Pete Bramhall
Hewlett-Packard
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Pete Bramhall.
database and expert systems applications | 2003
Marco Casassa Mont; Pete Bramhall; Keith Alexander Harrison
The management of private and confidential information is a major problem for dynamic organizations. Secure solutions are needed to exchange confidential documents, protect them against unauthorized accesses and cope with changes of peoples roles and permissions. Traditional cryptographic systems and PKI show their limitations, in terms of flexibility and manageability. This paper describes an innovative technical solution in the area of secure messaging that exploits identifier-based encryption (IBE) technology. It illustrates the advantages against a similar approach based on traditional cryptography and PKI. It discusses a few open issues. Our main contribution is a practical solutions based on IBE technology. A secure messaging system based on IBE has been fully implemented and it is currently used in a trial with a UK health service organization.
european symposium on research in computer security | 2003
Marco Casassa Mont; Siani Pearson; Pete Bramhall
Digital identities and profiles are valuable assets: they are more and more relevant to allow people to access services and information on the Internet. They need to be secured and protected. Unfortunately people have little control over the destiny of this information once it has been disclosed to third parties. People rely on enterprises and organizations for its management. In most cases this is a matter of trust. This paper describes an approach to make organizations more accountable, provide strong but not impregnable privacy enforcement mechanisms and allow users to be more involved in the management of the privacy of their confidential information. As part of our ongoing research, we introduce a technical solution based on ”sticky” privacy policies and tracing services that leverages Identifier-based Encryption (IBE) along with trusted platform technologies such as TCPA (TCG) and Tagged Operating Systems. Work is in progress to prototype this solution.
computational intelligence and security | 2009
Y Shen; Trevor P. Martin; Pete Bramhall
In this paper, we examine issues related to the research and applications of computational intelligence techniques in security data analysis. We focus on solve problems that involve incomplete, vague or uncertain information, which is difficult to come to a crisp solution. It is shown how an extended mass assignment framework can be used to extract relations between soft categories. These relations are association rules and are useful when integrating multiple information sources. Experimental results on terrorism incident databases and Web search logs, respectively relating to national security and user behaviour profiling, are demonstrated and discussed in this paper.
database and expert systems applications | 2003
Marco Casassa Mont; Siani Pearson; Pete Bramhall
ieee symposium on security and privacy | 2007
Pete Bramhall; Marit Hansen; Kai Rannenberg; Thomas Roessler
Archive | 2003
Marco Casassa Mont; Pete Bramhall; Joe Pato
database and expert systems applications | 2003
Marco Casassa Mont; Pete Bramhall; Chris R. Dalton; Keith Alexander Harrison
trust and privacy in digital business | 2005
Marco Casassa Mont; Robert Thyne; Pete Bramhall
Lecture Notes in Computer Science | 2005
Marco Casassa Mont; Robert Thyne; Pete Bramhall
trust and privacy in digital business | 2010
Gina Kounga; Marco Casassa Mont; Pete Bramhall