The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Simon N. Foley: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan
    Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints. [Citation Graph (0, 0)][DBLP]
    AAAI, 2004, pp:808-813 [Conf]
  2. Simon N. Foley
    Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:69-80 [Conf]
  3. Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov
    Highlights from the 2005 New Security Paradigms Workshop. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:393-396 [Conf]
  4. Carla Marceau, Simon N. Foley
    Themes and Highlights of the New Security Paradigms Workshop 2004. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:382-383 [Conf]
  5. Simon N. Foley
    The Specification and Implementation of ``Commercial'' Security Requirements Including Dynamic Segregation of Duties. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:125-134 [Conf]
  6. Hongbin Zhou, Simon N. Foley
    Fast automatic synthesis of security protocols using backward search. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:1-10 [Conf]
  7. Simon N. Foley
    Secure Information Flow Using Security Groups. [Citation Graph (0, 0)][DBLP]
    CSFW, 1990, pp:62-72 [Conf]
  8. Simon N. Foley
    Separation of Duty using High Water Marks. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:79-88 [Conf]
  9. Simon N. Foley
    Reasoning about Confidentiality Requirements. [Citation Graph (0, 0)][DBLP]
    CSFW, 1994, pp:150-160 [Conf]
  10. Simon N. Foley, Jeremy Jacob
    Specifying security for CSCW systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:136-0 [Conf]
  11. Hongbin Zhou, Simon N. Foley
    A Framework for Establishing Decentralized Secure Coalitions. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:270-282 [Conf]
  12. Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart
    Configuring Storage Area Networks for Mandatory Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:357-370 [Conf]
  13. Garret Swart, Benjamin Aziz, Simon N. Foley, John Herbert
    Trading Off Security in a Service Oriented Architecture. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:295-309 [Conf]
  14. Simon N. Foley
    A Kernelized Architecture for Multilevel Secure Application Policies. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:33-49 [Conf]
  15. Simon N. Foley
    Using Trust Management to Support Transferable Hash-Based Micropayments. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:1-14 [Conf]
  16. Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan
    Reasoning about Secure Interoperation Using Soft Constraints. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:173-186 [Conf]
  17. Hongbin Zhou, Simon N. Foley
    A Logic for Analysing Subterfuge in Delegation Chains. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:127-141 [Conf]
  18. Simon N. Foley, William J. Fitzgerald, Stefano Bistarelli, Barry O'Sullivan, Mícheál Ó Foghlú
    Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration. [Citation Graph (0, 0)][DBLP]
    IPOM, 2006, pp:168-180 [Conf]
  19. Simon N. Foley, Thomas B. Quillinan, Maeve O'Connor, Barry P. Mulcahy, John P. Morrison
    A Framework for Heterogeneous Middleware Security. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2004, pp:- [Conf]
  20. Thomas B. Quillinan, Brian C. Clayton, Simon N. Foley
    GridAdmin: Decentralising Grid Administration Using Trust Management. [Citation Graph (0, 0)][DBLP]
    ISPDC/HeteroPar, 2004, pp:184-192 [Conf]
  21. Simon N. Foley
    Evaluating System Integrity. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:40-47 [Conf]
  22. Simon N. Foley, John P. Morrison
    Computational paradigms and protection. [Citation Graph (0, 0)][DBLP]
    NSPW, 2001, pp:3-11 [Conf]
  23. Hongbin Zhou, Simon N. Foley
    A collaborative approach to autonomic security protocols. [Citation Graph (0, 0)][DBLP]
    NSPW, 2004, pp:13-21 [Conf]
  24. Barry P. Mulcahy, Simon N. Foley, John P. Morrison
    Cross Cutting Condensed Graphs. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2005, pp:965-973 [Conf]
  25. Stefano Bistarelli, Simon N. Foley
    Analysis of Integrity Policies using Soft Constraints. [Citation Graph (0, 0)][DBLP]
    POLICY, 2003, pp:77-80 [Conf]
  26. Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan
    Modeling and detecting the cascade vulnerability problem using soft constraints. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:383-390 [Conf]
  27. Stefano Bistarelli, Simon N. Foley
    A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2003, pp:130-143 [Conf]
  28. Simon N. Foley, Thomas B. Quillinan, John P. Morrison
    Secure Component Distribution Using WebCom. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:387-398 [Conf]
  29. Simon N. Foley
    A Universal Theory of Information Flow. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:116-122 [Conf]
  30. Simon N. Foley
    A Model for Secure Information Flow. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:248-258 [Conf]
  31. Simon N. Foley
    A Taxonomy for Information Flow Policies and Models. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:98-109 [Conf]
  32. Simon N. Foley, Li Gong, Xiaolei Qian
    A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:142-153 [Conf]
  33. Simon N. Foley
    Trust Management and Whether to Delegate. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:151-157 [Conf]
  34. Simon N. Foley
    Trust Management and Whether to Delegate (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:158-165 [Conf]
  35. Simon N. Foley
    Supporting Imprecise Delegation in KeyNote. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:179-188 [Conf]
  36. Simon N. Foley
    Towards a Framework for Autonomic Security Protocols (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:55-62 [Conf]
  37. Simon N. Foley
    External Consistency and the Verification of Security Protocols (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:24-27 [Conf]
  38. Simon N. Foley
    External Consistency and the Verification of Security Protocols (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:28-35 [Conf]
  39. Simon N. Foley, Hongbin Zhou
    Towards a Framework for Autonomic Security Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:49-54 [Conf]
  40. Simon N. Foley, Robert Dumigan
    Are handheld viruses a significant threat? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:1, pp:105-107 [Journal]
  41. Simon N. Foley
    Building Chinese walls in standard unixTM. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:6, pp:551-563 [Journal]
  42. Giampaolo Bella, Stefano Bistarelli, Simon N. Foley
    Soft Constraints for Security. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:11-29 [Journal]
  43. Simon N. Foley
    Believing the Integrity of a System: (Invited Talk). [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:3-12 [Journal]
  44. Thomas B. Quillinan, Simon N. Foley
    Synchronisation in Trust Management Using Push Authorisation. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:143-158 [Journal]
  45. Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan
    A soft constraint-based approach to the cascade vulnerability problem. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:5, pp:699-720 [Journal]
  46. Simon N. Foley
    Aggregation and Separation as Noninterference Properties. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1992, v:1, n:2, pp:159-188 [Journal]
  47. Simon N. Foley, Jeremy Jacob
    Specifying Security for Computer Supported Collaborative Working. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1995, v:3, n:4, pp:233-254 [Journal]
  48. Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart
    Reconfiguring Role Based Access Control policies using risk semantics. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2006, v:15, n:3, pp:261-273 [Journal]
  49. Simon N. Foley, Barry P. Mulcahy, Thomas B. Quillinan, Meabh O'Connor, John P. Morrison
    Supporting heterogeneous middleware security policies in WebCom. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2006, v:15, n:3, pp:301-313 [Journal]
  50. Brian C. Clayton, Thomas B. Quillinan, Simon N. Foley
    Automating security configuration for the Grid. [Citation Graph (0, 0)][DBLP]
    Scientific Programming, 2005, v:13, n:2, pp:113-125 [Journal]

  51. From Marriages to Coalitions: A Soft CSP Approach. [Citation Graph (, )][DBLP]


  52. An Approach to Security Policy Configuration Using Semantic Threat Graphs. [Citation Graph (, )][DBLP]


  53. Semantic Web and firewall alignment. [Citation Graph (, )][DBLP]


  54. Network Access Control Interoperation using Semantic Web Techniques. [Citation Graph (, )][DBLP]


  55. Authorisation Subterfuge by Delegation in Decentralised Networks. [Citation Graph (, )][DBLP]


  56. Security in WebCom: addressing naming issues for a web services architecture. [Citation Graph (, )][DBLP]


Search in 0.019secs, Finished in 0.021secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002