Cybersecurity Publications of
Michael Huth
Papers
Patrick Ah-Fat and Michael Huth,
Optimal Accuracy-Privacy Trade-Off for Secure Computations
, to appear in IEEE Transactions on Information Theory, January 2019
Patrick Ah-Fat and Michael Huth,
Scalable Information-Flow Analysis of Secure Three-Party Affine Computations
, submitted on 3 January 2019, arXiv.org > cs > arXiv:1901.00798
Leif-Nissen Lundbaek, Daniel Janes Beutel, Michael Huth, Stephen Jackson, Laurence Kirk, Robert Steiner,
Proof of Kernel Work: a democratic low-energy consensus for distributed access-control protocols
, Published on 8 August 2018 in the journal
Royal Society Open Science
Marcello Balduccini, Edward Griffor, Michael Huth, Claire Vishik, Martin Burns, David Wollman,
Ontology-based reasoning about the trustworthiness of cyber-physical systems
, also on
ArXiv
, IET Petras Conference on Living in the Internet of Things, March 28-29 2018, London, UK
Beaumont P. and Huth M.,
Constrained Bayesian Networks: Theory, Optimization, and Applications
, Submitted on 15 May 2016, arXiv.org > cs > arXiv:1705.05326
Ah-Fat P. and Huth M.,
Secure Multi-Party Computation: Information Flow of Outputs and Game Theory
, 6th International Conference on Principles of Security and Trust, April 2017, Uppsala, Sweden.
Lundbaek L.-N., Callia D'Iddio A., Huth M.,
Optimizing Governed Blockchains for Financial Process Authentications
, Submitted on 1 December 2016, arXiv.org > cs > arXiv:1612.00407
Beaumont P., Evans N., Huth M., Plant T.,
Confidence analysis for nuclear arms control: SMT abstractions of Game Theoretic Models
, Proc. of the 57th INMM Annual Meeting, Originally published in the Proceedings of the INMM Annual Meeting. © 2016 INMM. All Rights Reserved.
Beaumont P., Evans N., Huth M., Plant T.,
Bounded analysis of constrained dynamical systems: a case study in nuclear arms control
, Proc. of the 57th INMM Annual Meeting, Originally published in the Proceedings of the INMM Annual Meeting. © 2016 INMM. All Rights Reserved.
Beaumont P., Day E., Evans N., Haworth S., Huth M., Plant T., Roberts C.,
An in-depth case study: modelling an information barrier with Bayesian Belief Networks
, Proc. of the 57th INMM Annual Meeting, Originally published in the Proceedings of the INMM Annual Meeting. © 2016 INMM. All Rights Reserved.
Beaumont P., Evans N., Huth M., and Plant T.,
Confidence analysis for nuclear arms control: SMT abstractions of Bayesian Belief Networks
, 20th European Symposium on Computer Security Research (ESORICS 2015), 21-25 September 2015, Vienna, Austria
Huth M. and Kuo H.-P. J.,
Quantitative threat analysis via a logical service
, Technical Report 2014/14, Department of Computing, Imperial College London
Huth M. and Kuo H.-P. J.,
On Designing Usable Policy Languages for Declarative Trust Aggregation
,
Best Paper Award
, proceedings of 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, part of HCII 2014, Crete Heraklion
Huth M., Kuo H.-P. J.,
PEALT: An Automated Reasoning Tool for Numerical Aggregation of Trust Evidence
, proceedings of International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2014), Springer
Crampton J., Huth M., and Kuo H.-P. J.,
Authorized workflow schemas: Deciding realizability through LTL(F) model checking
, STTT 16(1) (2014): 31--48, Springer
Huth M., Kuo H.-P. J.,
Towards Verifiable Trust Management of Software Execution
(Extended Abstract), proceedings of TRUST 2013, Springer
Huth M., Kuo H.-P. J., Sasse A., and Kirlappos I.,
Towards Usable Generation and Enforcement of Trust Evidence from Programmers' Intent
, proceedings of 1st International Conference on Human Aspects of Security, Privacy, and Trust (HAS 2013), Las Vegas, Nevada
Bruns G., Fong Ph., Huth M., and Siahaan I.,
Relationship-Based Access Control: Its Expression and Enforcement Through Hybird Logic
, proceedings of 2nd ACM Conference on Data and Application Security and Privacy (CODASPY 2011), ACM Press
Bruns G., Huth M., and Avijit K.,
Program synthesis in administration of higher-order permissions
, ACM SACMAT Symp. 2011: 41-50
Bruns G., and Huth M.,
Access Control via Belnap Logic: Intuitive, Expressive, and Analyzable Policy Composition
, ACM Trans. Inf. Syst. Secur. 14(1): 9 (2011)
Crampton J., and Huth M.,
A Framework for the Modular Specification and Orchestration of Authorization Policies
, Aura T. ed (Springer), 2010, (Proc. 15th Nordic Conf. on Secure IT Systems), to appear
Crampton J., and Huth M.,
An Authorization Framework Resilient to Policy Evaluation Failure
Gritzalis D. and Preneel B. ed (Springer), 2010, (Proc. 15th European Symposium on Research in Computer Security, 2010)
Huth M.,
Formal Methods and Access Control
in "Encyclopedia of Cryptography and Security, 2nd Edition" Henk C.A. van Tilborg, Sushil Jajodia ed (Springer, Heidelberg) 2010.
Crampton J. and Huth M.,
Towards an Access-Control Framework for Countering Insider Threats
in
Insider Threats in Cybersecurity - And beyond
Probst C. et. al. ed (Springer, Heidelberg) 2010.
Bruns G. and Huth M.,
Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis
Sabelfeld A. ed (IEEE Computer Society Press), 2008, 163-176. (Proc. 21st IEEE Computer Security Foundations Symposium, 2008)
Crampton J. and Huth M.,
Detecting and Countering Insider Threats: Can Policy-Based Access Control Help?
De Capitani di Vimercati S. and Kuesters R. ed (Electr. Notes in Theo. Comp. Sci.) (Proc. of 5th Int'l Workshop on Security and Trust Management, September 2009)
Bruns G., Dantas D. S., and Huth M.,
A simple and expressive semantic framework for policy composition in access control
Gligor V. D. and Mantel H. ed (ACM Press, New York) 2007, 12-21. (Proc. 5th ACM workshop on Formal Methods in Security Engineering: From Specifications to Code, 2007)
Books
Huth M.,
Secure Communicating Systems: design, analysis, and implementation
, Cambridge University Press, 2001.