Michael Hitchens

Associate Professor

  • 833 Citations
  • 16 h-Index
1992 …2019
If you made any changes in Pure these will be visible here soon.

Research Outputs 1992 2019

Filter
Chapter
2014

A trust management framework for secure cloud data storage using cryptographic role-based access control

Zhou, L., Varadharajan, V. & Hitchens, M., 2014, E-Business and Telecommunications: International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013 Revised Selected Papers. Obaidat, M. S. & Filipe, J. (eds.). Heidelberg: Springer, Springer Nature, p. 226-251 26 p. (Communications in Computer and Information Science; vol. 456).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Access control
Data storage equipment
Security of data
Managers

Cryptographic role-based access control for secure cloud data storage systems

Zhou, L., Varadharajan, V. & Hitchens, M., 2014, Security, Privacy and Trust in Cloud Systems. Nepal, S. & Pathan, M. (eds.). Heidelberg: Springer, Springer Nature, p. 313-344 32 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Access control
Data storage equipment
Costs

Six questions

Hitchens, M., 2014, Peer review of learning and teaching in higher education: international perspectives. Sachs, J. & Parsell, M. (eds.). Dordrecht, Heidelberg, London, NewYork: Springer, Springer Nature, p. 85-102 18 p. (Professional Learning and Development in Schools and Higher Education; vol. 9).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

2009

ALOPA: authorization logic for property attestation in trusted platforms

Nagarajan, A., Varadharajan, V. & Hitchens, M., 2009, Autonomic and Trusted Computing: 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings. González Nieto, J., Reif, W., Wang, G. & Indulska, J. (eds.). Berlin: Springer, Springer Nature, p. 134-148 15 p. (Lecture Notes in Computer Science; vol. 5586).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Authorization
Access control
Logic
Specifications
Resources
2003

Role-based access control and the access control matrix

Saunders, G., Hitchens, M. & Varadharajan, V., 2003, Information and communications security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings. Qing, S., Gollmann, D. & Zhou, J. (eds.). Heidelberg, Germany: Springer, Springer Nature, p. 145-157 13 p. (Lecture notes in computer science; vol. 2836).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Role-based Access Control
Access Control
Access control
Matrix Models
Model
2001

RBAC for XML document stores

Hitchens, M. & Varadharajan, V., 2001, Information and Communications Security: Third International Conference, ICICS 2001 Xian, China, November 13-16, 2001 Proceedings. Qing, S., Okamoto, T. & Zhou, J. (eds.). Berlin: Springer, Springer Nature, Vol. 2229. p. 131-143 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2229).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Role-based Access Control
XML
Access Control
Access control
Control Policy
1999

Issues in the design of a language for role based access control

Hitchens, M. & Varadharajan, V., 1999, Information and Communication Security: Second International Conference, ICICS’99, Sydney, Australia, November 9-11, 1999. Proceedings. Varadharajan, V. & Mu, Y. (eds.). Berlin: Springer, Springer Nature, p. 22-38 17 p. (Lecture Notes in Computer Science; vol. 1726).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Role-based Access Control
Access control
Access Control
Control Policy
Control systems