Andrew Martin
Andrew Martin
Professor of Systems Security, University of Oxford
Verified email at - Homepage
Cited by
Cited by
Uncertainty in predictions of the climate response to rising levels of greenhouse gases
DA Stainforth, T Aina, C Christensen, M Collins, N Faull, DJ Frame, ...
Nature 433 (7024), 403-406, 2005
Threat-based security analysis for the internet of things
AW Atamli, A Martin
2014 International Workshop on Secure Internet of Things, 35-43, 2014
Smart grid metering networks: A survey on security, privacy and open research issues
P Kumar, Y Lin, G Bai, A Paverd, JS Dong, A Martin
IEEE Communications Surveys & Tutorials 21 (3), 2886-2927, 2019
Using propositional logic for requirements verification of service workflow
L Da Xu, W Viriyasitavat, P Ruchikachorn, A Martin
IEEE Transactions on Industrial Informatics 8 (3), 639-646, 2012
SWSpec: The requirements specification language in service workflow environments
W Viriyasitavat, L Da Xu, A Martin
IEEE Transactions on Industrial Informatics 8 (3), 631-638, 2012
Trust in the Cloud
IM Abbadi, A Martin
information security technical report 16 (3-4), 108-114, 2011
Association of parameter, software, and hardware variation with large-scale behavior across 57,000 climate models
CG Knight, SHE Knight, N Massey, T Aina, C Christensen, DJ Frame, ...
Proceedings of the National Academy of Sciences 104 (30), 12259, 2007
A survey of trust in workflows and relevant contexts
W Viriyasitavat, A Martin
IEEE Communications Surveys & Tutorials 14 (3), 911-940, 2011
Trusted computing and provenance: Better together
J Lyle, A Martin
Usenix, 2010
The ten-page introduction to Trusted Computing
A Martin
A set-theoretic model for real-time specification and reasoning
CJ Fidge, IJ Hayes, AP Martin, AK Wabenhorst
International Conference on Mathematics of Program Construction, 188-206, 1998
Security principles for public-resource modeling research
D Stainforth, A Martin, A Simpson, C Christensen, J Kettleborough, T Aina, ...
13th IEEE International Workshops on Enabling Technologies: Infrastructure …, 2004
Distributed computing for public-interest climate modeling research
D Stainforth, J Kettleborough, M Allen, M Collins, A Heaps, J Murphy
Computing in Science & Engineering 4 (3), 82-89, 2002
Modelling and automatically analysing privacy properties for honest-but-curious adversaries
AJ Paverd, A Martin, I Brown
Tech. Rep, 2014
myTrustedCloud: trusted cloud infrastructure for security-critical computation and data management
D Wallom, M Turilli, A Martin, A Raun, G Taylor, N Hargreaves, ...
Proceedings of the WICSA/ECSA 2012 Companion Volume, 82-83, 2012
Lightweight authentication and key agreement for smart metering in smart energy networks
P Kumar, A Gurtov, M Sain, A Martin, PH Ha
IEEE Transactions on Smart Grid 10 (4), 4349-4359, 2018
A tactic calculus—abridged version
AP Martin, PHB Gardiner, JCP Woodcock
Formal Aspects of Computing 8 (4), 479-489, 1996
Security and privacy in smart grid demand response systems
A Paverd, A Martin, I Brown
International Workshop on Smart Grid Security, 1-15, 2014
Hardware security for device authentication in the smart grid
AJ Paverd, AP Martin
International Workshop on Smart Grid Security, 72-84, 2012
Innovations for grid security from trusted computing
W Mao, A Martin, H Jin, H Zhang
International Workshop on Security Protocols, 132-149, 2006
The system can't perform the operation now. Try again later.
Articles 1–20