Search the dblp DataBase
Ian Welch :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Kris Bubendorfer , Ian Welch , Blayne Chard Trustworthy Auctions for Grid-Style Economies. [Citation Graph (0, 0)][DBLP ] CCGRID, 2006, pp:386-390 [Conf ] Cliff B. Jones , Alexander B. Romanovsky , Ian Welch A Structured Approach to Handling On-Line Interface Upgrades. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2002, pp:1000-1005 [Conf ] Ian Welch , Robert J. Stroud Kava - Using Byte code Rewriting to add Behavioural Reflection to Java. [Citation Graph (0, 0)][DBLP ] COOTS, 2001, pp:119-130 [Conf ] Emiliano Tramontana , Ian Welch Reflections on Programming with Grid Toolkits. [Citation Graph (0, 0)][DBLP ] RAM-SE, 2004, pp:3-8 [Conf ] Eric Jul , Andrew P. Black , Doug Lea , Robert E. Filman , Ian Welch Panel: The Next 700 Distributed Object Systems. [Citation Graph (0, 0)][DBLP ] ECOOP Workshops, 2001, pp:208-212 [Conf ] Ian Welch , Robert J. Stroud Adaptation of Connectors in Software Architectures. [Citation Graph (0, 0)][DBLP ] ECOOP Workshops, 1998, pp:145-146 [Conf ] Ian Welch , Robert J. Stroud Dynamic Adaptation of the Security Properties of Applications and Components. [Citation Graph (0, 0)][DBLP ] ECOOP Workshops, 1998, pp:282- [Conf ] Ian Welch , Robert J. Stroud A Reflective Java Class Loader. [Citation Graph (0, 0)][DBLP ] ECOOP Workshops, 1998, pp:374-375 [Conf ] Ian Welch , Robert J. Stroud Runtime Implementation of Aspects Using Kava. [Citation Graph (0, 0)][DBLP ] ECOOP Workshops, 1999, pp:303-304 [Conf ] Ian Welch , Robert J. Stroud Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:309-323 [Conf ] Cliff B. Jones , Panayiotis Periorellis , Alexander B. Romanovsky , Ian Welch Structured Handling of Online Interface Upgrades in Integrating Dependable Systems of Systems. [Citation Graph (0, 0)][DBLP ] FIDJI, 2002, pp:73-86 [Conf ] Ian Welch , Robert J. Stroud Supporting Real World Security Models in Java. [Citation Graph (0, 0)][DBLP ] FTDCS, 1999, pp:155-162 [Conf ] Ian Welch , Robert J. Stroud Kava - A Reflective Java Based on Bytecode Rewriting. [Citation Graph (0, 0)][DBLP ] Reflection and Software Engineering, 1999, pp:155-167 [Conf ] Ian Welch , Robert J. Stroud From Dalang to Kava - The Evolution of a Reflective Java Extension. [Citation Graph (0, 0)][DBLP ] Reflection, 1999, pp:2-21 [Conf ] Ian Welch , Robert J. Stroud , Alexander B. Romanovsky Aspects of Exceptions at the Meta-level. [Citation Graph (0, 0)][DBLP ] Reflection, 2001, pp:280-281 [Conf ] Ian Welch , Fan Lu Policy-driven reflective enforcement of security policies. [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:1580-1584 [Conf ] Ian Welch , Robert J. Stroud Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2002, v:10, n:4, pp:399-432 [Journal ] Avelino F. Zorzo , Alexander B. Romanovsky , Jie Xu , Brian Randell , Robert J. Stroud , Ian Welch Using Coordinated Atomic Actions to Design Safety-Critical Systems: a Production Cell Case Study. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1999, v:29, n:8, pp:677-697 [Journal ] Measurement Study on Malicious Web Servers in the .nz Domain. [Citation Graph (, )][DBLP ] Designing Workflows for Grid Enabled Internet Instruments. [Citation Graph (, )][DBLP ] Automating Malware Scanning Using Workflows. [Citation Graph (, )][DBLP ] Identifying and Analyzing Web Server Attacks. [Citation Graph (, )][DBLP ] Identification of malicious web pages through analysis of underlying DNS and web server relationships. [Citation Graph (, )][DBLP ] Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots. [Citation Graph (, )][DBLP ] Special track on Programming for Separation of Concerns: editorial message. [Citation Graph (, )][DBLP ] Remotely shooting asteroids on our mobile phone. [Citation Graph (, )][DBLP ] True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots. [Citation Graph (, )][DBLP ] Search in 0.008secs, Finished in 0.010secs