Martin Sadler

Learn More
Digital information is increasingly more and more important to enable interactions and transactions on the Internet. On the other hand, leakages of sensitive information can have harmful effects for people, enterprises and governments.This paper focuses on the problems of dealing with timed release of confidential information and simplifying its access once(More)
  • Marco Casassa Mont, Adrian Baldwin, Yolanta Beres, Keith Harrison, Martin Sadler, Simon Shiu
  • 2002
Recent IT attacks demonstrated how vulnerable consumers and enterprises are when adopting commercial and widely deployed operating systems, software applications and solutions. Diversity in software applications is fundamental to increase chances of survivability to faults and attacks. Current approaches to diversity are mainly based on the development of(More)
—We discuss the concept of information stewardship in cloud-based business ecosystems. The constituent concepts of stewardship — which we believe will be crucial to the successful development of cloud-based business of all kinds — extend those of security to encompass concepts of objectives, ethics/values, sustainability, and resilience: all familiar from(More)
Patients with temporal-lobe epilepsy (TLE) present with memory difficulties. The aim of the current study was to determine to what extent these difficulties could be related to a metamemory impairment. Fifteen patients with TLE and 15 matched healthy controls carried out a paired-associates learning task. Memory recall was measured at intervals of 30min and(More)
Digital information is increasingly more and more important to underpin interactions, transactions and exchanges of knowledge. On the other hand, leakages of sensitive digital information can spread rapidly with harmful effects for people, organizations and governments. This paper focuses on the problem of protecting confidential information from(More)
Trust In a Dotcom World Is security a done deal? Far from it. The talk will emphasize how little we know about information assurance as we move to a world of virtual corporations, dotcoms, portals, marketplaces and the complex interdependencies between online companies-a context that does not easily respect borders. It will touch upon some of the problems(More)
Managing the information stewardship lifecycle is a challenge. In the context of cloud computing, the stakeholders in cloud ecosystems must also take account of the demands of the information stewardship lifecycles of other participants in the ecosystem. We describe a modelling framework — incorporating tools from mathematical systems modelling, economics,(More)
INTRODUCTION An assessment was made of general symptoms in patients with psychogenic nonepileptic seizures (PNES), comparing those who do versus those who do not accept the diagnosis. METHOD A questionnaire pilot study of newly diagnosed psychogenic nonepileptic seizure patients confirmed by video electroencephalography (EEG) was carried out, using a(More)
Recent IT attacks demonstrated how vulnerable consumers and enterprises are when adopting commercial and widely deployed operating systems, softwareapplicationsandsolutions. Diversity in software applications is fundamental to increase chances of survivabilitytofaultsandattacks. Current approaches to diversity are mainly based on the development of multiple(More)