Search the dblp DataBase
Simon N. Foley :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Stefano Bistarelli , Simon N. Foley , Barry O'Sullivan Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints. [Citation Graph (0, 0)][DBLP ] AAAI, 2004, pp:808-813 [Conf ] Simon N. Foley Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:69-80 [Conf ] Simon N. Foley , Abe Singer , Michael E. Locasto , Stelios Sidiroglou , Angelos D. Keromytis , John McDermott , Julie Thorpe , Paul C. van Oorschot , Anil Somayaji , Richard Ford , Mark Bush , Alex Boulatov Highlights from the 2005 New Security Paradigms Workshop. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:393-396 [Conf ] Carla Marceau , Simon N. Foley Themes and Highlights of the New Security Paradigms Workshop 2004. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:382-383 [Conf ] Simon N. Foley The Specification and Implementation of ``Commercial'' Security Requirements Including Dynamic Segregation of Duties. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:125-134 [Conf ] Hongbin Zhou , Simon N. Foley Fast automatic synthesis of security protocols using backward search. [Citation Graph (0, 0)][DBLP ] FMSE, 2003, pp:1-10 [Conf ] Simon N. Foley Secure Information Flow Using Security Groups. [Citation Graph (0, 0)][DBLP ] CSFW, 1990, pp:62-72 [Conf ] Simon N. Foley Separation of Duty using High Water Marks. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:79-88 [Conf ] Simon N. Foley Reasoning about Confidentiality Requirements. [Citation Graph (0, 0)][DBLP ] CSFW, 1994, pp:150-160 [Conf ] Simon N. Foley , Jeremy Jacob Specifying security for CSCW systems. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:136-0 [Conf ] Hongbin Zhou , Simon N. Foley A Framework for Establishing Decentralized Secure Coalitions. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:270-282 [Conf ] Benjamin Aziz , Simon N. Foley , John Herbert , Garret Swart Configuring Storage Area Networks for Mandatory Security. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:357-370 [Conf ] Garret Swart , Benjamin Aziz , Simon N. Foley , John Herbert Trading Off Security in a Service Oriented Architecture. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:295-309 [Conf ] Simon N. Foley A Kernelized Architecture for Multilevel Secure Application Policies. [Citation Graph (0, 0)][DBLP ] ESORICS, 1998, pp:33-49 [Conf ] Simon N. Foley Using Trust Management to Support Transferable Hash-Based Micropayments. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:1-14 [Conf ] Stefano Bistarelli , Simon N. Foley , Barry O'Sullivan Reasoning about Secure Interoperation Using Soft Constraints. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2004, pp:173-186 [Conf ] Hongbin Zhou , Simon N. Foley A Logic for Analysing Subterfuge in Delegation Chains. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2005, pp:127-141 [Conf ] Simon N. Foley , William J. Fitzgerald , Stefano Bistarelli , Barry O'Sullivan , Mícheál Ó Foghlú Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration. [Citation Graph (0, 0)][DBLP ] IPOM, 2006, pp:168-180 [Conf ] Simon N. Foley , Thomas B. Quillinan , Maeve O'Connor , Barry P. Mulcahy , John P. Morrison A Framework for Heterogeneous Middleware Security. [Citation Graph (0, 0)][DBLP ] IPDPS, 2004, pp:- [Conf ] Thomas B. Quillinan , Brian C. Clayton , Simon N. Foley GridAdmin: Decentralising Grid Administration Using Trust Management. [Citation Graph (0, 0)][DBLP ] ISPDC/HeteroPar, 2004, pp:184-192 [Conf ] Simon N. Foley Evaluating System Integrity. [Citation Graph (0, 0)][DBLP ] Workshop on New Security Paradigms, 1998, pp:40-47 [Conf ] Simon N. Foley , John P. Morrison Computational paradigms and protection. [Citation Graph (0, 0)][DBLP ] NSPW, 2001, pp:3-11 [Conf ] Hongbin Zhou , Simon N. Foley A collaborative approach to autonomic security protocols. [Citation Graph (0, 0)][DBLP ] NSPW, 2004, pp:13-21 [Conf ] Barry P. Mulcahy , Simon N. Foley , John P. Morrison Cross Cutting Condensed Graphs. [Citation Graph (0, 0)][DBLP ] PDPTA, 2005, pp:965-973 [Conf ] Stefano Bistarelli , Simon N. Foley Analysis of Integrity Policies using Soft Constraints. [Citation Graph (0, 0)][DBLP ] POLICY, 2003, pp:77-80 [Conf ] Stefano Bistarelli , Simon N. Foley , Barry O'Sullivan Modeling and detecting the cascade vulnerability problem using soft constraints. [Citation Graph (0, 0)][DBLP ] SAC, 2004, pp:383-390 [Conf ] Stefano Bistarelli , Simon N. Foley A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2003, pp:130-143 [Conf ] Simon N. Foley , Thomas B. Quillinan , John P. Morrison Secure Component Distribution Using WebCom. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:387-398 [Conf ] Simon N. Foley A Universal Theory of Information Flow. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1987, pp:116-122 [Conf ] Simon N. Foley A Model for Secure Information Flow. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1989, pp:248-258 [Conf ] Simon N. Foley A Taxonomy for Information Flow Policies and Models. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1991, pp:98-109 [Conf ] Simon N. Foley , Li Gong , Xiaolei Qian A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:142-153 [Conf ] Simon N. Foley Trust Management and Whether to Delegate. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:151-157 [Conf ] Simon N. Foley Trust Management and Whether to Delegate (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:158-165 [Conf ] Simon N. Foley Supporting Imprecise Delegation in KeyNote. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2002, pp:179-188 [Conf ] Simon N. Foley Towards a Framework for Autonomic Security Protocols (Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:55-62 [Conf ] Simon N. Foley External Consistency and the Verification of Security Protocols (Position Paper). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:24-27 [Conf ] Simon N. Foley External Consistency and the Verification of Security Protocols (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:28-35 [Conf ] Simon N. Foley , Hongbin Zhou Towards a Framework for Autonomic Security Protocols. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:49-54 [Conf ] Simon N. Foley , Robert Dumigan Are handheld viruses a significant threat? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:1, pp:105-107 [Journal ] Simon N. Foley Building Chinese walls in standard unixTM . [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:6, pp:551-563 [Journal ] Giampaolo Bella , Stefano Bistarelli , Simon N. Foley Soft Constraints for Security. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:11-29 [Journal ] Simon N. Foley Believing the Integrity of a System: (Invited Talk). [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:3-12 [Journal ] Thomas B. Quillinan , Simon N. Foley Synchronisation in Trust Management Using Push Authorisation. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:143-158 [Journal ] Stefano Bistarelli , Simon N. Foley , Barry O'Sullivan A soft constraint-based approach to the cascade vulnerability problem. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:5, pp:699-720 [Journal ] Simon N. Foley Aggregation and Separation as Noninterference Properties. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1992, v:1, n:2, pp:159-188 [Journal ] Simon N. Foley , Jeremy Jacob Specifying Security for Computer Supported Collaborative Working. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1995, v:3, n:4, pp:233-254 [Journal ] Benjamin Aziz , Simon N. Foley , John Herbert , Garret Swart Reconfiguring Role Based Access Control policies using risk semantics. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2006, v:15, n:3, pp:261-273 [Journal ] Simon N. Foley , Barry P. Mulcahy , Thomas B. Quillinan , Meabh O'Connor , John P. Morrison Supporting heterogeneous middleware security policies in WebCom. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2006, v:15, n:3, pp:301-313 [Journal ] Brian C. Clayton , Thomas B. Quillinan , Simon N. Foley Automating security configuration for the Grid. [Citation Graph (0, 0)][DBLP ] Scientific Programming, 2005, v:13, n:2, pp:113-125 [Journal ] From Marriages to Coalitions: A Soft CSP Approach. [Citation Graph (, )][DBLP ] An Approach to Security Policy Configuration Using Semantic Threat Graphs. [Citation Graph (, )][DBLP ] Semantic Web and firewall alignment. [Citation Graph (, )][DBLP ] Network Access Control Interoperation using Semantic Web Techniques. [Citation Graph (, )][DBLP ] Authorisation Subterfuge by Delegation in Decentralised Networks. [Citation Graph (, )][DBLP ] Security in WebCom: addressing naming issues for a web services architecture. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.334secs