The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ian Welch: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kris Bubendorfer, Ian Welch, Blayne Chard
    Trustworthy Auctions for Grid-Style Economies. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2006, pp:386-390 [Conf]
  2. Cliff B. Jones, Alexander B. Romanovsky, Ian Welch
    A Structured Approach to Handling On-Line Interface Upgrades. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:1000-1005 [Conf]
  3. Ian Welch, Robert J. Stroud
    Kava - Using Byte code Rewriting to add Behavioural Reflection to Java. [Citation Graph (0, 0)][DBLP]
    COOTS, 2001, pp:119-130 [Conf]
  4. Emiliano Tramontana, Ian Welch
    Reflections on Programming with Grid Toolkits. [Citation Graph (0, 0)][DBLP]
    RAM-SE, 2004, pp:3-8 [Conf]
  5. Eric Jul, Andrew P. Black, Doug Lea, Robert E. Filman, Ian Welch
    Panel: The Next 700 Distributed Object Systems. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 2001, pp:208-212 [Conf]
  6. Ian Welch, Robert J. Stroud
    Adaptation of Connectors in Software Architectures. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:145-146 [Conf]
  7. Ian Welch, Robert J. Stroud
    Dynamic Adaptation of the Security Properties of Applications and Components. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:282- [Conf]
  8. Ian Welch, Robert J. Stroud
    A Reflective Java Class Loader. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:374-375 [Conf]
  9. Ian Welch, Robert J. Stroud
    Runtime Implementation of Aspects Using Kava. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1999, pp:303-304 [Conf]
  10. Ian Welch, Robert J. Stroud
    Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:309-323 [Conf]
  11. Cliff B. Jones, Panayiotis Periorellis, Alexander B. Romanovsky, Ian Welch
    Structured Handling of Online Interface Upgrades in Integrating Dependable Systems of Systems. [Citation Graph (0, 0)][DBLP]
    FIDJI, 2002, pp:73-86 [Conf]
  12. Ian Welch, Robert J. Stroud
    Supporting Real World Security Models in Java. [Citation Graph (0, 0)][DBLP]
    FTDCS, 1999, pp:155-162 [Conf]
  13. Ian Welch, Robert J. Stroud
    Kava - A Reflective Java Based on Bytecode Rewriting. [Citation Graph (0, 0)][DBLP]
    Reflection and Software Engineering, 1999, pp:155-167 [Conf]
  14. Ian Welch, Robert J. Stroud
    From Dalang to Kava - The Evolution of a Reflective Java Extension. [Citation Graph (0, 0)][DBLP]
    Reflection, 1999, pp:2-21 [Conf]
  15. Ian Welch, Robert J. Stroud, Alexander B. Romanovsky
    Aspects of Exceptions at the Meta-level. [Citation Graph (0, 0)][DBLP]
    Reflection, 2001, pp:280-281 [Conf]
  16. Ian Welch, Fan Lu
    Policy-driven reflective enforcement of security policies. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:1580-1584 [Conf]
  17. Ian Welch, Robert J. Stroud
    Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:4, pp:399-432 [Journal]
  18. Avelino F. Zorzo, Alexander B. Romanovsky, Jie Xu, Brian Randell, Robert J. Stroud, Ian Welch
    Using Coordinated Atomic Actions to Design Safety-Critical Systems: a Production Cell Case Study. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1999, v:29, n:8, pp:677-697 [Journal]

  19. Measurement Study on Malicious Web Servers in the .nz Domain. [Citation Graph (, )][DBLP]


  20. Designing Workflows for Grid Enabled Internet Instruments. [Citation Graph (, )][DBLP]


  21. Automating Malware Scanning Using Workflows. [Citation Graph (, )][DBLP]


  22. Identifying and Analyzing Web Server Attacks. [Citation Graph (, )][DBLP]


  23. Identification of malicious web pages through analysis of underlying DNS and web server relationships. [Citation Graph (, )][DBLP]


  24. Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots. [Citation Graph (, )][DBLP]


  25. Special track on Programming for Separation of Concerns: editorial message. [Citation Graph (, )][DBLP]


  26. Remotely shooting asteroids on our mobile phone. [Citation Graph (, )][DBLP]


  27. True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002