Follow
Simon N Foley
Simon N Foley
Unknown affiliation
Verified email at simonfoley.org - Homepage
Title
Cited by
Cited by
Year
A model for secure information flow
SN Foley
Proceedings. 1989 IEEE Symposium on Security and Privacy, 248-248, 1989
551989
Reconfiguring role based access control policies using risk semantics
B Aziz, SN Foley, J Herbert, G Swart
Journal of High Speed Networks 15 (3), 261-273, 2006
542006
A Universal Theory of Information Flow
SN Foley
Symposium on Security and Privacy, 1987
521987
The specification and implementation of “commercial” security requirements including dynamic segregation of duties
SN Foley
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
461997
A security model of dynamic labelling providing a tiered approach to verification
SN Foley, L Gong, X Qian
Proceedings 1996 IEEE Symposium on Security and Privacy, 142-153, 1996
421996
Risk profiling for enterprise risk management
SN Foley, HB Moss
US Patent 10,248,915, 2019
412019
A nonfunctional approach to system integrity
SN Foley
IEEE Journal on Selected Areas in Communications 21 (1), 36-43, 2003
412003
Aggregation and separation as noninterference properties
SN Foley
Journal of Computer Security 1 (2), 159-188, 1992
391992
Developer-centered security and the symmetry of ignorance
O Pieczul, S Foley, ME Zurko
Proceedings of the 2017 New Security Paradigms Workshop, 46-56, 2017
372017
Challenges for federated, autonomic network management in the future internet
B Jennings, R Brennan, W Donnelly, SN Foley, D Lewis, D O'Sullivan, ...
2009 IFIP/IEEE International Symposium on Integrated Network Management …, 2009
362009
Multilevel security and quality of protection
SN Foley, S Bistarelli, B O’Sullivan, J Herbert, G Swart
Quality of Protection: Security Measurements and Metrics, 93-105, 2006
352006
Using trust management to support transferable hash-based micropayments
SN Foley
Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe …, 2003
332003
Management of security policy configuration using a Semantic Threat Graph approach
SN Foley, WM Fitzgerald
Journal of Computer Security 19 (3), 567-605, 2011
312011
A taxonomy for information flow policies and models
SN Foley
Proceedings. 1991 IEEE Computer Society Symposium on Research in Security …, 1991
301991
A framework for heterogeneous middleware security
SN Foley, TB Quillinan, M O'Connor, BP Mulcahy, JP Morrison
18th International Parallel and Distributed Processing Symposium, 2004 …, 2004
282004
Security risk management using internal controls
SN Foley
Proceedings of the first ACM workshop on Information security governance, 59-64, 2009
232009
Detecting and eliminating the cascade vulnerability problem from multilevel security networks using soft constraints
S Bistarelli, SN Foley, B O'Sullivan
AAAI, 808-813, 2004
23*2004
GridAdmin: Decentralising grid administration using trust management
TB Quillinan, BC Clayton, SN Foley
Third International Symposium on Parallel and Distributed Computing/Third …, 2004
232004
Fast automatic synthesis of security protocols using backward search
H Zhou, SN Foley
Proceedings of the 2003 ACM workshop on Formal methods in security …, 2003
232003
Are handheld viruses a significant threat?
SN Foley, R Dumigan
Communications of the ACM 44 (1), 105-107, 2001
212001
The system can't perform the operation now. Try again later.
Articles 1–20