2008 |
55 | EE | Simon N. Foley,
William M. Fitzgerald:
Semantic Web and firewall alignment.
ICDE Workshops 2008: 447-453 |
54 | | William M. Fitzgerald,
Simon N. Foley,
Mícheál Ó Foghlú:
Network Access Control Interoperation using Semantic Web Techniques.
WOSIS 2008: 26-37 |
2006 |
53 | EE | Hongbin Zhou,
Simon N. Foley:
A Framework for Establishing Decentralized Secure Coalitions.
CSFW 2006: 270-282 |
52 | EE | Simon N. Foley,
William M. Fitzgerald,
Stefano Bistarelli,
Barry O'Sullivan,
Mícheál Ó Foghlú:
Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration.
IPOM 2006: 168-180 |
51 | EE | Giampaolo Bella,
Stefano Bistarelli,
Simon N. Foley:
Soft Constraints for Security.
Electr. Notes Theor. Comput. Sci. 142: 11-29 (2006) |
50 | EE | Thomas B. Quillinan,
Simon N. Foley:
Synchronisation in Trust Management Using Push Authorisation.
Electr. Notes Theor. Comput. Sci. 157(3): 143-158 (2006) |
49 | EE | Benjamin Aziz,
Simon N. Foley,
John Herbert,
Garret Swart:
Reconfiguring Role Based Access Control policies using risk semantics.
J. High Speed Networks 15(3): 261-273 (2006) |
48 | EE | Simon N. Foley,
Barry P. Mulcahy,
Thomas B. Quillinan,
Meabh O'Connor,
John P. Morrison:
Supporting heterogeneous middleware security policies in WebCom.
J. High Speed Networks 15(3): 301-313 (2006) |
2005 |
47 | | Simon N. Foley:
Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005
ACM 2005 |
46 | EE | Simon N. Foley,
Abe Singer,
Michael E. Locasto,
Stelios Sidiroglou,
Angelos D. Keromytis,
John McDermott,
Julie Thorpe,
Paul C. van Oorschot,
Anil Somayaji,
Richard Ford,
Mark Bush,
Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop.
ACSAC 2005: 393-396 |
45 | EE | Garret Swart,
Benjamin Aziz,
Simon N. Foley,
John Herbert:
Trading Off Security in a Service Oriented Architecture.
DBSec 2005: 295-309 |
44 | EE | Hongbin Zhou,
Simon N. Foley:
A Logic for Analysing Subterfuge in Delegation Chains.
Formal Aspects in Security and Trust 2005: 127-141 |
43 | | Barry P. Mulcahy,
Simon N. Foley,
John P. Morrison:
Cross Cutting Condensed Graphs.
PDPTA 2005: 965-973 |
42 | EE | Simon N. Foley,
Hongbin Zhou:
Authorisation Subterfuge by Delegation in Decentralised Networks.
Security Protocols Workshop 2005: 97-102 |
41 | EE | Simon N. Foley:
Believing the Integrity of a System: (Invited Talk).
Electr. Notes Theor. Comput. Sci. 125(1): 3-12 (2005) |
40 | EE | Stefano Bistarelli,
Simon N. Foley,
Barry O'Sullivan:
A soft constraint-based approach to the cascade vulnerability problem.
Journal of Computer Security 13(5): 699-720 (2005) |
39 | EE | Brian C. Clayton,
Thomas B. Quillinan,
Simon N. Foley:
Automating security configuration for the Grid.
Scientific Programming 13(2): 113-125 (2005) |
2004 |
38 | | Stefano Bistarelli,
Simon N. Foley,
Barry O'Sullivan:
Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints.
AAAI 2004: 808-813 |
37 | EE | Carla Marceau,
Simon N. Foley:
Themes and Highlights of the New Security Paradigms Workshop 2004.
ACSAC 2004: 382-383 |
36 | | Benjamin Aziz,
Simon N. Foley,
John Herbert,
Garret Swart:
Configuring Storage Area Networks for Mandatory Security.
DBSec 2004: 357-370 |
35 | EE | Stefano Bistarelli,
Simon N. Foley,
Barry O'Sullivan:
Reasoning about Secure Interoperation Using Soft Constraints.
Formal Aspects in Security and Trust 2004: 173-186 |
34 | EE | Simon N. Foley,
Thomas B. Quillinan,
Maeve O'Connor,
Barry P. Mulcahy,
John P. Morrison:
A Framework for Heterogeneous Middleware Security.
IPDPS 2004 |
33 | EE | Thomas B. Quillinan,
Brian C. Clayton,
Simon N. Foley:
GridAdmin: Decentralising Grid Administration Using Trust Management.
ISPDC/HeteroPar 2004: 184-192 |
32 | EE | Hongbin Zhou,
Simon N. Foley:
A collaborative approach to autonomic security protocols.
NSPW 2004: 13-21 |
31 | EE | Stefano Bistarelli,
Simon N. Foley,
Barry O'Sullivan:
Modeling and detecting the cascade vulnerability problem using soft constraints.
SAC 2004: 383-390 |
30 | EE | Thomas B. Quillinan,
Simon N. Foley:
Security in WebCom: addressing naming issues for a web services architecture.
SWS 2004: 97-105 |
2003 |
29 | EE | Hongbin Zhou,
Simon N. Foley:
Fast automatic synthesis of security protocols using backward search.
FMSE 2003: 1-10 |
28 | EE | Simon N. Foley:
Using Trust Management to Support Transferable Hash-Based Micropayments.
Financial Cryptography 2003: 1-14 |
27 | EE | Stefano Bistarelli,
Simon N. Foley:
Analysis of Integrity Policies using Soft Constraints.
POLICY 2003: 77-80 |
26 | EE | Stefano Bistarelli,
Simon N. Foley:
A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity.
SAFECOMP 2003: 130-143 |
25 | EE | Simon N. Foley,
Hongbin Zhou:
Towards a Framework for Autonomic Security Protocols.
Security Protocols Workshop 2003: 49-54 |
24 | EE | Simon N. Foley:
Towards a Framework for Autonomic Security Protocols (Discussion).
Security Protocols Workshop 2003: 55-62 |
2002 |
23 | | Simon N. Foley,
Thomas B. Quillinan,
John P. Morrison:
Secure Component Distribution Using WebCom.
SEC 2002: 387-398 |
22 | EE | Simon N. Foley:
Supporting Imprecise Delegation in KeyNote.
Security Protocols Workshop 2002: 179-188 |
2001 |
21 | EE | Simon N. Foley,
John P. Morrison:
Computational paradigms and protection.
NSPW 2001: 3-11 |
20 | EE | Simon N. Foley:
Trust Management and Whether to Delegate.
Security Protocols Workshop 2001: 151-157 |
19 | EE | Simon N. Foley:
Trust Management and Whether to Delegate (Transcript of Discussion).
Security Protocols Workshop 2001: 158-165 |
18 | EE | Simon N. Foley,
Robert Dumigan:
Are handheld viruses a significant threat?
Commun. ACM 44(1): 105-107 (2001) |
1998 |
17 | EE | Simon N. Foley:
A Kernelized Architecture for Multilevel Secure Application Policies.
ESORICS 1998: 33-49 |
16 | EE | Simon N. Foley:
External Consistency and the Verification of Security Protocols (Position Paper).
Security Protocols Workshop 1998: 24-27 |
15 | EE | Simon N. Foley:
External Consistency and the Verification of Security Protocols (Transcript of Discussion).
Security Protocols Workshop 1998: 28-35 |
14 | EE | Simon N. Foley:
Evaluating System Integrity.
Workshop on New Security Paradigms 1998: 40-47 |
1997 |
13 | EE | Simon N. Foley:
The Specification and Implementation of ``Commercial'' Security Requirements Including Dynamic Segregation of Duties.
ACM Conference on Computer and Communications Security 1997: 125-134 |
12 | EE | Simon N. Foley:
Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores.
ACSAC 1997: 69-80 |
11 | EE | Simon N. Foley:
Building Chinese walls in standard unixTM.
Computers & Security 16(6): 551-563 (1997) |
1996 |
10 | EE | Simon N. Foley,
Li Gong,
Xiaolei Qian:
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification.
IEEE Symposium on Security and Privacy 1996: 142-153 |
1995 |
9 | EE | Simon N. Foley,
Jeremy Jacob:
Specifying security for CSCW systems.
CSFW 1995: 136- |
8 | | Simon N. Foley,
Jeremy Jacob:
Specifying Security for Computer Supported Collaborative Working.
Journal of Computer Security 3(4): 233-254 (1995) |
1994 |
7 | | Simon N. Foley:
Reasoning about Confidentiality Requirements.
CSFW 1994: 150-160 |
1992 |
6 | | Simon N. Foley:
Aggregation and Separation as Noninterference Properties.
Journal of Computer Security 1(2): 159-188 (1992) |
1991 |
5 | | Simon N. Foley:
Separation of Duty using High Water Marks.
CSFW 1991: 79-88 |
4 | | Simon N. Foley:
A Taxonomy for Information Flow Policies and Models.
IEEE Symposium on Security and Privacy 1991: 98-109 |
1990 |
3 | | Simon N. Foley:
Secure Information Flow Using Security Groups.
CSFW 1990: 62-72 |
1989 |
2 | | Simon N. Foley:
A Model for Secure Information Flow.
IEEE Symposium on Security and Privacy 1989: 248-258 |
1987 |
1 | | Simon N. Foley:
A Universal Theory of Information Flow.
IEEE Symposium on Security and Privacy 1987: 116-122 |