| 2008 |
| 55 | EE | Simon N. Foley,
William M. Fitzgerald:
Semantic Web and firewall alignment.
ICDE Workshops 2008: 447-453 |
| 54 | | William M. Fitzgerald,
Simon N. Foley,
Mícheál Ó Foghlú:
Network Access Control Interoperation using Semantic Web Techniques.
WOSIS 2008: 26-37 |
| 2006 |
| 53 | EE | Hongbin Zhou,
Simon N. Foley:
A Framework for Establishing Decentralized Secure Coalitions.
CSFW 2006: 270-282 |
| 52 | EE | Simon N. Foley,
William M. Fitzgerald,
Stefano Bistarelli,
Barry O'Sullivan,
Mícheál Ó Foghlú:
Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration.
IPOM 2006: 168-180 |
| 51 | EE | Giampaolo Bella,
Stefano Bistarelli,
Simon N. Foley:
Soft Constraints for Security.
Electr. Notes Theor. Comput. Sci. 142: 11-29 (2006) |
| 50 | EE | Thomas B. Quillinan,
Simon N. Foley:
Synchronisation in Trust Management Using Push Authorisation.
Electr. Notes Theor. Comput. Sci. 157(3): 143-158 (2006) |
| 49 | EE | Benjamin Aziz,
Simon N. Foley,
John Herbert,
Garret Swart:
Reconfiguring Role Based Access Control policies using risk semantics.
J. High Speed Networks 15(3): 261-273 (2006) |
| 48 | EE | Simon N. Foley,
Barry P. Mulcahy,
Thomas B. Quillinan,
Meabh O'Connor,
John P. Morrison:
Supporting heterogeneous middleware security policies in WebCom.
J. High Speed Networks 15(3): 301-313 (2006) |
| 2005 |
| 47 | | Simon N. Foley:
Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005
ACM 2005 |
| 46 | EE | Simon N. Foley,
Abe Singer,
Michael E. Locasto,
Stelios Sidiroglou,
Angelos D. Keromytis,
John McDermott,
Julie Thorpe,
Paul C. van Oorschot,
Anil Somayaji,
Richard Ford,
Mark Bush,
Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop.
ACSAC 2005: 393-396 |
| 45 | EE | Garret Swart,
Benjamin Aziz,
Simon N. Foley,
John Herbert:
Trading Off Security in a Service Oriented Architecture.
DBSec 2005: 295-309 |
| 44 | EE | Hongbin Zhou,
Simon N. Foley:
A Logic for Analysing Subterfuge in Delegation Chains.
Formal Aspects in Security and Trust 2005: 127-141 |
| 43 | | Barry P. Mulcahy,
Simon N. Foley,
John P. Morrison:
Cross Cutting Condensed Graphs.
PDPTA 2005: 965-973 |
| 42 | EE | Simon N. Foley,
Hongbin Zhou:
Authorisation Subterfuge by Delegation in Decentralised Networks.
Security Protocols Workshop 2005: 97-102 |
| 41 | EE | Simon N. Foley:
Believing the Integrity of a System: (Invited Talk).
Electr. Notes Theor. Comput. Sci. 125(1): 3-12 (2005) |
| 40 | EE | Stefano Bistarelli,
Simon N. Foley,
Barry O'Sullivan:
A soft constraint-based approach to the cascade vulnerability problem.
Journal of Computer Security 13(5): 699-720 (2005) |
| 39 | EE | Brian C. Clayton,
Thomas B. Quillinan,
Simon N. Foley:
Automating security configuration for the Grid.
Scientific Programming 13(2): 113-125 (2005) |
| 2004 |
| 38 | | Stefano Bistarelli,
Simon N. Foley,
Barry O'Sullivan:
Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints.
AAAI 2004: 808-813 |
| 37 | EE | Carla Marceau,
Simon N. Foley:
Themes and Highlights of the New Security Paradigms Workshop 2004.
ACSAC 2004: 382-383 |
| 36 | | Benjamin Aziz,
Simon N. Foley,
John Herbert,
Garret Swart:
Configuring Storage Area Networks for Mandatory Security.
DBSec 2004: 357-370 |
| 35 | EE | Stefano Bistarelli,
Simon N. Foley,
Barry O'Sullivan:
Reasoning about Secure Interoperation Using Soft Constraints.
Formal Aspects in Security and Trust 2004: 173-186 |
| 34 | EE | Simon N. Foley,
Thomas B. Quillinan,
Maeve O'Connor,
Barry P. Mulcahy,
John P. Morrison:
A Framework for Heterogeneous Middleware Security.
IPDPS 2004 |
| 33 | EE | Thomas B. Quillinan,
Brian C. Clayton,
Simon N. Foley:
GridAdmin: Decentralising Grid Administration Using Trust Management.
ISPDC/HeteroPar 2004: 184-192 |
| 32 | EE | Hongbin Zhou,
Simon N. Foley:
A collaborative approach to autonomic security protocols.
NSPW 2004: 13-21 |
| 31 | EE | Stefano Bistarelli,
Simon N. Foley,
Barry O'Sullivan:
Modeling and detecting the cascade vulnerability problem using soft constraints.
SAC 2004: 383-390 |
| 30 | EE | Thomas B. Quillinan,
Simon N. Foley:
Security in WebCom: addressing naming issues for a web services architecture.
SWS 2004: 97-105 |
| 2003 |
| 29 | EE | Hongbin Zhou,
Simon N. Foley:
Fast automatic synthesis of security protocols using backward search.
FMSE 2003: 1-10 |
| 28 | EE | Simon N. Foley:
Using Trust Management to Support Transferable Hash-Based Micropayments.
Financial Cryptography 2003: 1-14 |
| 27 | EE | Stefano Bistarelli,
Simon N. Foley:
Analysis of Integrity Policies using Soft Constraints.
POLICY 2003: 77-80 |
| 26 | EE | Stefano Bistarelli,
Simon N. Foley:
A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity.
SAFECOMP 2003: 130-143 |
| 25 | EE | Simon N. Foley,
Hongbin Zhou:
Towards a Framework for Autonomic Security Protocols.
Security Protocols Workshop 2003: 49-54 |
| 24 | EE | Simon N. Foley:
Towards a Framework for Autonomic Security Protocols (Discussion).
Security Protocols Workshop 2003: 55-62 |
| 2002 |
| 23 | | Simon N. Foley,
Thomas B. Quillinan,
John P. Morrison:
Secure Component Distribution Using WebCom.
SEC 2002: 387-398 |
| 22 | EE | Simon N. Foley:
Supporting Imprecise Delegation in KeyNote.
Security Protocols Workshop 2002: 179-188 |
| 2001 |
| 21 | EE | Simon N. Foley,
John P. Morrison:
Computational paradigms and protection.
NSPW 2001: 3-11 |
| 20 | EE | Simon N. Foley:
Trust Management and Whether to Delegate.
Security Protocols Workshop 2001: 151-157 |
| 19 | EE | Simon N. Foley:
Trust Management and Whether to Delegate (Transcript of Discussion).
Security Protocols Workshop 2001: 158-165 |
| 18 | EE | Simon N. Foley,
Robert Dumigan:
Are handheld viruses a significant threat?
Commun. ACM 44(1): 105-107 (2001) |
| 1998 |
| 17 | EE | Simon N. Foley:
A Kernelized Architecture for Multilevel Secure Application Policies.
ESORICS 1998: 33-49 |
| 16 | EE | Simon N. Foley:
External Consistency and the Verification of Security Protocols (Position Paper).
Security Protocols Workshop 1998: 24-27 |
| 15 | EE | Simon N. Foley:
External Consistency and the Verification of Security Protocols (Transcript of Discussion).
Security Protocols Workshop 1998: 28-35 |
| 14 | EE | Simon N. Foley:
Evaluating System Integrity.
Workshop on New Security Paradigms 1998: 40-47 |
| 1997 |
| 13 | EE | Simon N. Foley:
The Specification and Implementation of ``Commercial'' Security Requirements Including Dynamic Segregation of Duties.
ACM Conference on Computer and Communications Security 1997: 125-134 |
| 12 | EE | Simon N. Foley:
Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores.
ACSAC 1997: 69-80 |
| 11 | EE | Simon N. Foley:
Building Chinese walls in standard unixTM.
Computers & Security 16(6): 551-563 (1997) |
| 1996 |
| 10 | EE | Simon N. Foley,
Li Gong,
Xiaolei Qian:
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification.
IEEE Symposium on Security and Privacy 1996: 142-153 |
| 1995 |
| 9 | EE | Simon N. Foley,
Jeremy Jacob:
Specifying security for CSCW systems.
CSFW 1995: 136- |
| 8 | | Simon N. Foley,
Jeremy Jacob:
Specifying Security for Computer Supported Collaborative Working.
Journal of Computer Security 3(4): 233-254 (1995) |
| 1994 |
| 7 | | Simon N. Foley:
Reasoning about Confidentiality Requirements.
CSFW 1994: 150-160 |
| 1992 |
| 6 | | Simon N. Foley:
Aggregation and Separation as Noninterference Properties.
Journal of Computer Security 1(2): 159-188 (1992) |
| 1991 |
| 5 | | Simon N. Foley:
Separation of Duty using High Water Marks.
CSFW 1991: 79-88 |
| 4 | | Simon N. Foley:
A Taxonomy for Information Flow Policies and Models.
IEEE Symposium on Security and Privacy 1991: 98-109 |
| 1990 |
| 3 | | Simon N. Foley:
Secure Information Flow Using Security Groups.
CSFW 1990: 62-72 |
| 1989 |
| 2 | | Simon N. Foley:
A Model for Secure Information Flow.
IEEE Symposium on Security and Privacy 1989: 248-258 |
| 1987 |
| 1 | | Simon N. Foley:
A Universal Theory of Information Flow.
IEEE Symposium on Security and Privacy 1987: 116-122 |