King's College London

Research portal

Research Outputs

  1. 2018
  2. Haptic Information Gain in Remote Soft Tissue Examination Using a Controllable Stiffness Robotic Probe

    Weheliye, A., Sornkarn, N., Dasgupta, P. & Nanayakkara, T., 1 Dec 2018, 2018 IEEE 9th International Conference on Information and Automation for Sustainability, ICIAfS 2018. Institute of Electrical and Electronics Engineers Inc., 8913340

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  3. 2016
  4. Towards safer obstacle avoidance for continuum-style manipulator in dynamic environments

    Rizqi, A., Qi, P., Shiva, A., Shafti, A., Wurdemann, H., Dasgupta, P. & Althoefer, K., 28 Jul 2016, Proceedings of the IEEE RAS and EMBS International Conference on Biomedical Robotics and Biomechatronics. IEEE Computer Society Press, Vol. 2016-July. p. 600-605 6 p. 7523691

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  5. 2014
  6. The granular jamming integrated actuator

    Jiang, A., Adejokun, S., Faragasso, A., Althoefer, K., Nanayakkara, T. & Dasgupta, P., 2014, 2014 International Conference on Advanced Robotics and Intelligent Systems, ARIS 2014. IEEE Computer Society Press, p. 12-17 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  7. 2013
  8. A Two Party Haptic Guidance Controller Via a Hard Rein

    Dissanayake Mudiyanselage, A., Penders, J., Dasgupta, P., Althoefer, K. & Nanayakkara, T., 4 Nov 2013, 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) . Tokyo, Japan, p. 116 122 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  9. An optimal state dependent haptic guidance controller via a hard rein

    Ranasinghe, A., Althoefer, K., Nanayakkara, T., Penders, J. & Dasgupta, P., Oct 2013, Proceedings - 2013 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2013. IEEE, p. 2322-2327 6 p. 6722150

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  10. Evaluating manual palpation trajectory patterns in tele-manipulation for soft tissue examination

    Konstantinova, J., Li, M., Aminzadeh, V., Althoefer, K., Nanayakkara, T. & Dasgupta, P., Oct 2013, Proceedings - 2013 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2013. IEEE, p. 4190-4195 6 p. 6722467

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  11. Granular jamming with hydraulic control

    Jiang, A., Aste, T., Dasgupta, P., Althoefer, K. & Nanayakkara, T., 8 Aug 2013, Proceedings of the ASME Design Engineering Technical Conference. American Society of Mechanical Engineers, Vol. 6 A. 7 p. V06AT07A021

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  12. Granular Jamming Transitions for a Robotic Mechanism

    Jiang, A., Aste, T., Dasgupta, P., Althoefer, K. & Nanayakkara, T., 2013, POWDERS AND GRAINS 2013: Proceedings of the 7th International Conference on Micromechanics of Granular Media. Yu, A., Dong, K., Yang, R. & Luding, S. (eds.). MELVILLE: Amer Inst Physics, p. 385-388 4 p. (AIP Conference Proceedings; vol. 1542).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  13. 2012
  14. Design of a Variable Stiffness Flexible Manipulator with Composite Granular Jamming and Membrane Coupling

    Jiang, A., Xynogalas, G., Dasgupta, P., Althoefer, K. & Nanayakkara, T., 2012, 2012 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS). IEEE, p. 2922-2927 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  15. 2010
  16. A Logic of Privacy

    Barker, S. & Genovese, V., 2010, DBSec. Unknown Publisher, Vol. 6166 LNCS. p. 17 - 32 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  17. Miniaturized Triaxial Optical Fiber Force Sensor for MRI-Guided Minimally Invasive Surgery

    Puangmali, P., Dasgupta, P., Seneviratne, L. D. & Althoefer, K., 2010, Unknown. NEW YORK: IEEE, p. 2592 - 2597 6 p. (2010 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA)).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  18. Personalizing access control by generalizing access control

    Barker, S., 2010, SACMAT. Unknown Publisher, p. 149 - 158 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  19. 2009
  20. A Haptic Probe for Soft Tissue Abnormality Identification during Minimally Invasive Surgery

    Liu, H., Elhage, O., Dasgupta, P., Challacombe, B., Murphy, D., Seneviratne, L. & Althoefer, K., 2009, Reconfigurable mechanisms and robots: International conference, 2009. GENOVA: KC Edizioni, p. 436 - 441 6 p. (RECONFIGURABLE MECHANISMS AND ROBOTS).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  21. The Next 700 Access Control Models or a Unifying Meta-Model?

    Barker, S., 2009, SACMAT '09: 14th ACM Symposium on Access Control Models and Technologies. NEW YORK: ASSOC COMPUTING MACHINERY, p. 187 - 196 10 p. (SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  22. 2008
  23. Access Control by Action Control

    Barker, S., 2008, Unknown. NEW YORK: ASSOC COMPUTING MACHINERY, p. 143 - 152 10 p. (SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  24. Dynamic Meta-level Access Control in SQL

    Barker, S., 2008, Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security. Unknown Publisher, Vol. 5094 LNCS. p. 1 - 16 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  25. What are the key challenges in Distributed Security?

    Barker, S., Chadwick, D., Crampton, J., Lupu, E. & Thusaisingham, B. M., 2008, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security. Unknown Publisher, p. 219 - 221 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  26. Wheel/Tissue Force Interaction: A New Concept for Soft Tissue Diagnosis during MIS

    Zbyszewski, D., Liu, H., Puangmali, P., Althoefer, K., Nunes, C. S., Seneviratne, L. D., Challacombe, B., Murphy, D. & Dasgupta, P., 2008, Engineering in Medicine and Biology Society, 2008. EMBS 2008. 30th Annual International Conference of the IEEE. NEW YORK: IEEE, p. 5556 - 5559 4 p. (2008 30TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-8).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  27. 2007
  28. Action-status access control

    Barker, S., 2007, SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies. (Pages 195-204). NEW YORK: ACM, p. 195 - 204 10 p. (Symposium on Access Control Models and Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  29. Data and Applications Security XXI

    Barker, S. & Ahn, G-J., 2007, 21s Annual IFIP WG 11.3 Working Conference on Data and Applications Security. Unknown Publisher, Vol. 4602 LNCS. p. 0000 - 0000 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  30. Dynamic Event-Based Access Control as Term Rewriting

    Bertolissi, C., Fernandez, M. & Barker, S., 2007, Proceedings, Data and Applications Security, Lecture Notes in Computer Science. Springer, Vol. 4602 LNCS. p. ?? - ?? 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  31. Secure knowledge exchange by policy algebra and ERML

    Barker, S., Douglas, P., Cardoso, J. (ed.), Cordoso, J. (ed.) & Filipe, J. (ed.), 2007, Iceis 2007: Proceedings of the Ninth International Conference on Enterprise Information Systems - Databases and Information Systems Integration. SETUBAL: INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL & COMMUNICATION, p. 212 - 217 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  32. 2006
  33. Term Rewriting for Access Control

    Barker, S. & Fernandez, M., 2006, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Lecture Notes in Computer Science. Springer, Vol. 4127 LNCS. p. 179 - 193 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  34. 2005
  35. An E-learning tool for Database Administration

    Douglas, P. & Barker, S., 2005, International Conference on Information Technology : Coding and Computing. IEEE Computer Society, Vol. 1. p. 453 - 458 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  36. An Intelligent Tutoring System for Program Semantics

    Barker, S. & Douglas, P., 2005, International Conference on Information Technology: Coding and Computing. IEEE Computer Society, Vol. 1. p. 482 - 487 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  37. 2004
  38. Access policy specification for Web applications

    Barker, S., 2004, ITCC 2004. International Conference on Information Technology: Coding and Computing, 2004. Proceedings.. LOS ALAMITOS: IEEE, Vol. 2. p. 45 - 49 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  39. An Intelligent Tutoring System for Database Transaction Processing

    Barker, S. & Douglas, P., 2004, ICEIS 2004, Proceedings of the 6th International Conference on Enterprise Information Systems. p. 197-203 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  40. Dependency Theory E-Learning Tool

    Barker, S. & Douglas, P., 2004, IEEE international Conference on Information Technology. Unknown Publisher, Vol. 1. p. 151 - 155 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  41. Efficient and flexible access control via logic program specialisation

    Barker, S., Leuschel, M. & Varea, M., 2004, Proceedings of the 2004 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation. ACM New York, NY, USA, p. 190 - 199 10 p. (ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  42. Labeled Logic Programs

    Barker, S., 2004, Logic Programming: 20th International Conference, ICLP 2004, Saint-Malo, France, September 6-10, 2004: proceedings. N/A ed. Berlin: Springer, Vol. N/A. p. 448-449 2 p. (Lecture notes in computer science; vol. 3132).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  43. Protecting federated databases using a practical implementation of a formal RBAC policy

    Barker, S. & Douglas, P., 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. LOS ALAMITOS: IEEE COMPUTER SOC, p. 523 - 527 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  44. RBAC policy implementation for SQL databases

    DeCapitaniDiVimercati, S., Ray, I. (ed.) & Ray, I. (ed.), 2004, INT FED INFO PROC. NORWELL: Kluwer Academic Publishers, p. 288 - 301 14 p. (INTERNATIONAL FEDERATION FOR INFORMATION PROCESSING).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  45. 2003
  46. A Meta-Programming Approach for Protecting Deductive Databases

    Barker, S., 2003, 16th Working Group Conference in Data and Applications Security. Unknown Publisher, p. 0000 - 0000 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  47. A Web-based Tutorial System for Understanding Transaction Processing

    Barker, S. & Douglas, P., 2003, BCS LTSN-ICS Workshop on Teaching, Learning and Assessment in Databases. Unknown Publisher, p. 30 - 33 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  48. Access Control using PL/SQL

    Barker, S., Douglas, P. & Fanning, T., 2003, 16th Working Group Conference in Data and Applications Security. Unknown Publisher, p. 0000 - 0000 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  49. An E-learning Tool for Schedule Properties

    Barker, S. & Douglas, P., 2003, IEEE International Conference on Information Technology: Coding and Computing. Unknown Publisher, p. 78 - 89 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  50. An e-learning tool for understanding schedule properties

    Srimani, P. K., Bein, W. (ed.), Hashemi, R. (ed.), Lawrence, E. (ed.), Cannataro, M. (ed.), Regentova, E. (ed.) & Spink, A. (ed.), 2003, Unknown. LOS ALAMITOS: IEEE COMPUTER SOC, p. 53 - 57 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  51. Distributed access control: A logic-based approach

    Gorodetsky, V., Popyack, L. (ed.) & Skormin, V. (ed.), 2003, LECT NOTE COMPUT SCI. BERLIN: Springer, p. 217 - 228 12 p. (LECTURE NOTES IN COMPUTER SCIENCE).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  52. Extended Protected Databases

    Barker, S. & Douglas, P., 2003, 5th International Conference on Enterprise Information Systems. Unknown Publisher, p. 453 - 459 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  53. Implementing RBAC policies

    Barker, S., Douglas, P. & Fanning, T., 2003, Research Directions In Data And Applications Security. Gudes, E. & Shenoi, S. (eds.). N/A ed. Norwell: Kluwer Academic Publishers, Vol. N/A. p. 27 - 36 10 p. (International Federation For Information Processing; vol. 128).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  54. Practical RBAC Policy Implementation for SQL Databases

    Barker, S. & Douglas, P., 2003, 17th IFIP WG 11.3 Working Conference on Database and Application Security. Unknown Publisher, p. 288 - 301 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  55. 2002
  56. Access control for deductive databases by logic programming

    Stuckey, P. J., 2002, LECT NOTE COMPUT SCI. BERLIN: Springer, p. 54 - 69 16 p. (LECTURE NOTES IN COMPUTER SCIENCE).

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  57. Flexible Security Policies in SQL

    Barker, S. & Rosenthal, A., 2002, 15th IFIP Working Group Conference on Database Security. Unknown Publisher, p. 167 - 180 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  58. SPITS: A Schedule Properties Teaching Tool

    Barker, S. & Douglas, P., 2002, 5th International Conference on Computers and Advanced Technology. Unknown Publisher, p. 78 - 89 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  59. 2001
  60. Information Security: A Logic-Based Approach

    Barker, S., 2001, 2nd International Conference n Enterprise Informations Systems. Unknown Publisher, p. 36 - 41 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  61. Protecting Deductive Databases from Unauthorized Retrievals

    Barker, S., 2001, 14th IFIP Working Group Conference on Database Security. Unknown Publisher, p. 185 - 196 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  62. Secure Deductive Databases

    Barker, S., 2001, 3rd International Symposium on Practical Applications of Declarative Languages. Unknown Publisher, p. 123 - 137 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  63. TRBACN: A Temporal Authorization Model

    Barker, S., 2001, MMMANCS International Workshop on Network Security. Unknown Publisher, p. 178 - 188 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

  64. 2000
  65. Data Protection by Logic Programming

    Barker, S., 2000, 1st International Conference on Computational Logic. Unknown Publisher, p. 1300 - 1313 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paper

Export:RIS BibTex Word PDF - will at most contain 500 items

Refine results Clear filters

Language

Language

Publication year

Publication year

Full text

Full text

Meeting and poster abstracts

© 2018 King's College London | Strand | London WC2R 2LS | England | United Kingdom | Tel +44 (0)20 7836 5454