基本信息
浏览量:153
职业迁徙
个人简介
Research interests
My activity focusses on cyber security since 2001. I worked on (idealised) programming languages for mobility of ambients over untrusted networks (444 citations in total at the time of writing), on trust management (122 citations), and was among the originators of the notion of 'trust structures' (257 citations), a novel approach to distributed trust management. I then focussed on `predictive' trust-and-reputation models. These are models of behaviour aimed at assessing the trustworthiness of computational agents, encompassing machine-learning and decision-making probabilistic techniques (189 citations).
More recent work focussed on anonymity and privacy, its interactions with trust and attackers' belief systems, with particular focus on understanding and analysing collaboration mechanisms in anonymity networks (47 citations). I am one of the originators of the information-theoretic measure of vulnerability with beliefs (34 citations). This quantifies data leakages in the presence of uncertain external information, which currently is one of the major threats to privacy in open network such as the Internet.
My activity focusses on cyber security since 2001. I worked on (idealised) programming languages for mobility of ambients over untrusted networks (444 citations in total at the time of writing), on trust management (122 citations), and was among the originators of the notion of 'trust structures' (257 citations), a novel approach to distributed trust management. I then focussed on `predictive' trust-and-reputation models. These are models of behaviour aimed at assessing the trustworthiness of computational agents, encompassing machine-learning and decision-making probabilistic techniques (189 citations).
More recent work focussed on anonymity and privacy, its interactions with trust and attackers' belief systems, with particular focus on understanding and analysing collaboration mechanisms in anonymity networks (47 citations). I am one of the originators of the information-theoretic measure of vulnerability with beliefs (34 citations). This quantifies data leakages in the presence of uncertain external information, which currently is one of the major threats to privacy in open network such as the Internet.
研究兴趣
论文共 254 篇作者统计合作学者相似作者
按年份排序按引用量排序主题筛选期刊级别筛选合作者筛选合作机构筛选
时间
引用量
主题
期刊级别
合作者
合作机构
INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMSpp.1-21, (2023)
JOURNAL OF THE BRITISH BLOCKCHAIN ASSOCIATIONno. 1 (2023): 34-40
引用0浏览0引用
0
0
arxiv(2021)
引用0浏览0EI引用
0
0
Bull. EATCS (2020)
引用0浏览0EI引用
0
0
加载更多
作者统计
合作学者
合作机构
D-Core
- 合作者
- 学生
- 导师
数据免责声明
页面数据均来自互联网公开来源、合作出版商和通过AI技术自动分析结果,我们不对页面数据的有效性、准确性、正确性、可靠性、完整性和及时性做出任何承诺和保证。若有疑问,可以通过电子邮件方式联系我们:report@aminer.cn