Ken Moody

1.9k total citations
44 papers, 1.0k citations indexed

About

Ken Moody is a scholar working on Computer Networks and Communications, Sociology and Political Science and Artificial Intelligence. According to data from OpenAlex, Ken Moody has authored 44 papers receiving a total of 1.0k indexed citations (citations by other indexed papers that have themselves been cited), including 25 papers in Computer Networks and Communications, 23 papers in Sociology and Political Science and 23 papers in Artificial Intelligence. Recurrent topics in Ken Moody's work include Access Control and Trust (21 papers), Security and Verification in Computing (15 papers) and Cryptography and Data Security (12 papers). Ken Moody is often cited by papers focused on Access Control and Trust (21 papers), Security and Verification in Computing (15 papers) and Cryptography and Data Security (12 papers). Ken Moody collaborates with scholars based in United Kingdom, South Sudan and New Zealand. Ken Moody's co-authors include Jean Bacon, Walt Yao, David Eyers, Richard Hayton, John A. Bates, Nathan Dimmock, Peter Pietzuch, Kerry Rodden, Jatinder Singh and Martin Richards and has published in prestigious journals such as Communications of the ACM, Computer and Lecture notes in computer science.

In The Last Decade

Ken Moody

37 papers receiving 843 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ken Moody United Kingdom 17 566 512 460 378 74 44 1.0k
A. Ghafoor United States 13 354 0.6× 239 0.5× 370 0.8× 245 0.6× 107 1.4× 19 671
Günter Karjoth Switzerland 15 415 0.7× 470 0.9× 501 1.1× 298 0.8× 24 0.3× 41 1.0k
Ramaswamy Chandramouli United States 11 1.4k 2.5× 1.3k 2.5× 458 1.0× 853 2.3× 31 0.4× 40 1.8k
Charles P. Pfleeger United States 7 121 0.2× 279 0.5× 254 0.6× 365 1.0× 65 0.9× 22 714
Luigi Logrippo Canada 17 243 0.4× 533 1.0× 279 0.6× 452 1.2× 35 0.5× 99 975
Andrzej Uszok United States 11 284 0.5× 358 0.7× 198 0.4× 335 0.9× 38 0.5× 41 651
Serban I. Gavrila United States 9 1.5k 2.7× 1.4k 2.7× 442 1.0× 826 2.2× 23 0.3× 24 1.9k
David Ferraiolo United States 12 903 1.6× 798 1.6× 277 0.6× 475 1.3× 21 0.3× 22 1.1k
Stuart G. Stubblebine United States 16 296 0.5× 735 1.4× 546 1.2× 665 1.8× 52 0.7× 38 1.2k
Leo A. Meyerovich United States 12 278 0.5× 568 1.1× 316 0.7× 513 1.4× 35 0.5× 19 1.0k

Countries citing papers authored by Ken Moody

Since Specialization
Citations

This map shows the geographic impact of Ken Moody's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ken Moody with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ken Moody more than expected).

Fields of papers citing papers by Ken Moody

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ken Moody. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ken Moody. The network helps show where Ken Moody may publish in the future.

Co-authorship network of co-authors of Ken Moody

This figure shows the co-authorship network connecting the top 25 collaborators of Ken Moody. A scholar is included among the top collaborators of Ken Moody based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ken Moody. Ken Moody is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Eyers, David, et al.. (2010). Relational database support for event-based middleware functionality. 160–171. 4 indexed citations
2.
Bacon, Jean, et al.. (2006). Transactions in Distributed Event-Based Middleware. 53–53. 2 indexed citations
3.
Eyers, David, Jean Bacon, & Ken Moody. (2006). OASIS role-based access control for electronic health records. IEE Proceedings - Software. 153(1). 16–16. 27 indexed citations
4.
Bacon, Jean, et al.. (2005). Integrating databases with publish/subscribe. 392–397. 20 indexed citations
5.
Eyers, David & Ken Moody. (2004). Credential negotiation with limited disclosure via iterative range refinement in an unordered space. 427–430. 1 indexed citations
6.
Bacon, Jean, Ken Moody, & Walt Yao. (2003). Access control and trust in the use of widely distributed services. Software Practice and Experience. 33(4). 375–394. 31 indexed citations
7.
Eyers, David, et al.. (2003). Role-based access control for publish/subscribe middleware architectures. 1–8. 56 indexed citations
8.
9.
Bacon, Jean, et al.. (2002). Access control for a modular, extensible storage service. 108–114. 1 indexed citations
10.
Moody, Ken, et al.. (2002). Data consistency in a distributed persistent object system. se 11. 635–644.
11.
Yao, Walt, Ken Moody, & Jean Bacon. (2001). A model of OASIS role-based access control and its support for active security. 171–181. 68 indexed citations
12.
Yao, Walt, et al.. (2000). An architecture for distributed OASIS services. Lecture notes in computer science. 104–120. 32 indexed citations
13.
Moody, Ken, et al.. (1997). Cobra: a new approach to IR system design. 425–449. 9 indexed citations
14.
Moody, Ken, et al.. (1996). A Competitive Environment for Parallel Applications on Heterogeneous Workstation Clusters. Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University). 3 indexed citations
15.
Hayton, Richard, Jean Bacon, John A. Bates, & Ken Moody. (1996). Using events to build large scale distributed applications. 9–16. 18 indexed citations
16.
Hayton, Richard & Ken Moody. (1996). An open architecture for secure interworking services. 233–240. 11 indexed citations
17.
Bacon, Jean, et al.. (1994). Extensible access control for a hierarchy of servers. ACM SIGOPS Operating Systems Review. 28(3). 4–15. 6 indexed citations
18.
Moody, Ken. (1992). An Introduction to Formal Languages and Automata. The Computer Journal. 35(2). 176–176. 68 indexed citations
19.
Bacon, Jean, et al.. (1991). A multi-service storage architecture. ACM SIGOPS Operating Systems Review. 25(4). 47–65. 6 indexed citations
20.
Moody, Ken & Martin Richards. (1980). A coroutine mechanism for BCPL. Software Practice and Experience. 10(10). 765–771. 8 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026