2008 |
43 | EE | Luay A. Wahsheh,
Daniel Conte de Leon,
Jim Alves-Foss:
Formal Verification and Visualization of Security Policies.
JCP 3(6): 22-31 (2008) |
42 | EE | Jie Zhou,
Jim Alves-Foss:
Security policy refinement and enforcement for the design of multi-level secure systems.
Journal of Computer Security 16(2): 107-131 (2008) |
41 | EE | Carol Masuck,
Jim Alves-Foss,
Paul W. Oman:
Analysis of fault models for student use.
SIGCSE Bulletin 40(2): 79-83 (2008) |
2007 |
40 | EE | Jeffrey Choi Robinson,
W. Scott Harrison,
Nadine Hanebutte,
Paul W. Oman,
Jim Alves-Foss:
Implementing middleware for content filtering and information flow control.
CSAW 2007: 47-53 |
39 | EE | Daniel Conte de Leon,
Jim Alves-Foss,
Paul W. Oman:
Implementation-Oriented Secure Architectures.
HICSS 2007: 278 |
38 | EE | Lu'ay A. Wahsheh,
Jim Alves-Foss:
Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture.
IRI 2007: 183-189 |
37 | EE | Huaqiang Wei,
Jim Alves-Foss,
Du Zhang,
Deborah A. Frincke:
Rationality Validation of a Layered Decision Model for Network Defense.
IRI 2007: 85-90 |
36 | | Huaqiang Wei,
Jim Alves-Foss,
Du Zhang:
Validating A Layered Decision Framework for Cost-Effective Network Defense.
SEKE 2007: 105-110 |
35 | EE | Shanyu Zheng,
David Manz,
Jim Alves-Foss:
A communication-computation efficient group key algorithm for large and dynamic groups.
Computer Networks 51(1): 69-93 (2007) |
34 | EE | Jeffrey Choi Robinson,
Jim Alves-Foss:
A high assurance MLS file server.
Operating Systems Review 41(1): 45-53 (2007) |
2006 |
33 | | Bei Wang,
Jim Alves-Foss:
An MSLS-EMM for enforcing confidentiality in malicious environments.
Communication, Network, and Information Security 2006: 126-131 |
32 | | Joon Son,
Jim Alves-Foss:
Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systems.
Communication, Network, and Information Security 2006: 13-18 |
31 | EE | Scott Harrison,
Nadine Hanebutte,
Jim Alves-Foss:
Programming Education in the Era of the Internet: A Paradigm Shift.
HICSS 2006 |
30 | | Huaqiang Wei,
Jim Alves-Foss:
Applying the layered decision model to the design of language-based security systems.
IRI 2006: 182-187 |
29 | EE | Shanyu Zheng,
Jim Alves-Foss,
Stephen S. Lee:
The Effect of Rebalancing on the Performance of a Group Key Agreement Protocol.
LCN 2006: 983-989 |
28 | EE | Jie Zhou,
Jim Alves-Foss:
Architecture-based refinements for secure computer systems design.
PST 2006: 15 |
27 | EE | Daniel Conte de Leon,
Jim Alves-Foss:
Hidden Implementation Dependencies in High Assurance and Critical Computing Systems.
IEEE Trans. Software Eng. 32(10): 790-811 (2006) |
26 | EE | Jim Alves-Foss,
Paul W. Oman,
Carol Taylor,
Scott Harrison:
The MILS architecture for high-assurance embedded systems.
IJES 2(3/4): 239-247 (2006) |
25 | EE | Lu'ay A. Wahsheh,
Jim Alves-Foss:
Specifying and enforcing a multi-policy paradigm for high assurance multi-enclave systems.
J. High Speed Networks 15(3): 315-327 (2006) |
2005 |
24 | | Shanyu Zheng,
Jim Alves-Foss,
Stephen S. Lee:
Performance of Group Key Agreement Protocols over Multiple Operations.
IASTED PDCS 2005: 600-606 |
23 | EE | Huaqiang Wei,
Deborah A. Frincke,
Jim Alves-Foss,
Terence Soule,
Hugh Pforsich:
A layered decision model for cost-effective network defense.
IRI 2005: 506-511 |
2004 |
22 | EE | Jim Alves-Foss,
Carol Taylor,
Paul W. Oman:
A Multi-Layered Approach to Security in High Assurance Systems.
HICSS 2004 |
21 | EE | Daniel Conte de Leon,
Jim Alves-Foss:
Experiments on Processing and Linking Semantically Augmented Requirement Specifications.
HICSS 2004 |
20 | EE | Hyungjick Lee,
Jim Alves-Foss,
Scott Harrison:
The Use of Encrypted Functions for Mobile Agent Security.
HICSS 2004 |
19 | EE | Tao Song,
Calvin Ko,
Jim Alves-Foss,
Cui Zhang,
Karl N. Levitt:
Formal Reasoning About Intrusion Detection Systems.
RAID 2004: 278-295 |
18 | EE | Hyungjick Lee,
Jim Alves-Foss,
Scott Harrison:
The construction of secure mobile agents via evaluating encrypted functions.
Web Intelligence and Agent Systems 2(1): 1-19 (2004) |
2003 |
17 | EE | Carol Taylor,
Jim Alves-Foss:
Attack Recognition for System Survivability: A Low-level Approach.
HICSS 2003: 335 |
16 | | Jonathan Graham,
Jim Alves-Foss:
Efficient Allocation in Distributed Object Oriented Databases.
ISCA PDCS 2003: 471- |
2002 |
15 | EE | Jim Alves-Foss,
Daniel Conte de Leon,
Paul W. Oman:
Experiments in the Use of XML to Enhance Traceability between Object-Oriented Design Specifications and Source Code.
HICSS 2002: 276 |
14 | EE | Sreekanth Malladi,
Jim Alves-Foss:
What are Multi-Protocol Guessing Attacks and How to Prevent Them.
WETICE 2002: 77-82 |
2001 |
13 | EE | Jie Dai,
Jim Alves-Foss:
Certificate Based Authorization Simulation System.
COMPSAC 2001: 190-195 |
12 | | M. Randall Holmes,
Jim Alves-Foss:
The Watson Theorem Prover.
J. Autom. Reasoning 26(4): 357-408 (2001) |
2000 |
11 | | Bart Rylander,
Terence Soule,
James A. Foster,
Jim Alves-Foss:
Quantum Genetic Algorithms.
GECCO 2000: 373 |
10 | | Jim Alves-Foss:
Cryptographic Protocol Engineering-Building Security from the Ground Up.
International Conference on Internet Computing 2000: 371-378 |
1999 |
9 | | Jim Alves-Foss:
Formal Syntax and Semantics of Java
Springer 1999 |
8 | EE | Jim Alves-Foss,
Deborah A. Frincke:
Formal Grammar for Java.
Formal Syntax and Semantics of Java 1999: 1-40 |
7 | EE | Jim Alves-Foss,
Fong Shing Lam:
Dynamic Denotational Semantics of Java.
Formal Syntax and Semantics of Java 1999: 201-240 |
6 | EE | Jim Alves-Foss,
Ann E. Kelley Sobel:
Formal Methods and Industry - Introduction.
HICSS 1999 |
1998 |
5 | EE | Jim Alves-Foss:
The Architecture of Secure Systems.
HICSS (3) 1998: 307-316 |
1995 |
4 | | E. Thomas Schubert,
Phillip J. Windley,
Jim Alves-Foss:
Higher Order Logic Theorem Proving and Its Applications, 8th International Workshop, Aspen Grove, UT, USA, September 11-14, 1995, Proceedings
Springer 1995 |
3 | | Jim Alves-Foss,
Salvador Barbosa:
Assessing Computer Security Vulnerability.
Operating Systems Review 29(3): 3-13 (1995) |
1992 |
2 | | Jim Alves-Foss:
Modelling Non-Deterministic System in HOL.
TPHOLs 1992: 295-304 |
1991 |
1 | | Jim Alves-Foss,
Karl N. Levitt:
Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components.
IEEE Symposium on Security and Privacy 1991: 122-135 |