A model for secure information flow SN Foley Proceedings. 1989 IEEE Symposium on Security and Privacy, 248-248, 1989 | 55 | 1989 |
Reconfiguring role based access control policies using risk semantics B Aziz, SN Foley, J Herbert, G Swart Journal of High Speed Networks 15 (3), 261-273, 2006 | 54 | 2006 |
A Universal Theory of Information Flow SN Foley Symposium on Security and Privacy, 1987 | 52 | 1987 |
The specification and implementation of “commercial” security requirements including dynamic segregation of duties SN Foley Proceedings of the 4th ACM Conference on Computer and Communications …, 1997 | 46 | 1997 |
A security model of dynamic labelling providing a tiered approach to verification SN Foley, L Gong, X Qian Proceedings 1996 IEEE Symposium on Security and Privacy, 142-153, 1996 | 42 | 1996 |
Risk profiling for enterprise risk management SN Foley, HB Moss US Patent 10,248,915, 2019 | 41 | 2019 |
A nonfunctional approach to system integrity SN Foley IEEE Journal on Selected Areas in Communications 21 (1), 36-43, 2003 | 41 | 2003 |
Aggregation and separation as noninterference properties SN Foley Journal of Computer Security 1 (2), 159-188, 1992 | 39 | 1992 |
Developer-centered security and the symmetry of ignorance O Pieczul, S Foley, ME Zurko Proceedings of the 2017 New Security Paradigms Workshop, 46-56, 2017 | 37 | 2017 |
Challenges for federated, autonomic network management in the future internet B Jennings, R Brennan, W Donnelly, SN Foley, D Lewis, D O'Sullivan, ... 2009 IFIP/IEEE International Symposium on Integrated Network Management …, 2009 | 36 | 2009 |
Multilevel security and quality of protection SN Foley, S Bistarelli, B O’Sullivan, J Herbert, G Swart Quality of Protection: Security Measurements and Metrics, 93-105, 2006 | 35 | 2006 |
Using trust management to support transferable hash-based micropayments SN Foley Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe …, 2003 | 33 | 2003 |
Management of security policy configuration using a Semantic Threat Graph approach SN Foley, WM Fitzgerald Journal of Computer Security 19 (3), 567-605, 2011 | 31 | 2011 |
A taxonomy for information flow policies and models SN Foley Proceedings. 1991 IEEE Computer Society Symposium on Research in Security …, 1991 | 30 | 1991 |
A framework for heterogeneous middleware security SN Foley, TB Quillinan, M O'Connor, BP Mulcahy, JP Morrison 18th International Parallel and Distributed Processing Symposium, 2004 …, 2004 | 28 | 2004 |
Security risk management using internal controls SN Foley Proceedings of the first ACM workshop on Information security governance, 59-64, 2009 | 23 | 2009 |
Detecting and eliminating the cascade vulnerability problem from multilevel security networks using soft constraints S Bistarelli, SN Foley, B O'Sullivan AAAI, 808-813, 2004 | 23* | 2004 |
GridAdmin: Decentralising grid administration using trust management TB Quillinan, BC Clayton, SN Foley Third International Symposium on Parallel and Distributed Computing/Third …, 2004 | 23 | 2004 |
Fast automatic synthesis of security protocols using backward search H Zhou, SN Foley Proceedings of the 2003 ACM workshop on Formal methods in security …, 2003 | 23 | 2003 |
Are handheld viruses a significant threat? SN Foley, R Dumigan Communications of the ACM 44 (1), 105-107, 2001 | 21 | 2001 |