Publications

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

For an alternative listing of publications see Nick’s HP Labs page and also Nick’s (not complete) DBLP entries.

2013

8 results
2013
[8] Mapping Legal Requirements to IT Controls (, , and ), Technical report HPL-2013-39, HP Laboratories, . [bibtex] [pdf]
[7] Towards a Model of Accountability for Cloud Computing Services (, , , , , , , , , , , , , and ), Technical report HPL-2013-38, HP Laboratories, . [bibtex] [pdf]
[6] Cross-Disciplinary Review of the Concept of Accountability ( and ), Technical report HPL-2013-37, HP Laboratories, . [bibtex] [pdf]
[5] Towards a Model of Accountability for Cloud Computing Services (, , , , , , , , , , , , , and ), In Proceedings of the DIMACS/BIC/A4Cloud/CSA International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFC), . [bibtex] [pdf]
[4] Cross-Disciplinary Review of the Concept of Accountability ( and ), In Proceedings of the DIMACS/BIC/A4Cloud/CSA International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFC), . [bibtex] [pdf]
[3] A Toolkit for Automating Compliance in Cloud Computing Services ( and ), In International Journal of Cloud Computing, volume Special Issue on Security Governance and SLAs in Cloud Computing, . [bibtex] [pdf]
[2]The Future Internet / Future Internet Assembly 2013: Validated Results and New Horizons, (Alex Galis, Anastasius Gavras, Federico Alvarez, Alessandro Bassi, Michele Bezzi, Laurent Ciavaglia, Frances Cleary, Petros Daras, Herman de Meer, Panagiotis Demestichas, John Domingue, Theo Kanter, Stamatis Karnouskos, Srdjan Krco, Laurent Lefevre, Jasper Lentjes, Man-Sze Li, Paul Malone, Antonio Manzalini, Volkmar Lotz, Henning Muller, Karsten Oberle, Noel O'Connor, Nick Papanikolaou, Dana Petcu, Rahim Rahmani, Danny Raz, Gael Richards, Elio Salvadori, Susana Sargento, Hans Schaffers, Joan Serat, Burkhard Stiller, Antonio Skarmeta, Kurt Tutschku, Theodore Zahariadis, eds.), Springer, . [bibtex]
[1] Mapping Legal Requirements to IT Controls (, , and ), In Proceedings of the Sixth International Workshop on Requirements Engineering and Law (RELAW), . [bibtex] [pdf]

2012

16 results
2012
[16] Refinement Checking for Privacy Policies (, and ), In Science of Computer Programming, volume 77, . [bibtex] [pdf] [doi]
[15] Formal Analysis and Verification of Systems Security Models with Gnosis ( and ), . [bibtex] [pdf]
[14] Security And Privacy Governance In Cloud Computing Via SLAs And A Policy Orchestration Service (, and ), Technical report HPL-2012-55, HP Laboratories, . [bibtex] [pdf]
[13]Automating Compliance for Cloud Computing Services ( and ), Technical report HPL-2012-56, HP Laboratories, . [bibtex]
[12]An online knowledge base store (KB Store) (, , , , and ), In Research Disclosure, . [bibtex]
[11] Security and Privacy Governance In Cloud Computing via SLAs and a Policy Orchestration Service (, and ), In Proceedings of the 2\textsuperscriptnd International Conference on Cloud Computing and Services Science (CLOSER 2012), SciTePress, . [bibtex] [pdf]
[10] Automating Compliance for Cloud Computing Services ( and ), In Proceedings of the 2nd International Conference on Cloud Computing and Services Science (CLOSER 2012), SciTePress, . [bibtex] [pdf]
[9] EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics (, , , and ), In Proceedings of e-Challenges e-2012 Conference, . [bibtex] [pdf]
[8] Natural Language Processing of Rules and Regulations for Compliance in the Cloud (), In Proceedings of DOA-SVI 2012, . [bibtex] [pdf]
[7] Forming A Vision for Future Internet Research ( and ), In Proceedings of e-Challenges e-2012 Conference, . [bibtex] [pdf]
[6] Review of Algorithms and Theory of Computation Handbook by Mikhail J. Atallah and Marina Blanton (), In ACM SIGACT News, volume 43, . [bibtex] [pdf] [doi]
[5] The FIA Research Roadmap: Priorities for Future Internet Research ( and ), Technical report HPL-2012-70, HP Laboratories, . [bibtex] [pdf]
[4] The FIA Research Roadmap: Priorities for Future Internet Research ( and ), Chapter in Future Internet — From Technological Promises to Reality (Alvarez, F., Cleary, F., Daras, P., Domingue, J., Galis, A., Garcia, A., Gavras, A., Karnourskos, S., Krco, S., Li, M.-S., Lotz, V., Müller, H., Salvadori, E., Sassen, A.-M., Schaffers, H., Stiller, B., Tselentis, G., Turkama, P., Zahariadis, T., eds.), Springer, volume 7281, . [bibtex] [pdf]
[3]Intelligent Information Gathering for Security and Privacy Compliance in Cloud Computing (), Technical report HPL-2012-71, HP Laboratories, . [bibtex]
[2] Pattern Detection in Systems Simulation: Towards a Model-Checking Framework for Security Analytics ( and ), Technical report HPL-2012-89, HP Laboratories, . [bibtex] [pdf]
[1] Model Checking for Communicating Quantum Processes (, , , and ), In International Journal of Unconventional Computing, Old City Publishing, Inc., volume 8, . [bibtex] [pdf]

2011

9 results
2011
[9] Automated Understanding of Cloud Terms of Service and SLAs ( and ), In Proceedings of The 22nd Hewlett-Packard Colloquium on Information Security, . [bibtex] [pdf]
[8] Automated Understanding of Cloud Terms of Service and SLAs ( and ), In Proceedings of IEEE CloudCom 2011, . [bibtex] [pdf]
[7] Trust and Security in the Future Internet: Setting the Context. Towards a vision and analysis of fundamental change areas, challenges and potential solutions as discussed at EFFECTSPLUS Clustering and Roadmapping Events ( and ), . [bibtex] [pdf]
[6] Future Internet Assembly Research Roadmap ( and ), (Nick Wainwright, Nick Papanikolaou, eds.), European Commission, . [bibtex] [pdf]
[5] Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography ( and ), Chapter in Secure and Trust Computing, Data Management and Applications, Springer, volume 187, . [bibtex] [pdf]
[4] Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography ( and ), In Proceedings of 1st International Workshop on Security and Trust in Virtualised Environments (STAVE 2011), . [bibtex] [pdf]
[3] Towards Greater Accountability in Cloud Computing through Natural-Language Analysis and Automated Policy Enforcement ( and ), Technical report HPL-2011-118, HP Laboratories, . [bibtex] [pdf]
[2]Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography ( and ), Technical report HPL-2011-117, HP Laboratories, . [bibtex]
[1]Achieving Compliance Through Natural-Language Analysis of Service Level Agreements for Cloud Services (), Technical report HPL-2011-167, HP Laboratories, . [bibtex]

2010

11 results
2010
[11]Taxonomy of Consent and Revocation (, , and ), Technical report, , . [bibtex]
[10] Defining Consent and Revocation Policies (, , , , and ), In Pre-Proceedings of PrimeLife/IFIP Summer School 2010: Privacy and Identity Management for Life, . [bibtex] [pdf]
[9] Applying Formal Methods to Describe Privacy Control Requirements in a Real Scenario: Emerging Ambiguities and Proposed Solutions (, , and ), In Proceedings of PrimeLife/IFIP Summer School 2010: Privacy and Identity Management for Life, Helsingborg, Sweden, . [bibtex] [pdf]
[8] EnCoRe: Towards a Holistic Approach to Privacy (, , , and ), In Proceedings of International Conference on Security and Cryptography (SECRYPT 2010), . [bibtex] [pdf]
[7] Review of The Space and Motion of Communicating Agents by Robin Milner, Cambridge University Press, 2009 (ISBN: 978-0-521-73833-0) (), In ACM SIGACT News, volume 41, . [bibtex] [pdf]
[6]EnCoRe: Towards a holistic approach to privacy (, , , and ), Technical report HPL-2010-83, HP Laboratories, . [bibtex]
[5] Specification and Verification of Quantum Protocols (, and ), Chapter in Semantic Techniques in Quantum Computation (S.J. Gay, I. Mackie, eds.), Cambridge University Press, . [bibtex] [pdf]
[4]Towards A Conceptual Model For Privacy Policies (, and ), Technical report HPL-2010-82, HP Laboratories, . [bibtex]
[3] A Conceptual Model for Privacy Policies with Consent and Revocation Requirements (, , , and ), In Proceedings of PrimeLife/IFIP Summer School 2010: Privacy and Identity Management for Life, Springer-Verlag, . [bibtex] [pdf]
[2] Towards a Logic of Consent and Revocation (, , and ), . [bibtex] [pdf]
[1] Static Analysis of Information Release in Interactive Programs ( and ), In Electronic Communications of the EASST, volume 35, . [bibtex] [pdf] [doi]

2009

5 results
2009
[5] Towards an Integrated Approach to the Management, Specification and Enforcement of Privacy Policies (, , , and ), In Proceedings of W3C Workshop on Access Control Application Scenarios, . [bibtex] [pdf]
[4] Reaching for Informed Revocation: Shutting Off the Tap on Personal Data (, , and ), In Proceedings of Fifth International Summer School on Privacy and Identity Management for Life, . [bibtex] [pdf]
[3] Policy Refinement Checking (, and ), In Proceedings of Ninth International Workshop on Automated Verification of Critical Systems (AVoCS 09), . [bibtex] [pdf]
[2] Security versus Quantum Computers (), In BCS Information Security Now (ISNow), volume 4, . [bibtex] [pdf]
[1] Model Checking Quantum Protocols (), PhD thesis, Department of Computer Science, University of Warwick, . [bibtex] [pdf]

2008

2 results
2008
[2] QMC: A Model Checker for Quantum Systems (, and ), In Proceedings of 20\textsuperscriptth International Conference on Automated Verification (CAV 2008), Springer, volume 5123, . [bibtex] [pdf]
[1]Verifying Communicating Quantum Processes using QMC (, and ), Technical report, Department of Computer Science, University of Warwick., . [bibtex]

2007

2 results
2007
[2] QMC: A Model Checker for Quantum Systems (, and ), In Proceedings of Workshop on Quantum Cryptography and Security (Lisbon Quantum Computation, Information and Logic Meetings Series: LQCIL'07), . [bibtex] [pdf]
[1] Exogenous Probabilistic Computation Tree Logic (, , and ), In Proceedings of the Fifth Workshop on Quantitative Aspects of Programming Languages (QAPL '07), . [bibtex] [pdf]

2006

2 results
2006
[2] Probabilistic Model-Checking of Quantum Protocols (, and ), In Proceedings of 2\textsuperscriptnd International Workshop on Developments on Computational Models (DCM 2006), . [bibtex] [pdf]
[1] Classical Security Protocols for QKD Systems ( and ), Technical report, EU FP6 SECOQC Project, . [bibtex] [pdf]

2005

6 results
2005
[6] An Automated Analysis of the Security of Quantum Key Distribution (, and ), In Proceedings of the Third International Workshop on Security Issues in Concurrency (SECCO'05), . [bibtex] [pdf]
[5] Simulating and Compiling Code for the Sequential Quantum Random Access Machine (, and ), In Proceedings of the Third International Workshop on Quantum Programming Languages (QPL 2005), volume 170, . [bibtex] [pdf]
[4] Review of Data Privacy and Security by David Salomon, Springer-Verlag, 2003 (ISBN: 0-387-00311-8) (), In ACM SIGACT News, volume 36, . [bibtex] [pdf]
[3] Review of Classical and Quantum Computing by Yorick Hardy and Willi-Hans Steeb, Birkhauser Verlag, 2001 (ISBN: 3-7643-6610-9) (), In ACM SIGACT News, volume 36, . [bibtex] [pdf]
[2] Reasoning Formally About Quantum Systems: An Overview (), In ACM SIGACT News, volume 36, . [bibtex] [pdf]
[1] An Introduction to Quantum Cryptography (), In ACM Crossroads, volume 11, . [bibtex] [pdf]

2004

2 results
2004
[2] Techniques for Design and Validation of Quantum Protocols (), Master's thesis, Department of Computer Science, University of Warwick, . [bibtex] [pdf]
[1] A Programming Language for Quantum Communication Systems Design (), In Proceedings of the IEEE Postgraduate Research in Electronics, Photonics, Communications and Software Conference (PREP2004), . [bibtex] [pdf]