Agent oriented analysis using MESSAGE/UML G Caire, W Coulier, F Garijo, J Gomez, J Pavon, F Leal, P Chainho, ... Agent-Oriented Software Engineering II: Second International Workshop, AOSE …, 2002 | 502 | 2002 |
Trust tokens MM Gifford, NH Edwards, PJ Kearney US Patent 7,627,895, 2009 | 283 | 2009 |
Towards a trust and contract management framework for dynamic virtual organisations T Dimitrakos, D Golby, P Kearney eAdoption and the Knowledge Economy: eChallenges 2004, 27-29, 2004 | 90 | 2004 |
MESSAGE: Methodology for engineering systems of software agents R Evans, P Kearney, G Caire, F Garijo, J Gomez Sanz, J Pavon, F Leal, ... EURESCOM, EDIN, 0223-0907, 2001 | 80 | 2001 |
Integrating AI planning techniques with workflow management system P Kearney Knowledge-Based Systems 15 (5-6), 285-291, 2002 | 58 | 2002 |
Regge theory and QCD in large-angle scattering PDB Collins, PJ Kearney Zeitschrift für Physik C Particles and Fields 22, 277-288, 1984 | 56 | 1984 |
Cyber security of smart homes: Development of a reference architecture for attack surface analysis K Ghirardello, C Maple, D Ng, P Kearney Living in the Internet of Things: Cybersecurity of the IoT-2018, 1-10, 2018 | 51 | 2018 |
An approach to modular and testable security models of real-world health-care applications AD Brucker, L Brügger, P Kearney, B Wolff Proceedings of the 16th ACM symposium on Access control models and …, 2011 | 51 | 2011 |
Verified firewall policy transformations for test case generation AD Brucker, L Brügger, P Kearney, B Wolff 2010 Third International Conference on Software Testing, Verification and …, 2010 | 49 | 2010 |
Cyber-risks in the industrial internet of things (IIoT): towards a method for continuous assessment C Adaros Boye, P Kearney, M Josephs Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018 | 36 | 2018 |
An overview of Web Services security P Kearney, J Chapman, N Edwards, M Gifford, L He BT Technology Journal 22 (1), 27-42, 2004 | 36 | 2004 |
Message level security for web services P Kearney Information Security Technical Report 10 (1), 41-50, 2005 | 31 | 2005 |
Work allocation system SG Thompson, TJ Stark, PJ Kearney US Patent 7,451,449, 2008 | 29 | 2008 |
Security: the human factor P Kearney IT Governance Publishing, 2010 | 28 | 2010 |
Embodiment of evolutionary computation in general agents RE Smith, C Bonacina, P Kearney, W Merlat Evolutionary Computation 8 (4), 475-493, 2000 | 27 | 2000 |
Dealing with trust and control: A meta-model for trustworthy information systems development M Pavlidis, H Mouratidis, S Islam, P Kearney 2012 Sixth International Conference on Research Challenges in Information …, 2012 | 22 | 2012 |
Modeling trust relationships for developing trustworthy information systems M Pavlidis, S Islam, H Mouratidis, P Kearney International Journal of Information System Modeling and Design (IJISMD) 5 …, 2014 | 21 | 2014 |
A model-based approach to trust, security and assurance A Baldwin, Y Beres, S Shiu, P Kearney BT Technology Journal 24 (4), 53-68, 2006 | 21 | 2006 |
Emergent behaviour in a multi-agent economic situation PE Kearney, A Sehmi, RM Smith Proceedings of the 11th European Conference on Artificial Intelligence, 284-288, 1994 | 21 | 1994 |
MESSAGE: a methodology for the development of agent-based applications W Coulier, F Garijo, J Gomez, J Pavon, P Kearney, P Massonet Methodologies and Software Engineering for Agent Systems-The Agent-Oriented …, 2004 | 19 | 2004 |