Fairer usage contracts for DRM A Arnab, A Hutchison Proceedings of the 5th ACM workshop on Digital rights management, 1-7, 2005 | 51 | 2005 |
Persistent access control: A formal model for drm A Arnab, A Hutchison Proceedings of the 2007 ACM workshop on Digital Rights Management, 41-53, 2007 | 49 | 2007 |
Generating network security protocol implementations from formal specifications B Tobler, ACM Hutchison Certification and Security in Inter-Organizational E-Service, 33-53, 2005 | 41 | 2005 |
Requirement analysis of enterprise DRM systems A Arnab, A Hutchison University of Cape Town, 2005 | 40 | 2005 |
Digital rights management-an overview of current challenges and solutions A Arnab, A Hutchison University of Cape Town, 2004 | 40 | 2004 |
Making the water move: techno-historic limits in the game aesthetics of Myst and Doom. A Hutchison Game Studies: the international journal of computer game research 8 (1), 2008 | 38 | 2008 |
Verifiable digital object identity system A Arnab, A Hutchison Proceedings of the ACM workshop on Digital rights management, 19-26, 2006 | 37 | 2006 |
Electronic data interchange for health care A Hutchison, M Kaiserswerth, M Moser, A Schade IEEE communications Magazine 34 (7), 28-34, 1996 | 37 | 1996 |
CSCW for strategic management in Swiss enterprises: an empirical study C Sauter, O Morger, T Mühlherr, A Hutchison, S Teufel Proceedings of the Fourth European Conference on Computer-Supported …, 1995 | 35 | 1995 |
An architecture for secure searchable cloud storage R Koletka, A Hutchison 2011 Information Security for South Africa, 1-7, 2011 | 33 | 2011 |
Security of mobile banking K Chikomo, MK Chong, A Arnab, A Hutchison University of Cape Town, South Africa, Tech. Rep., Nov 1, 1-10, 2006 | 33 | 2006 |
Enhancing Security Event Management Systems with Unsupervised Anomaly Detection. M Goldstein, S Asanger, M Reif, A Hutchison ICPRAM, 530-538, 2013 | 30 | 2013 |
Cyborgs, new technology, and the body: The changing nature of garments A Farren, A Hutchison Fashion Theory 8 (4), 461-475, 2004 | 30 | 2004 |
Security and reliability requirements for advanced security event management R Rieke, L Coppolino, A Hutchison, E Prieto, C Gaber Computer Network Security: 6th International Conference on Mathematical …, 2012 | 25 | 2012 |
Interfacing trusted applications with intrusion detection systems M Welz, A Hutchison International Workshop on Recent Advances in Intrusion Detection, 37-53, 2001 | 24 | 2001 |
Automated attack analysis and code generation in a multi-dimensional security protocol engineering framework S Lukell, A Hutchison University of Cape Town, 2003 | 22 | 2003 |
SPEAR II-The Security Protocol Engineering and Analysis Resource E Saul, A Hutchison University of Cape Town, 1999 | 22 | 1999 |
Digital rights management-a current review A Arnab, A Hutchison University of Cape Town, 2004 | 21 | 2004 |
SPEAR: Security protocol engineering and analysis resources JP Bekmann, P De Goede, ACM Hutchison DIMACS Workshop on Design and Formal Verification of Security Protocols, 3-5, 1997 | 20 | 1997 |
Experiences and challenges in enhancing security information and event management capability using unsupervised anomaly detection S Asanger, A Hutchison 2013 international conference on availability, reliability and security, 654-661, 2013 | 18 | 2013 |