← Back

Academic Work

Research publications from my time at Oxford, 2008–2013.

PhD Thesis

  • Trustworthy Services Through Attestation

    John Lyle

    PhD Thesis, Department of Computer Science, University of Oxford · 2011

    PDF / Link

Acknowledged In

  • Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns

    Maximilian Golla, Grant Ho, Marika Lohmus, Monica Pulluri, Elissa M. Redmiles

    30th USENIX Security Symposium (USENIX Security '21) · 2021

    PDF / Link

Publications (23)

  • Developing secure, unified multi-device and multi-domain platforms: A case study from the webinos project

    Atzeni, Lyle, Faily

    Architectures and Protocols for Secure Information Technology (IGI Global) · 2013

  • Policies in Context: Factors Influencing the Elicitation and Categorisation of Context-Sensitive Security Policies

    Faily, Lyle, Flechais, Atzeni, Cameroni, Myrhaug, Goker, Kleinfeld

    Workshop on Home Usable Privacy and Security · 2013

  • Guidelines for Integrating Personas into Software Engineering Tools

    Faily, Lyle

    5th ACM SIGCHI Symposium on Engineering Interactive Computing Systems · 2013

  • Extending the web to support personal network services

    Lyle, Faily, Nilsson, Isberg

    28th ACM Symposium on Applied Computing (SAC '13) · 2013

    PDF / Link
  • Model-driven architectural risk analysis using architectural and contextualised attack patterns

    Faily, Lyle, Namiluko, Atzeni, Cameroni

    Workshop on Model-Driven Security (ACM) · 2012

    PDF / Link
  • Requirements Sensemaking using Concept Maps

    Faily, Lyle, Paul, Atzeni, Blomme, Desruelle, Bangalore

    HCSE 2012: 4th International Conference on Human-Centered Software Engineering (Springer) · 2012

    PDF / Link
  • On the Challenges of Building a Web-based Ubiquitous Application Platform

    Desruelle, Lyle, Isenberg, Gielen

    1st International Workshop on Ubiquitous Mobile Instrumentation · 2012

  • Secure System? Challenge Accepted: Finding and Resolving Security Failures Using Security Premortems

    Faily, Lyle, Parkin

    BCS HCI 2012 Workshops: Designing Interactive Secure Systems · 2012

    PDF / Link
  • Personal PKI for the smart device era

    Lyle, Paverd, King-Lacroix, Atzeni, Virji, Flechais, Faily

    9th European PKI Workshop: Research and Applications · 2012

    PDF / Link
  • Provenance as a Security Control

    Martin, Lyle, Namiluko

    TaPP '12: 4th USENIX Workshop on the Theory and Practice of Provenance · 2012

    PDF / Link
  • On the design and development of webinos: a distributed mobile application middleware

    Lyle, Faily, Flechais, Paul, Goker, Myrhaug, Desruelle, Martin

    12th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems · 2012

    PDF / Link
  • Cross-platform access control for mobile web applications

    Lyle, Monteleone, Faily, Patti, Ricciato

    IEEE International Symposium on Policies for Distributed Systems and Networks · 2012

    PDF / Link
  • The webinos project

    Fuhrhop, Lyle, Faily

    21st International Conference Companion on World Wide Web (ACM) · 2012

    PDF / Link
  • "Do we know each other or is it just our Devices?": A Federated Context Model for Describing Social Activity Across Devices

    Gionis, Desruelle, Blomme, Lyle, Faily, Bassbouss

    W3C/PrimeLife Federated Social Web Europe Conference · 2011

    PDF / Link
  • Achieving attestation with less effort: an indirect and configurable approach to integrity reporting

    Huh, Kim, Lyle, Martin

    6th ACM Workshop on Scalable Trusted Computing · 2011

  • Challenges for Provenance in Cloud Computing

    Abbadi, Lyle

    TaPP 2011: Third USENIX Workshop on the Theory and Practice of Provenance · 2011

    PDF / Link
  • Here's Johnny: a Methodology for Developing Attacker Personas

    Atzeni, Faily, Lyle, Cameroni, Flechais

    6th International Conference on Availability, Reliability and Security · 2011

    PDF / Link
  • Engineering Attestable Services

    Lyle, Martin

    3rd International Conference on Trust and Trustworthy Computing (Springer) · 2010

  • Managing application whitelists in trusted distributed systems

    Huh, Lyle, Namiluko, Martin

    Future Generation Computer Systems · 2010

  • Trusted Computing and Provenance: Better Together

    Lyle, Martin

    2nd Workshop on the Theory and Practice of Provenance (USENIX) · 2010

    PDF / Link
  • Trustworthy Log Reconciliation for Distributed Virtual Organisations

    Huh, Lyle

    Trust '09: 2nd International Conference on Trusted Computing (Springer-Verlag) · 2009

  • Trustable Remote Verification of Web Services

    Lyle

    TRUST 2009 (Springer) · 2009

    PDF / Link
  • On the Feasibility of Remote Attestation for Web Services

    Lyle, Martin

    SecureCom 2009: International Symposium on Secure Computing (IEEE) · 2009

    PDF / Link