, month = {April}, pages = {37-52}, publisher = {Springer Verlag}, series = {Lecture Notes in Computer Science}, title = {MobiS: a Specification Language for Mobile Systems}, volume = {1594}, year = {1999}, theme = {formal}, } @incollection{MPR99, author = {C. Mascolo and G.P. Picco and G.-C. Roman}, booktitle = {Proc. 7th European Software Engineering Conference (ESEC/FSE 99)}, editor = {O. Nierstrasz and M. Lemoine}, pages = {39-56}, publisher = {Springer Verlag}, series = {Lecture Notes in Computer Science}, title = {A Fine-Grained Model for Code Mobility}, volume = {1687}, year = {1999}, theme = {formal}, } @inproceedings{Mas99b, author = {C. Mascolo}, booktitle = {Proc. 21st Int. Conf. on Software Engineering(ICSE-99)}, month = {may}, pages = {724-725}, publisher = {ACM Press}, title = {Specification, Analysis, and Prototyping of Mobile Systems}, year = {1999}, url = {http://www.cs.ucl.ac.uk/staff/c.mascolo/www/phd.ps.gz}, theme = {formal}, } @inproceedings{zachariadis02exploiting, author = {S. Zachariadis and C. Mascolo and W. Emmerich}, booktitle = {Proceedings of the Distributed Computing Systems Workshops, 22nd Int. Conference on Distributed Computing Systems (ICDCS '02)}, month = {July}, pages = {385-386}, publisher = {IEEE Computer Society Press}, title = {Exploiting Logical Mobility in Mobile Computing Middleware}, year = {2002}, url = {http://www.cs.ucl.ac.uk/staff/c.mascolo/www/mts2002.pdf}, theme = {middleware}, } @inproceedings{arshad02Exploiting, author = {U. Arshad and C. Mascolo and M. Mellor}, booktitle = {Proc. of 3rd International Workshop on Smart Appliances (co-located with ICDCS '02)}, month = {July}, publisher = {ICDCS}, title = {Exploiting Mobility Computing in Health-Care}, year = {2002}, url = {http://www.cs.ucl.ac.uk/staff/c.mascolo/www/mts2002.pdf}, theme = {middleware}, } @inproceedings{Cap02:Mobile, author = {L. Capra}, booktitle = {Proc. of the 24th International Conference of SoftwareEngineering (ICSE 2002), Doctoral Symposium, Orlando, Florida}, month = {May}, pages = {723-724}, publisher = {ACM Press}, title = {Mobile Computing Middleware for Context-Aware Applications}, year = {2002}, url = {http://www.cs.ucl.ac.uk/staff/l.capra/publications/capra02.pdf}, theme = {middleware}, } @inproceedings{CEM01:Middleware, author = {L. Capra and W. Emmerich and C. Mascolo}, booktitle = {Proc. of the 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII). Schloss Elmau, Germany}, month = {May}, pages = {142}, publisher = {IEEE Computer Society Press}, title = {Middleware for Mobile Computing: Awareness vs. Transparency (Position Summary)}, year = {2001}, url = {http://www.cs.ucl.ac.uk/staff/l.capra/publications/cem01hot.ps}, theme = {middleware}, } @phdthesis{Mas01:SpecificationAnalysis, author = {C. Mascolo}, school = {Universita di Bologna}, title = {Specification, Analysis and Prototyping of Mobile Code Systems}, year = {2001}, url = {http://www.cs.ucl.ac.uk/staff/c.mascolo/www/thesis.pdf}, theme = {formal}, } @inproceedings{Ahmed:Modelling:04, author = {M. O. Ahmed and S. Hailes}, title = {Modelling Interactions in Ubiquitous Environments}, booktitle = {UK-UbiNet, 2nd UK-UbiNet Workshop}, year = {2004}, address = {University of Cambridge, UK}, month = {May}, abstract = {In all computer systems, interactions between partiesrequire the establishment of a level of trust that is determined to besufficient to permit the requested action to take place. Traditionally,such trust has been policed centrally by having authorities thatdetermine whether or not an individual is trustworthy (cf Equifaxetc.). To make this work, several premises must hold: (1) there iswidespread trust in such authorities (2) the penalties that the centralauthorities can impose by withdrawing their sanction are sufficientlysevere as to discourage bad behaviour (3) it is not possible forindividuals to easily change their identity to avoid such penalties..}, url = {http://www.cs.ucl.ac.uk/research/mars/papers/modellinginteractions.pdf}, keywords = {Trust, game theory, risk, ubiquitous}, theme = {security}, } @inproceedings{Ahmed:Dangers:04, author = {M. O. Ahmed and S. Hailes and A. Seleznyov}, title = {The Dangers Of Invisible Computing: Learning To Live With Uncertainty}, booktitle = {Ubiconf 2004}, year = {2004}, address = {Gresham College, London, UK}, month = {April}, abstract = {The comfortable certainties about the nature of trust on which mostconventional security systems have been founded have always beenat best doubtful. In pervasive computing environments they becomeboth delusional and dangerous. As a consequence, it is necessaryfor both technically aware service providers and technically na?1veend users to abandon the false hope that the behaviour of securepervasive systems can ever be predictable or repeatable; they mustlearn to accept the same degree of uncertainty in trust for theirdigital identities as they implicitly accept in their everyday humanrelationships. Computing technology is disappearing into the environment ina realisation of Mark Weiser s vision for ubiquitous (pervasive)computing. In the near future, the collision of the Internet withthe embedded systems will mean a massive increase in both scale andheterogeneity of networks. Security is absolutely essential to makingthis a reality, but conventional security measures have little hopeof working; the centralised control of security, relying on the apriori definition of the role, authority and relationships betweenprincipals is both undesirable and unsustainable in such environments. Inthis paper, we explore the need for security in pervasive systems,the difficulties in providing it, and ways in which sociologicalmodels of trust management map into the digital world. We will presentADAM a means of enabling the automation of trust establishment andmaintenance through distributed knowledge acquisition and managementover a self-organised collection of agents. These agents collect andcollate information based on experience and recommendations fromdifferent sources and thereby enable trusting decisions to be taken.}, url = {http://www.cs.ucl.ac.uk/research/mars/papers/uncertainty.pdf}, theme = {security}, } @inproceedings{Seleznyov:ADAM:04, author = {A. Seleznyov and M.O. Ahmed and S. Hailes}, title = {ADAM: An Agent-based Middleware Architecture for Distributed Access Control}, booktitle = {The Twenty-Second International Multi-Conference on Applied Informatics: Artificial Intelligence and Applications}, year = {2004}, editor = {M.H. Hamza}, pages = {200 - 205}, address = { Innsbruck, Austria}, month = {February }, organization = {IASTED}, publisher = {ACTA Press}, abstract = {This paper outlines a conceptual architecture for an autonomic middlewarecomponent designed to provide application-independent access control foruse in largescale highly-dynamic computing environments. In suchenvironments, most notably ambient/pervasive computing environments,centralised access control policy determination is impossible orinadvisable because of the complexity of trust relationships. Inthe absence of centralisation, network resources are forced to maketrusting decisions locally, in the light of information that theythemselves can gather. Thus the architecture that is described inthis paper is founded around an automatic knowledge acquisition andprocessing mechanism, acting as the foundations of a semi-autonomousmulti-agent system (MAS). The agents dynamically organise themselvesinto cooperating distributed communities that mediate between usersand devices (collectively known as trustees) and network resources(principals). Once activated by their owners, agents maintain usercredentials, negotiate amongst themselves to establish the credibility ofprospective trustees identities and cooperate to gather evidence aboutthe likelihood of trustees adhering to the policies of principals.}, url = {http://www.cs.ucl.ac.uk/research/mars/papers/accesscontrol.pdf}, keywords = {Key Words Trust, authorisation, access control, ambient, autonomic}, theme = {security}, } @inproceedings{seleznyov:Conceptual04, author = {A. Seleznyov and S. Hailes}, title = {A Conceptual Access Control Model Based on Distributed Knowledge Management}, booktitle = {The proceedings of 18th International Conference on Advanced Information Networking and Applications}, year = {2004}, address = {Fukuoka, Japan}, month = {March}, organization = {AINA}, publisher = {IEEE Computer Society}, abstract = {The conceptual architecture of the access controlsystem described here is based on automatic distributed acquisitionand processing of knowledge about users and device s in computernetworks. It uses autonomous agents for distributed knowledge management.Agents grouped into distributed communities act as mediators betweenusers/devices and network resources. Communicating with each other, theymake decisions about whether a certain user or device can be givenaccess to a requested resource. In other words, agents in our systemperform user/device authentication, authorisation, and maintenance ofuser credentials.}, url = {http://www.cs.ucl.ac.uk/research/mars/papers/accesscontrol.pdf}, theme = {security}, } @inproceedings{Seleznyov:Distributed04, author = {A. Seleznyov and S. Hailes}, title = {Distributed Knowledge Management for Autonomous Access Control in Computer Networks}, booktitle = {The International Conference on Information Technology: Information Assurance and Security}, year = {2004}, address = {Las Vegas, NV, USA}, month = {April}, organization = {ITCC}, publisher = {IEEE Computer Society}, abstract = {This work discusses a conceptual modelfor automatic acquisition and processing of knowledge about usersand devices in computer networks. It employs autonomous agents fordistributed knowledge management. Agents grouped into distributedcommunities act as mediators between users, devices, and networkresources. Communicating between each other they make decisions onwhether a certain user or device can be given access to a requestedresource. In other words, agents in our system perform user/deviceauthentication, authorisation, and maintenance of user credentials.}, url = {http://www.cs.ucl.ac.uk/research/mars/papers/knowledgeman.pdf}, keywords = {Trust, Access Control,Knowledge Management, Autonomous Agents, Distributed Architectures}, theme = {security}, } @article{PKHA03:Special, author = {T. Pagtzis and P. Kirstein and S.Hailes and H. Afifi}, title = {Proactive Seamless Mobility Management for Future IP Radio Access Networks}, journal = {Special Issue om 3G Wireless and Beyond, Journal of Computer Communications}, number = {17}, pages = {1975-1989}, volume = {26}, year = {2003}, month = {November}, publisher = {Elsevier Science}, url = {http://www.cs.ucl.ac.uk/staff/T.Pagtzis/papers/papers/CC03journlPMIPCRcopy.pdf}, theme = {mobileip}, } @inproceedings{PHK03:Thecase, author = {T. Pagtzis and S. Hailes and P. Kirstein}, title = {The Case for Proactive Mobile IPv6}, booktitle = {Proceedings of the 28th Annual IEEE Conference on Local Computer Networks(LCN)}, year = {2003}, address = {Bonn, Germany}, month = {October}, theme = {mobileip}, } @inproceedings{PWKPY03:Req, author = {T. Pagtzis and C. Williams and P. Kirstein and C. Perkins and A. Yegin}, title = {Requirements for Localised IP Mobility Management}, booktitle = {Proceedings of IEEE Wireless Communications and Networking Conference (WCNC)}, year = {2003}, address = {Louisiana, New Orleans}, month = {March}, url = {http://www.cs.ucl.ac.uk/staff/T.Pagtzis/papers/papers/wcnc03LMMreqs.pdf}, theme = {mobileip}, } @inproceedings{PK02:Performance, author = {T. Pagtzis and P. Kirstein}, title = {On the Performance of CFP Repetition Rate in IEEE 802.11 for IP traffic in Mobility-enabled WLANs}, booktitle = {Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN)}, year = {2002}, address = {Tampa, Florida}, month = {November}, theme = {datalink}, } @inproceedings{PP02:Per, author = {T. Pagtzis and P. Kirstein}, title = {Performance Issues for Localised IP Mobility Management}, booktitle = {Proceedings of 10th IEEE International Conference on Networks (ICON)}, year = {2002}, address = {Singapore}, month = {August}, url = {http://www.cs.ucl.ac.uk/staff/T.Pagtzis/papers/papers/icon02LMMsigPerf.pdf}, theme = {mobileip}, } @inproceedings{PP02:AModel, author = {T. Pagtzis and P. Kirstein}, title = {A Model for Proactive Seamless IP Mobility and Mobility-Hop Routing}, booktitle = {Proceedings of 10th IEEE International Conference on Networks (ICON)}, year = {2002}, address = {Singapore}, month = {August}, url = {http://www.cs.ucl.ac.uk/staff/T.Pagtzis/papers/papers/icon02PMIParch.pdf}, theme = {mobileip}, } @inproceedings{PK02:Proactive, author = {T. Pagtzis and P. Kirstein}, title = {Proactive Mobility for Future IP Wireless Access Networks}, booktitle = {Proceedings of 6th IASTED/IEEE International Conference on Wireless and Optical Communications (WOC)}, year = {2002}, address = {Banff, Canada}, month = {July}, url = {http://www.cs.ucl.ac.uk/staff/T.Pagtzis/papers/papers/woc02PMIPmodel.pdf}, theme = {mobileip}, } @inproceedings{PKH01:Operational, author = {T. Pagtzis and P. Kirstein and S. Hailes}, title = {Operational and Fairness Issues with Connection-less Traffic over IEEE802.11b}, booktitle = {Proceedings of IEEE International Conference on Communications (ICC)}, year = {2001}, address = {Helsinki, Finland}, month = {June}, url = {http://www.cs.ucl.ac.uk/staff/T.Pagtzis/papers/papers/ICC01opIssues802.11b.pdf}, theme = {mobileip}, } @inproceedings{Capra04a, author = {L.Capra}, title = {Towards a Human Trust Model for Mobile Ad-hoc Networks}, booktitle = {Proc. of 2nd UK-UbiNet Workshop}, year = {2004}, address = {Cambridge, UK}, month = {May}, theme = {security}, } @inproceedings{Capra04b, author = {L. Capra}, title = {Engineering Human Trust in Mobile System Collaborations}, booktitle = {Proc. of the 12th International Symposium on the Foundations of Software Engineering (SIGSOFT 2004/FSE-12)}, year = {2004}, address = {Newport Beach, CA, USA}, month = {November}, publisher = {ACM Press}, note = {To Appear}, theme = {security}, } @inproceedings{MHM04:AdHoc, author = {M. Musolesi and S. Hailes and C. Mascolo}, booktitle = {Proceedings of the 7th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems}, title = {An Ad Hoc Mobility Model Founded on Social Network Theory}, pages = {20-24}, address = {Venice, Italy}, month = {October}, year = {2004}, publisher = {ACM Press}, url = {http://www.cs.ucl.ac.uk/staff/m.musolesi/papers/mswim04.pdf}, theme = {mobile}, } @inproceedings{Mus04:Designing, author = {M. Musolesi}, booktitle = {Proceedings of 1st Middleware Doctoral Symposium in Middleware 2004 Companion}, title = {Designing a Context-Aware Middleware for Asynchronous Communication in Mobile Ad Hoc Environments}, month = {October}, address = {Toronto, Canada}, pages = {304-308}, year = {2004}, publisher = {ACM Press}, url = {http://www.cs.ucl.ac.uk/staff/m.musolesi/papers/MDS04.pdf}, theme = {middleware}, } @inproceedings{MMH04:Adapting, author = {M. Musolesi and C. Mascolo and S. Hailes}, booktitle = {Proceedings of 2nd ACM International Workshop on Middleware for Pervasive and Ad Hoc Computing (MPAC 2004) in Middleware 2004 Companion}, title = {Adapting Asynchronous Messaging Middleware to Ad Hoc Networking}, month = {October}, pages = {121-126}, address = {Toronto, Canada}, year = {2004}, publisher = {ACM Press}, url = {http://www.cs.ucl.ac.uk/staff/m.musolesi/papers/MPAC04.pdf}, theme = {middleware}, } @inproceedings{HHM04:Adaptive, author = {R. Harbird and S. Hailes and C. Mascolo}, booktitle = {Proceedings of 2nd ACM International Workshop on Middleware for Pervasive and Ad Hoc Computing (MPAC 2004) in Middleware 2004 Companion}, title = {Adaptive Resource Discovery for Ubiquitous Computing}, month = {October}, address = {Toronto, Canada}, year = {2004}, publisher = {ACM Press}, url = {http://www.cs.ucl.ac.uk/staff/c.mascolo/www/mpacrae.pdf}, theme = {middleware}, } @incollection{ZME04:Satin, author = {S. Zachariadis and C. Mascolo and W. Emmerich}, title = {SATIN: A Component Model for Mobile Self-Organisation}, booktitle = {On the Move to Meaningful Internet Systems 2004: Proc. of CoopIS, DOA and ODBASE, Agia Napa, Cyprus}, editor = {R. Meersman and Z. Tari et al.}, series = {Lecture Notes in Computer Science}, volume = {3291}, pages = {1303-1321}, year = {2004}, address = {Agia Napa, Cyprus}, month = {October}, publisher = {Springer}, url = {http://www.cs.ucl.ac.uk/staff/w.emmerich/publications/DOA04/satin.pdf}, theme = {middleware}, } @inproceedings{Greenhalgh2004power, author = {A. Greenhalgh and S. Hailes}, title = {Don't listen, talk: A comparative study of transmit and receive power for low power radios.}, key = {LCS 2004}, booktitle = {London Communications Symposium}, pages = {269-272}, year = {2004}, month = {September}, publisher = {University College London}, url = {http://www.cs.ucl.ac.uk/staff/a.greenhalgh/publications/2004LCSpowermeasurementpaper.pdf}, theme = {mobileip}, } @article{MMH05:emma, author = {M. Musolesi and C. Mascolo and S. Hailes}, title = {EMMA: Epidemic Messaging Middleware for Ad hoc networks}, journal = {Personal and Ubiquitous Computing Journal}, year = {2005}, note = {To Appear}, url = {http://www.cs.ucl.ac.uk/staff/m.musolesi/papers/journalPUC04.pdf}, theme = {middleware}, } @inproceedings{MHM04:CAR, author = {M. Musolesi and S. Hailes and C. Mascolo}, title = {Adaptive Routing for Intermittently Connected Mobile Ad Hoc Networks}, booktitle = {Proceedings of the IEEE 6th International Symposium on a World of Wireless, Mobile, and Multimedia Networks (WoWMoM 2005). Taormina, Italy.}, year = {2005}, month = {June}, publisher = {IEEE press}, url = {http://www.cs.ucl.ac.uk/staff/m.musolesi/papers/wowmom05.pdf}, theme = {delay}, } @inproceedings{MHM05:Ukubinet, author = {M. Musolesi and S. Hailes and C. Mascolo}, title = {Social Networks Based Ad Hoc Mobility Models}, booktitle = {Proceedings of the 3rd UK-UbiNet Workshop}, year = {2005}, month = {February}, url = {http://www.cs.ucl.ac.uk/staff/m.musolesi/papers/ukubinet05.pdf}, theme = {mobile}, } @inproceedings{CZM05:qcad, author = {L. Capra and S. Zachariadis and C. Mascolo}, booktitle = {International Conference on Pervasive Services (ICPS'05)}, publisher = {IEEE}, title = {Q-CAD: QoS and Context Aware Discovery Frameworkfor Adaptive Mobile Systems}, address = {Santorini, Greece}, year = {2005}, month = {July}, url = {http://www.cs.ucl.ac.uk/staff/c.mascolo/www/qcad05.pdf}, theme = {middleware}, } @inproceedings{DM05:Adaptive, title = {Adaptive Distributed Indexing for Spatial Queries in Sensor Networks}, author = {V. Dyo and C. Mascolo}, booktitle = {IEEE Proceedings of 8th International Workshop on Mobility in Databases and Distributed Systems (co-located with DEXA05)}, month = {August}, year = {2005}, address = {Copenhagen, Denmark}, publisher = {IEEE Computer Society Press}, url = {http://www.cs.ucl.ac.uk/staff/c.mascolo/www/mdds05.pdf}, theme = {middleware}, }