Search the dblp DataBase
Jim Alves-Foss :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jonathan Graham , Jim Alves-Foss Efficient Allocation in Distributed Object Oriented Databases. [Citation Graph (0, 0)][DBLP ] ISCA PDCS, 2003, pp:471-0 [Conf ] Jie Dai , Jim Alves-Foss Certificate Based Authorization Simulation System. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2001, pp:190-195 [Conf ] Bart Rylander , Terence Soule , James A. Foster , Jim Alves-Foss Quantum Genetic Algorithms. [Citation Graph (0, 0)][DBLP ] GECCO, 2000, pp:373- [Conf ] Jim Alves-Foss The Architecture of Secure Systems. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:307-316 [Conf ] Jim Alves-Foss , Ann E. Kelley Sobel Formal Methods and Industry - Introduction. [Citation Graph (0, 0)][DBLP ] HICSS, 1999, pp:- [Conf ] Jim Alves-Foss , Daniel Conte de Leon , Paul W. Oman Experiments in the Use of XML to Enhance Traceability between Object-Oriented Design Specifications and Source Code. [Citation Graph (0, 0)][DBLP ] HICSS, 2002, pp:276- [Conf ] Jim Alves-Foss , Carol Taylor , Paul W. Oman A Multi-Layered Approach to Security in High Assurance Systems. [Citation Graph (0, 0)][DBLP ] HICSS, 2004, pp:- [Conf ] Scott Harrison , Nadine Hanebutte , Jim Alves-Foss Programming Education in the Era of the Internet: A Paradigm Shift. [Citation Graph (0, 0)][DBLP ] HICSS, 2006, pp:- [Conf ] Hyungjick Lee , Jim Alves-Foss , Scott Harrison The Use of Encrypted Functions for Mobile Agent Security. [Citation Graph (0, 0)][DBLP ] HICSS, 2004, pp:- [Conf ] Daniel Conte de Leon , Jim Alves-Foss Experiments on Processing and Linking Semantically Augmented Requirement Specifications. [Citation Graph (0, 0)][DBLP ] HICSS, 2004, pp:- [Conf ] Carol Taylor , Jim Alves-Foss Attack Recognition for System Survivability: A Low-level Approach. [Citation Graph (0, 0)][DBLP ] HICSS, 2003, pp:335- [Conf ] Daniel Conte de Leon , Jim Alves-Foss , Paul W. Oman Implementation-Oriented Secure Architectures. [Citation Graph (0, 0)][DBLP ] HICSS, 2007, pp:278- [Conf ] Jim Alves-Foss Cryptographic Protocol Engineering-Building Security from the Ground Up. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2000, pp:371-378 [Conf ] Huaqiang Wei , Jim Alves-Foss Applying the layered decision model to the design of language-based security systems. [Citation Graph (0, 0)][DBLP ] IRI, 2006, pp:182-187 [Conf ] Huaqiang Wei , Deborah A. Frincke , Jim Alves-Foss , Terence Soule , Hugh Pforsich A layered decision model for cost-effective network defense. [Citation Graph (0, 0)][DBLP ] IRI, 2005, pp:506-511 [Conf ] Jim Alves-Foss , Deborah A. Frincke Formal Grammar for Java. [Citation Graph (0, 0)][DBLP ] Formal Syntax and Semantics of Java, 1999, pp:1-40 [Conf ] Jim Alves-Foss , Fong Shing Lam Dynamic Denotational Semantics of Java. [Citation Graph (0, 0)][DBLP ] Formal Syntax and Semantics of Java, 1999, pp:201-240 [Conf ] Shanyu Zheng , Jim Alves-Foss , Stephen S. Lee Performance of Group Key Agreement Protocols over Multiple Operations. [Citation Graph (0, 0)][DBLP ] IASTED PDCS, 2005, pp:600-606 [Conf ] Tao Song , Calvin Ko , Jim Alves-Foss , Cui Zhang , Karl N. Levitt Formal Reasoning About Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] RAID, 2004, pp:278-295 [Conf ] Jim Alves-Foss , Karl N. Levitt Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1991, pp:122-135 [Conf ] Jim Alves-Foss Modelling Non-Deterministic System in HOL. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1992, pp:295-304 [Conf ] Sreekanth Malladi , Jim Alves-Foss , Sreenivas Malladi What are Multi-Protocol Guessing Attacks and How to Prevent Them. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:77-82 [Conf ] Joon Son , Jim Alves-Foss Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systems. [Citation Graph (0, 0)][DBLP ] Communication, Network, and Information Security, 2006, pp:13-18 [Conf ] Bei Wang , Jim Alves-Foss An MSLS-EMM for enforcing confidentiality in malicious environments. [Citation Graph (0, 0)][DBLP ] Communication, Network, and Information Security, 2006, pp:126-131 [Conf ] Shanyu Zheng , David Manz , Jim Alves-Foss A communication-computation efficient group key algorithm for large and dynamic groups. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:1, pp:69-93 [Journal ] M. Randall Holmes , Jim Alves-Foss The Watson Theorem Prover. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 2001, v:26, n:4, pp:357-408 [Journal ] Lu'ay A. Wahsheh , Jim Alves-Foss Specifying and enforcing a multi-policy paradigm for high assurance multi-enclave systems. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2006, v:15, n:3, pp:315-327 [Journal ] Jim Alves-Foss , Salvador Barbosa Assessing Computer Security Vulnerability. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1995, v:29, n:3, pp:3-13 [Journal ] Jeffrey Choi Robinson , Jim Alves-Foss A high assurance MLS file server. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2007, v:41, n:1, pp:45-53 [Journal ] Daniel Conte de Leon , Jim Alves-Foss Hidden Implementation Dependencies in High Assurance and Critical Computing Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2006, v:32, n:10, pp:790-811 [Journal ] Hyungjick Lee , Jim Alves-Foss , Scott Harrison The construction of secure mobile agents via evaluating encrypted functions. [Citation Graph (0, 0)][DBLP ] Web Intelligence and Agent Systems, 2004, v:2, n:1, pp:1-19 [Journal ] Huaqiang Wei , Jim Alves-Foss , Du Zhang , Deborah A. Frincke Rationality Validation of a Layered Decision Model for Network Defense. [Citation Graph (0, 0)][DBLP ] IRI, 2007, pp:85-90 [Conf ] Lu'ay A. Wahsheh , Jim Alves-Foss Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture. [Citation Graph (0, 0)][DBLP ] IRI, 2007, pp:183-189 [Conf ] Huaqiang Wei , Jim Alves-Foss , Du Zhang Validating A Layered Decision Framework for Cost-Effective Network Defense. [Citation Graph (0, 0)][DBLP ] SEKE, 2007, pp:105-110 [Conf ] Implementing middleware for content filtering and information flow control. [Citation Graph (, )][DBLP ] A Security Review of the Cell Broadband Engine Processor. [Citation Graph (, )][DBLP ] The Effect of Rebalancing on the Performance of a Group Key Agreement Protocol. [Citation Graph (, )][DBLP ] Architecture-based refinements for secure computer systems design. [Citation Graph (, )][DBLP ] Detecting Compromised Nodes in a Wireless Sensor Network using Trust. [Citation Graph (, )][DBLP ] A formal framework for real-time information flow analysis. [Citation Graph (, )][DBLP ] Search in 0.037secs, Finished in 0.039secs