Provenance Management Overview Provenance refers to the chain of successive custody—including sources and operations of resources such as hardware, software, […]
TrustStoreTM We cannot take the things we treasure with us everywhere we go. Sometimes we do not even have room […]
Security and privacy protections are needed to increase the confidence on the wide deployment of Internet of Things (IoT) applications. […]
Database services in the cloud are attracting more companies to outsource their databases, since in this way the companies do […]
Mu is a micro-virtual-machine targeted at managed languages and intended as a verification target. The majority of software developers today work […]
A formally verified, optimising ML compiler, developed in collaboration with Cambridge, Chalmers, and Kent.
Formal models of concurrency and distributed systems for the specification, analysis and verification of network protocols and operating systems.
Microkernel mechanisms and execution time models for building complex systems that not only deliver, but deliver on time.
The Trustworthy Systems project is the overarching project of the Trustworthy Systems Research Group. Its aim is to fundamentally change […]