Barry P. Mulcahy

  • Citations Per Year
Learn More
Security and privacy, accountability and anonymity, transparency and unobservability: these terms and more are vital elements for defining the overall security requirements---and, thus, security measurability criteria---of systems. However, these distinct yet related concepts are often substituted for one another in our discussions on securing trustworthy(More)
With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. While much work investigating functional interoperability between different middleware architectures has been reported, little practical work has been done on providing a unified(More)
In this chapter we demonstrate how to increase the value of shared information by providing context on its quality via trust metrics. In order to evaluate the achieved level of trust, a trust evaluation system is described. This system assesses the quality of information based on past behaviour, direct experience, recommendation, referral, and roles. This(More)
This paper introduces a new collaboration abstraction, called Semantic Room (SR), specifically targeted to facilitating sharing and processing large volumes of data produced and consumed in real time by a collection of networked participants. The model enables constructing flexible collaborative event-driven distributed systems with well-defined and(More)
User authorisation is traditionally coordinated by system administrators processing delegation requests. This overhead influences an enterprise's ability to respond efficiently and contributes to the total cost of ownership. We propose to reduce this bottleneck by supporting Dynamic Administrative Coalitions of ordinary users that hold administrative powers(More)
The success of recent massive Internet-based attacks and frauds targeting financial institutions highlights the inadequacy of these institutions when facing such threats in isolation. There is a need for financial players to coordinate their efforts by sharing and correlating suspicious activities occurring at multiple, geographically distributed sites.(More)
Summary form only given. With the advent of Web services, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. While much work investigating functional interoperability between different middleware architectures has been reported, little practical work has been done on providing a unified(More)
  • 1