Personal information

United Kingdom

Activities

Employment (1)

University of Oxford: Oxford, Oxfordshire, GB

1999-09-01 to present | Professor of Systems Security (Department of Computer Science)
Employment
Source: Self-asserted source
Andrew Martin

Funding (5)

Security and Privacy in Smart Grid Systems: Countermeasure and Formal Verification

Source: Self-asserted source
Andrew Martin via DimensionsWizard

Oxford University Centre for Doctoral Training in Cyber Security

Source: Self-asserted source
Andrew Martin via DimensionsWizard

Academic Centre of Excellence in Cyber Security Research -University of Oxford

Source: Self-asserted source
Andrew Martin via DimensionsWizard

Trust Domains - A framework for modelling and designing e-service infrastructures for controlled sharing of information

Source: Self-asserted source
Andrew Martin via DimensionsWizard

myTrustedCloud: Towards a virtual private cloud

2011-02-01 to 2011-10-13 | Grant
Engineering and Physical Sciences Research Council (Swindon, GB)
GRANT_NUMBER: EP/I03436X/1
Source: Self-asserted source
Andrew Martin via DimensionsWizard

Works (50 of 78)

Items per page:
Page 1 of 2

Assessing the Cross-Disciplinary Accessibility of CyBOK

2024 | Book chapter
Contributors: Steven Furnell; Xavier Carpent; Andrew Martin
Source: check_circle
Crossref

But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade Routers

2023-10-16 | Conference paper
Contributors: George Chalhoub; Andrew Martin
Source: check_circle
Crossref

SoK: How Not to Architect Your Next-Generation TEE Malware?

2022-10 | Conference paper
Contributors: Kubilay Ahmet Küçük; Steve Moyle; Andrew Martin; Alexandru Mereacre; Nicholas Allott
Source: check_circle
Crossref

Cybersecurity service level agreements: understanding government data confidentiality requirements

Journal of Cybersecurity
2022-01-28 | Journal article
Contributors: Yudhistira Nugraha; Andrew Martin
Source: check_circle
Crossref

Towards a framework for trustworthy data security level agreement in cloud procurement

Computers & Security
2021-07 | Journal article
Contributors: Yudhistira Nugraha; Andrew Martin
Source: check_circle
Crossref

Exploring HTTPS security inconsistencies: A cross-regional perspective

Computers & Security
2020-10 | Journal article
Contributors: Eman Salem Alashwali; Pawel Szalachowski; Andrew Martin
Source: check_circle
Crossref

Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues

IEEE Communications Surveys & Tutorials
2019 | Journal article
Contributors: Pardeep Kumar; Yun Lin; Guangdong Bai; Andrew Paverd; Jin Song Dong; Andrew Martin
Source: check_circle
Crossref

CSCCRA: A Novel Quantitative Risk Assessment Model for SaaS Cloud Service Providers

Computers
2019-09-08 | Journal article
Contributors: Olusola Akinrolabu; Steve New; Andrew Martin
Source: check_circle
Crossref

Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks

IEEE Transactions on Smart Grid
2019-07 | Journal article
Contributors: Pardeep Kumar; Andrei Gurtov; Mangal Sain; Andrew Martin; Phuong H. Ha
Source: check_circle
Crossref

Efficient and Provably Secure Key Agreement for Modern Smart Metering Communications

Energies
2018-10-06 | Journal article
Contributors: An Braeken; Pardeep Kumar; Andrew Martin
Source: check_circle
Crossref

Efficient and Privacy-Preserving Data Aggregation and Dynamic Billing in Smart Grid Metering Networks

Energies
2018-08 | Journal article
Source: check_circle
Multidisciplinary Digital Publishing Institute
grade
Preferred source (of 2)‎

An evolutionary game-theoretic framework for cyber-threat information sharing

IEEE International Conference on Communications
2015 | Conference paper
EID:

2-s2.0-84953745168

Contributors: Tosh, D.; Sengupta, S.; Kamhoua, C.; Kwiat, K.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security

Proceedings - International Conference on Software Engineering
2015 | Conference paper
EID:

2-s2.0-84951794865

Contributors: Simpson, A.; Martin, A.; Cremers, C.; Flechais, I.; Martinovic, I.; Rasmussen, K.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Privacy-enhanced bi-directional communication in the Smart Grid using trusted computing

2014 IEEE International Conference on Smart Grid Communications, SmartGridComm 2014
2015 | Conference paper
EID:

2-s2.0-84922440392

Contributors: Paverd, A.; Martin, A.; Brown, I.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

KEDS: Decentralised network security for the smart home environment

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | Book
EID:

2-s2.0-84927587270

Contributors: King-Lacroix, J.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Security and privacy in smart grid demand response systems

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | Book
EID:

2-s2.0-84927634967

Contributors: Paverd, A.; Martin, A.; Brown, I.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Threat-based security analysis for the internet of things

Proceedings - 2014 International Workshop on Secure Internet of Things, SIoT 2014
2014 | Conference paper
EID:

2-s2.0-84926433807

Contributors: Atamli, A.W.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

TrustFound: Towards a formal foundation for model checking trusted computing platforms

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | Book
EID:

2-s2.0-84900328943

Contributors: Bai, G.; Hao, J.; Wu, J.; Liu, Y.; Liang, Z.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks: Foreword

WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks
2014 | Conference paper
EID:

2-s2.0-84907383807

Contributors: Martin, A.; Martinovic, I.; Castelluccia, C.; Traynor, P.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

A taxonomy for securely sharing information among others in a trust domain

2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013
2013 | Conference paper
EID:

2-s2.0-84896674625

Contributors: Arachchilage, N.A.G.; Namiluko, C.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Hardware security for device authentication in the smart grid

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84893115938

Contributors: Paverd, A.J.; Martin, A.P.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

A survey of trust in workflows and relevant contexts

IEEE Communications Surveys and Tutorials
2012 | Journal article
EID:

2-s2.0-84864579042

Contributors: Viriyasitavat, W.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

BottleCap: A credential manager for capability systems

Proceedings of the ACM Conference on Computer and Communications Security
2012 | Conference paper
EID:

2-s2.0-84869464276

Contributors: King-Lacroix, J.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Enterprise IT Architecture in Large Federated Organizations: The Art of the Possible

Information Systems Management
2012 | Journal article
EID:

2-s2.0-84859597295

Contributors: Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

MyTrustedCloud: Trusted Cloud Infrastructure for security-critical computation and data management

ACM International Conference Proceeding Series
2012 | Conference paper
EID:

2-s2.0-84866879126

Contributors: Wallom, D.; Turilli, M.; Martin, A.; Raun, A.; Taylor, G.; Hargreaves, N.; McMoran, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

On the design and development of webinos: A distributed mobile application middleware

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | Book
EID:

2-s2.0-84862742709

Contributors: Lyle, J.; Faily, S.; Fléchais, I.; Paul, A.; Göker, A.; Myrhaug, H.; Desruelle, H.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Provenance-based model for verifying trust-properties

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | Book
EID:

2-s2.0-84863088437

Contributors: Namiluko, C.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

SWSpec: The requirements specification language in service workflow environments

IEEE Transactions on Industrial Informatics
2012 | Journal article
EID:

2-s2.0-84864571593

Contributors: Viriyasitavat, W.; Xu, L.D.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

TMR: Towards a trusted MapReduce infrastructure

Proceedings - 2012 IEEE 8th World Congress on Services, SERVICES 2012
2012 | Conference paper
EID:

2-s2.0-84867261216

Contributors: Ruan, A.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Using propositional logic for requirements verification of service workflow

IEEE Transactions on Industrial Informatics
2012 | Journal article
EID:

2-s2.0-84864552907

Contributors: Xu, L.D.; Viriyasitavat, W.; Ruchikachorn, P.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

A multiple comparative study of test-with development product changes and their effects on team speed and product quality

Empirical Software Engineering
2011 | Journal article
EID:

2-s2.0-79953171863

Contributors: Bannerman, S.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Achieving attestation with less effort: An indirect and configurable approach to integrity reporting

Proceedings of the ACM Conference on Computer and Communications Security
2011 | Conference paper
EID:

2-s2.0-80755167791

Contributors: Huh, J.H.; Kim, H.; Lyle, J.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

An abstract model of a trusted platform

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011 | Book
EID:

2-s2.0-82055200276

Contributors: Namiluko, C.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Formalizing trust requirements and specification in service workflow environments

ICEIS 2011 - Proceedings of the 13th International Conference on Enterprise Information Systems
2011 | Conference paper
EID:

2-s2.0-84865151400

Contributors: Viriyasitavat, W.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

In the relation of workflow and trust characteristics, and requirements in service workflows

Communications in Computer and Information Science
2011 | Book
EID:

2-s2.0-82955189776

Contributors: Viriyasitavat, W.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Insiders analysis in cloud computing focusing on home healthcare system

2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011
2011 | Conference paper
EID:

2-s2.0-84857495993

Contributors: Abbadi, I.M.; Namiluko, C.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Managing application whitelists in trusted distributed systems

Future Generation Computer Systems
2011 | Journal article
EID:

2-s2.0-77958016981

Contributors: Huh, J.H.; Lyle, J.; Namiluko, C.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

MyTrustedCloud: Trusted cloud infrastructure for security-critical computation and data managment

Proceedings - 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011
2011 | Conference paper
EID:

2-s2.0-84857166447

Contributors: Wallom, D.; Turilli, M.; Martin, A.; Raun, A.; Taylor, G.; Hargreaves, N.; McMoran, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

RepCloud: Achieving fine-grained cloud TCB attestation with reputation systems

Proceedings of the ACM Conference on Computer and Communications Security
2011 | Conference paper
EID:

2-s2.0-80755143417

Contributors: Ruan, A.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Secure virtual layer management in clouds

Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011
2011 | Conference paper
EID:

2-s2.0-84856179202

Contributors: Abbadi, I.M.; Alawneh, M.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Trust in the cloud

Information Security Technical Report
2011 | Journal article
EID:

2-s2.0-84857366721

Contributors: Abbadi, I.M.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Trustworthy middleware services in the cloud

International Conference on Information and Knowledge Management, Proceedings
2011 | Conference paper
EID:

2-s2.0-83255189761

Contributors: Abbadi, I.M.; Deng, M.; Nalin, M.; Martin, A.; Petkovic, M.; Baroni, I.; Sanna, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Verifying trustworthiness of virtual appliances in collaborative environments

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011 | Book
EID:

2-s2.0-79959461157

Contributors: Namiluko, C.; Huh, J.H.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

A resurgence of interest in Information Architecture

International Journal of Information Management
2010 | Journal article
EID:

2-s2.0-73649114528

Contributors: Martin, A.; Dmitriev, D.; Akeroyd, J.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

A verification system for interval-based specification languages

ACM Transactions on Software Engineering and Methodology
2010 | Journal article
EID:

2-s2.0-77951847231

Contributors: Chen, C.; Dong, J.S.; Sun, J.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Embedding e-research applications: Designing for usability: Trusted computing platforms

World Wide Research: Reshaping the Sciences and Humanities
2010 | Book
EID:

2-s2.0-84895050733

Contributors: Martin, A.; de la Flor, G.; Jirotka, M.; Lloyd, S.; Warr, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Engineering attestable services

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Book
EID:

2-s2.0-77954734113

Contributors: Lyle, J.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Evolving 3D buildings for the prototype video game subversion

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Book
EID:

2-s2.0-77952403525

Contributors: Martin, A.; Lim, A.; Colton, S.; Browne, C.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Formal trust specification in service workflows

Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010
2010 | Conference paper
EID:

2-s2.0-79951788068

Contributors: Viriyasitavat, W.; Martin, A.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier

Towards a framework for security in eScience

Proceedings - 2010 6th IEEE International Conference on e-Science, eScience 2010
2010 | Conference paper
EID:

2-s2.0-79951822402

Contributors: Martin, A.; Davies, J.; Harris, S.
Source: Self-asserted source
Andrew Martin via Scopus - Elsevier
Items per page:
Page 1 of 2