The SCEAS System
Navigation Menu

Search the dblp DataBase


Jim Alves-Foss: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jonathan Graham, Jim Alves-Foss
    Efficient Allocation in Distributed Object Oriented Databases. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2003, pp:471-0 [Conf]
  2. Jie Dai, Jim Alves-Foss
    Certificate Based Authorization Simulation System. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2001, pp:190-195 [Conf]
  3. Bart Rylander, Terence Soule, James A. Foster, Jim Alves-Foss
    Quantum Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    GECCO, 2000, pp:373- [Conf]
  4. Jim Alves-Foss
    The Architecture of Secure Systems. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:307-316 [Conf]
  5. Jim Alves-Foss, Ann E. Kelley Sobel
    Formal Methods and Industry - Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  6. Jim Alves-Foss, Daniel Conte de Leon, Paul W. Oman
    Experiments in the Use of XML to Enhance Traceability between Object-Oriented Design Specifications and Source Code. [Citation Graph (0, 0)][DBLP]
    HICSS, 2002, pp:276- [Conf]
  7. Jim Alves-Foss, Carol Taylor, Paul W. Oman
    A Multi-Layered Approach to Security in High Assurance Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  8. Scott Harrison, Nadine Hanebutte, Jim Alves-Foss
    Programming Education in the Era of the Internet: A Paradigm Shift. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  9. Hyungjick Lee, Jim Alves-Foss, Scott Harrison
    The Use of Encrypted Functions for Mobile Agent Security. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  10. Daniel Conte de Leon, Jim Alves-Foss
    Experiments on Processing and Linking Semantically Augmented Requirement Specifications. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  11. Carol Taylor, Jim Alves-Foss
    Attack Recognition for System Survivability: A Low-level Approach. [Citation Graph (0, 0)][DBLP]
    HICSS, 2003, pp:335- [Conf]
  12. Daniel Conte de Leon, Jim Alves-Foss, Paul W. Oman
    Implementation-Oriented Secure Architectures. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:278- [Conf]
  13. Jim Alves-Foss
    Cryptographic Protocol Engineering-Building Security from the Ground Up. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2000, pp:371-378 [Conf]
  14. Huaqiang Wei, Jim Alves-Foss
    Applying the layered decision model to the design of language-based security systems. [Citation Graph (0, 0)][DBLP]
    IRI, 2006, pp:182-187 [Conf]
  15. Huaqiang Wei, Deborah A. Frincke, Jim Alves-Foss, Terence Soule, Hugh Pforsich
    A layered decision model for cost-effective network defense. [Citation Graph (0, 0)][DBLP]
    IRI, 2005, pp:506-511 [Conf]
  16. Jim Alves-Foss, Deborah A. Frincke
    Formal Grammar for Java. [Citation Graph (0, 0)][DBLP]
    Formal Syntax and Semantics of Java, 1999, pp:1-40 [Conf]
  17. Jim Alves-Foss, Fong Shing Lam
    Dynamic Denotational Semantics of Java. [Citation Graph (0, 0)][DBLP]
    Formal Syntax and Semantics of Java, 1999, pp:201-240 [Conf]
  18. Shanyu Zheng, Jim Alves-Foss, Stephen S. Lee
    Performance of Group Key Agreement Protocols over Multiple Operations. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2005, pp:600-606 [Conf]
  19. Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt
    Formal Reasoning About Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:278-295 [Conf]
  20. Jim Alves-Foss, Karl N. Levitt
    Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:122-135 [Conf]
  21. Jim Alves-Foss
    Modelling Non-Deterministic System in HOL. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1992, pp:295-304 [Conf]
  22. Sreekanth Malladi, Jim Alves-Foss, Sreenivas Malladi
    What are Multi-Protocol Guessing Attacks and How to Prevent Them. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:77-82 [Conf]
  23. Joon Son, Jim Alves-Foss
    Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systems. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:13-18 [Conf]
  24. Bei Wang, Jim Alves-Foss
    An MSLS-EMM for enforcing confidentiality in malicious environments. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:126-131 [Conf]
  25. Shanyu Zheng, David Manz, Jim Alves-Foss
    A communication-computation efficient group key algorithm for large and dynamic groups. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:1, pp:69-93 [Journal]
  26. M. Randall Holmes, Jim Alves-Foss
    The Watson Theorem Prover. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2001, v:26, n:4, pp:357-408 [Journal]
  27. Lu'ay A. Wahsheh, Jim Alves-Foss
    Specifying and enforcing a multi-policy paradigm for high assurance multi-enclave systems. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2006, v:15, n:3, pp:315-327 [Journal]
  28. Jim Alves-Foss, Salvador Barbosa
    Assessing Computer Security Vulnerability. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1995, v:29, n:3, pp:3-13 [Journal]
  29. Jeffrey Choi Robinson, Jim Alves-Foss
    A high assurance MLS file server. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2007, v:41, n:1, pp:45-53 [Journal]
  30. Daniel Conte de Leon, Jim Alves-Foss
    Hidden Implementation Dependencies in High Assurance and Critical Computing Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2006, v:32, n:10, pp:790-811 [Journal]
  31. Hyungjick Lee, Jim Alves-Foss, Scott Harrison
    The construction of secure mobile agents via evaluating encrypted functions. [Citation Graph (0, 0)][DBLP]
    Web Intelligence and Agent Systems, 2004, v:2, n:1, pp:1-19 [Journal]
  32. Huaqiang Wei, Jim Alves-Foss, Du Zhang, Deborah A. Frincke
    Rationality Validation of a Layered Decision Model for Network Defense. [Citation Graph (0, 0)][DBLP]
    IRI, 2007, pp:85-90 [Conf]
  33. Lu'ay A. Wahsheh, Jim Alves-Foss
    Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture. [Citation Graph (0, 0)][DBLP]
    IRI, 2007, pp:183-189 [Conf]
  34. Huaqiang Wei, Jim Alves-Foss, Du Zhang
    Validating A Layered Decision Framework for Cost-Effective Network Defense. [Citation Graph (0, 0)][DBLP]
    SEKE, 2007, pp:105-110 [Conf]

  35. Implementing middleware for content filtering and information flow control. [Citation Graph (, )][DBLP]

  36. A Security Review of the Cell Broadband Engine Processor. [Citation Graph (, )][DBLP]

  37. The Effect of Rebalancing on the Performance of a Group Key Agreement Protocol. [Citation Graph (, )][DBLP]

  38. Architecture-based refinements for secure computer systems design. [Citation Graph (, )][DBLP]

  39. Detecting Compromised Nodes in a Wireless Sensor Network using Trust. [Citation Graph (, )][DBLP]

  40. A formal framework for real-time information flow analysis. [Citation Graph (, )][DBLP]

Search in 0.037secs, Finished in 0.039secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002