dblp.uni-trier.dewww.uni-trier.de

Simon N. Foley

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
55EESimon N. Foley, William M. Fitzgerald: Semantic Web and firewall alignment. ICDE Workshops 2008: 447-453
54 William M. Fitzgerald, Simon N. Foley, Mícheál Ó Foghlú: Network Access Control Interoperation using Semantic Web Techniques. WOSIS 2008: 26-37
2006
53EEHongbin Zhou, Simon N. Foley: A Framework for Establishing Decentralized Secure Coalitions. CSFW 2006: 270-282
52EESimon N. Foley, William M. Fitzgerald, Stefano Bistarelli, Barry O'Sullivan, Mícheál Ó Foghlú: Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration. IPOM 2006: 168-180
51EEGiampaolo Bella, Stefano Bistarelli, Simon N. Foley: Soft Constraints for Security. Electr. Notes Theor. Comput. Sci. 142: 11-29 (2006)
50EEThomas B. Quillinan, Simon N. Foley: Synchronisation in Trust Management Using Push Authorisation. Electr. Notes Theor. Comput. Sci. 157(3): 143-158 (2006)
49EEBenjamin Aziz, Simon N. Foley, John Herbert, Garret Swart: Reconfiguring Role Based Access Control policies using risk semantics. J. High Speed Networks 15(3): 261-273 (2006)
48EESimon N. Foley, Barry P. Mulcahy, Thomas B. Quillinan, Meabh O'Connor, John P. Morrison: Supporting heterogeneous middleware security policies in WebCom. J. High Speed Networks 15(3): 301-313 (2006)
2005
47 Simon N. Foley: Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005 ACM 2005
46EESimon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov: Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396
45EEGarret Swart, Benjamin Aziz, Simon N. Foley, John Herbert: Trading Off Security in a Service Oriented Architecture. DBSec 2005: 295-309
44EEHongbin Zhou, Simon N. Foley: A Logic for Analysing Subterfuge in Delegation Chains. Formal Aspects in Security and Trust 2005: 127-141
43 Barry P. Mulcahy, Simon N. Foley, John P. Morrison: Cross Cutting Condensed Graphs. PDPTA 2005: 965-973
42EESimon N. Foley, Hongbin Zhou: Authorisation Subterfuge by Delegation in Decentralised Networks. Security Protocols Workshop 2005: 97-102
41EESimon N. Foley: Believing the Integrity of a System: (Invited Talk). Electr. Notes Theor. Comput. Sci. 125(1): 3-12 (2005)
40EEStefano Bistarelli, Simon N. Foley, Barry O'Sullivan: A soft constraint-based approach to the cascade vulnerability problem. Journal of Computer Security 13(5): 699-720 (2005)
39EEBrian C. Clayton, Thomas B. Quillinan, Simon N. Foley: Automating security configuration for the Grid. Scientific Programming 13(2): 113-125 (2005)
2004
38 Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan: Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints. AAAI 2004: 808-813
37EECarla Marceau, Simon N. Foley: Themes and Highlights of the New Security Paradigms Workshop 2004. ACSAC 2004: 382-383
36 Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart: Configuring Storage Area Networks for Mandatory Security. DBSec 2004: 357-370
35EEStefano Bistarelli, Simon N. Foley, Barry O'Sullivan: Reasoning about Secure Interoperation Using Soft Constraints. Formal Aspects in Security and Trust 2004: 173-186
34EESimon N. Foley, Thomas B. Quillinan, Maeve O'Connor, Barry P. Mulcahy, John P. Morrison: A Framework for Heterogeneous Middleware Security. IPDPS 2004
33EEThomas B. Quillinan, Brian C. Clayton, Simon N. Foley: GridAdmin: Decentralising Grid Administration Using Trust Management. ISPDC/HeteroPar 2004: 184-192
32EEHongbin Zhou, Simon N. Foley: A collaborative approach to autonomic security protocols. NSPW 2004: 13-21
31EEStefano Bistarelli, Simon N. Foley, Barry O'Sullivan: Modeling and detecting the cascade vulnerability problem using soft constraints. SAC 2004: 383-390
30EEThomas B. Quillinan, Simon N. Foley: Security in WebCom: addressing naming issues for a web services architecture. SWS 2004: 97-105
2003
29EEHongbin Zhou, Simon N. Foley: Fast automatic synthesis of security protocols using backward search. FMSE 2003: 1-10
28EESimon N. Foley: Using Trust Management to Support Transferable Hash-Based Micropayments. Financial Cryptography 2003: 1-14
27EEStefano Bistarelli, Simon N. Foley: Analysis of Integrity Policies using Soft Constraints. POLICY 2003: 77-80
26EEStefano Bistarelli, Simon N. Foley: A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity. SAFECOMP 2003: 130-143
25EESimon N. Foley, Hongbin Zhou: Towards a Framework for Autonomic Security Protocols. Security Protocols Workshop 2003: 49-54
24EESimon N. Foley: Towards a Framework for Autonomic Security Protocols (Discussion). Security Protocols Workshop 2003: 55-62
2002
23 Simon N. Foley, Thomas B. Quillinan, John P. Morrison: Secure Component Distribution Using WebCom. SEC 2002: 387-398
22EESimon N. Foley: Supporting Imprecise Delegation in KeyNote. Security Protocols Workshop 2002: 179-188
2001
21EESimon N. Foley, John P. Morrison: Computational paradigms and protection. NSPW 2001: 3-11
20EESimon N. Foley: Trust Management and Whether to Delegate. Security Protocols Workshop 2001: 151-157
19EESimon N. Foley: Trust Management and Whether to Delegate (Transcript of Discussion). Security Protocols Workshop 2001: 158-165
18EESimon N. Foley, Robert Dumigan: Are handheld viruses a significant threat? Commun. ACM 44(1): 105-107 (2001)
1998
17EESimon N. Foley: A Kernelized Architecture for Multilevel Secure Application Policies. ESORICS 1998: 33-49
16EESimon N. Foley: External Consistency and the Verification of Security Protocols (Position Paper). Security Protocols Workshop 1998: 24-27
15EESimon N. Foley: External Consistency and the Verification of Security Protocols (Transcript of Discussion). Security Protocols Workshop 1998: 28-35
14EESimon N. Foley: Evaluating System Integrity. Workshop on New Security Paradigms 1998: 40-47
1997
13EESimon N. Foley: The Specification and Implementation of ``Commercial'' Security Requirements Including Dynamic Segregation of Duties. ACM Conference on Computer and Communications Security 1997: 125-134
12EESimon N. Foley: Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores. ACSAC 1997: 69-80
11EESimon N. Foley: Building Chinese walls in standard unixTM. Computers & Security 16(6): 551-563 (1997)
1996
10EESimon N. Foley, Li Gong, Xiaolei Qian: A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. IEEE Symposium on Security and Privacy 1996: 142-153
1995
9EESimon N. Foley, Jeremy Jacob: Specifying security for CSCW systems. CSFW 1995: 136-
8 Simon N. Foley, Jeremy Jacob: Specifying Security for Computer Supported Collaborative Working. Journal of Computer Security 3(4): 233-254 (1995)
1994
7 Simon N. Foley: Reasoning about Confidentiality Requirements. CSFW 1994: 150-160
1992
6 Simon N. Foley: Aggregation and Separation as Noninterference Properties. Journal of Computer Security 1(2): 159-188 (1992)
1991
5 Simon N. Foley: Separation of Duty using High Water Marks. CSFW 1991: 79-88
4 Simon N. Foley: A Taxonomy for Information Flow Policies and Models. IEEE Symposium on Security and Privacy 1991: 98-109
1990
3 Simon N. Foley: Secure Information Flow Using Security Groups. CSFW 1990: 62-72
1989
2 Simon N. Foley: A Model for Secure Information Flow. IEEE Symposium on Security and Privacy 1989: 248-258
1987
1 Simon N. Foley: A Universal Theory of Information Flow. IEEE Symposium on Security and Privacy 1987: 116-122

Coauthor Index

1Benjamin Aziz [36] [45] [49]
2Giampaolo Bella [51]
3Stefano Bistarelli [26] [27] [31] [35] [38] [40] [51] [52]
4Alex Boulatov [46]
5Mark Bush [46]
6Brian C. Clayton [33] [39]
7Robert Dumigan [18]
8William M. Fitzgerald [52] [54] [55]
9Mícheál Ó Foghlú [52] [54]
10Richard Ford [46]
11Li Gong [10]
12John Herbert [36] [45] [49]
13Jeremy L. Jacob (Jeremy Jacob) [8] [9]
14Angelos D. Keromytis [46]
15Michael E. Locasto [46]
16Carla Marceau [37]
17John McDermott [46]
18John P. Morrison [21] [23] [34] [43] [48]
19Barry P. Mulcahy [34] [43] [48]
20Maeve O'Connor [34]
21Meabh O'Connor [48]
22Barry O'Sullivan [31] [35] [38] [40] [52]
23Paul C. van Oorschot [46]
24Xiaolei Qian [10]
25Thomas B. Quillinan [23] [30] [33] [34] [39] [48] [50]
26Stelios Sidiroglou [46]
27Abe Singer [46]
28Anil Somayaji [46]
29Garret Swart [36] [45] [49]
30Julie Thorpe [46]
31Hongbin Zhou [25] [29] [32] [42] [44] [53]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)