Papers by Lindsay Marshall
Current mobile telecommunications providers conceal the records gathered about their subscribers ... more Current mobile telecommunications providers conceal the records gathered about their subscribers from other subscribers and non-subscribers but not from the mobile telecommunications providers themselves. Thanks to the availability of these records, mobile telecommunications providers ....
Drawing on the experience of running the Virtual Memorial Garden web site, this paper looks at so... more Drawing on the experience of running the Virtual Memorial Garden web site, this paper looks at some of the reasons why Internet memorials appeal to the thousands of people who have used the service it provides. Also touched on are the wider, social effects that this kind of use of the Internet may have in the future.
Programmers are constrained not just by conscious application of rules and procedures, but also b... more Programmers are constrained not just by conscious application of rules and procedures, but also by taboos that they have acquired as part of their formal education or informally from colleagues. These taboos usually embody perceived sound advice and have generally been concerned with the breaking of abstraction boundaries. However their effect can be to needlessly restrict the range of solutions to design problems that programmers consider. This paper examines a set of common programming taboos, and addresses both social aspects and technical reasons as to why programming taboos have arisen.
Computers and Writing, 1992
The management of computer systems for an organisation depends heavily on the policies of that or... more The management of computer systems for an organisation depends heavily on the policies of that organisation and requires proper computer-based support. This paper presents a way of representing policies in a machine usable form based around the idea of contracts between various parties. Also described is how the Tobias system, a system administrator's workbench, uses this representation to provide a safer environment for management
This paper extends the work described in "An Approach to the Formalisation of a Certification Pol... more This paper extends the work described in "An Approach to the Formalisation of a Certification Policy", 7th International Symposium on System and Information Security (SSI 2005) by developing the preliminary formalisation process. It addresses the issue of rating the trustworthiness level of entities holding certificates issued by otherwise unconnected Certification Authorities by defining a set of criteria that have to apply to the Certificate Policy (CP) that rules their certificates. A semantic meaning of these criteria is given in this paper.
IEEE EDUCON 2010 Conference, 2010
As part of the CETL ALiC initiative (Centre of Excellence in Teaching and Learning: Active Learni... more As part of the CETL ALiC initiative (Centre of Excellence in Teaching and Learning: Active Learning in Computing), undergraduate computing science students at Newcastle and Durham universities participate in a year long, inter-institutional group programming assignment. Teams of students act as "virtual companies" and collaborate cross-site to develop software products for real-world industrial clients. This paper investigates the emergence and autonomous adoption of social networking technologies in our students' communication strategies during the project, and explores the role that "status awareness" (knowledge of the current activities of one's team mates) had on the outcome of that collaboration. We also present and discuss the findings of a recent trial of CommonGround, an application created to harness our students' pre-existing engagement with social networking technologies such as Facebook.
ACM SIGCSE Bulletin, 2008
... uk Lindsay Marshall School of Computing Science Newcastle University Newcastle upon Tyne +44-... more ... uk Lindsay Marshall School of Computing Science Newcastle University Newcastle upon Tyne +44-191-222-8267 [email protected] ... 95-100. [5] Wellman, B. and Haase, AQ and Witte, J. and Hampton, K. (2001). Does ...
Software: Practice and Experience, 1982
In this paper we describe a software subsystem that can be added to each of a set of physically i... more In this paper we describe a software subsystem that can be added to each of a set of physically interconnected UNIX or UNIX look-alike systems, so as to construct a distributed system which is functionally indistinguishable at both the user and the program level from a conventional singleprocessor UNIX system. The techniques used are applicable to a variety and multiplicity of both local and wide area networks, and enable all issues of inter-processor communication, network protocols, etc., to be hidden. A brief account is given of experience with such a distributed system, which is currently operational on a set of PDP11s connected by a Cambridge Ring. The final sections compare our scheme to various precursor schemes and discuss its potential relevance to other operating systems.
Software: Practice and Experience, 1986
ABSTRACT The UNIX† operating system has been extended to support a crash resistant file system. T... more ABSTRACT The UNIX† operating system has been extended to support a crash resistant file system. This paper describes the modifications which were made to the UNIX kernel to support such a file system and the associated recovery facilities for maintaining the internal consistency of files despite the failure of the host processor, transient hardware failures and decay of the storage medium.
Uploads
Papers by Lindsay Marshall