Simon N. Foley

According to our database1, Simon N. Foley authored at least 121 papers between 1987 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying Settings.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

2018
Reasoning about firewall policies through refinement and composition.
Journal of Computer Security, 2018

A grounded theory approach to security policy elicitation.
Inf. & Comput. Security, 2018

Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use.
CoRR, 2018

An Online Consent Maturity Model: Moving from Acceptable Use Towards Ethical Practice.
Proceedings of the New Security Paradigms Workshop, 2018

What You Can Change and What You Can't: Human Experience in Computer Network Defenses.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Towards the Evaluation of End-to-End Resilience Through External Consistency.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018

Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access.
Proceedings of the IEEE International Conference on Big Data, 2018

2017
An Online Consent Maturity Model: Moving from Acceptable Use towards Ethical Practice.
CoRR, 2017

Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System (Transcript of Discussion).
Proceedings of the Security Protocols XXV, 2017

Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System.
Proceedings of the Security Protocols XXV, 2017

Developer-centered security and the symmetry of ignorance.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

On database intrusion detection: A Query analytics-based model of normative behavior to detect insider attacks.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

What Users Want: Adapting Qualitative Research Methods to Security Policy Elicitation.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management Systems.
Proceedings of the Risks and Security of Internet and Systems, 2017

2016
The Evolution of a Security Control or Why Do We Need More Qualitative Research of Software Vulnerabilties? (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016

The Evolution of a Security Control.
Proceedings of the Security Protocols XXIV, 2016

Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Reasoning About Firewall Policies Through Refinement and Composition.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Detecting Anomalous Behavior in DBMS Logs.
Proceedings of the Risks and Security of Internet and Systems, 2016

2015
The Dark Side of the Code.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

The Dark Side of the Code (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

A firewall algebra for OpenStack.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Consumer-Managed Federated Homes.
IEEE Communications Magazine, 2014

Collaborating as Normal: Detecting Systemic Anomalies in Your Partner.
Proceedings of the Security Protocols XXII, 2014

Collaborating as Normal: Detecting Systemic Anomalies in Your Partner (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014

I'm OK, You're OK, the System's OK: Normative Security for Systems.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

2013
MASON: Mobile autonomic security for network access controls.
J. Inf. Sec. Appl., 2013

A Bloom Filter Based Model for Decentralized Authorization.
Int. J. Intell. Syst., 2013

Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Explanations and Relaxations for Policy Conflicts in Physical Access Control.
Proceedings of the 25th IEEE International Conference on Tools with Artificial Intelligence, 2013

Discovering emergent norms in security logs.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Avoiding inconsistencies in the Security Content Automation Protocol.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Fast automatic security protocol generation.
Journal of Computer Security, 2012

Automated Smartphone Security Configuration.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Decentralized Semantic Threat Graphs.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Towards efficient access control in a mobile agent based wireless sensor network.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

Anomaly analysis for Physical Access Control security configuration.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
Management of security policy configuration using a Semantic Threat Graph approach.
Journal of Computer Security, 2011

Flexible secure inter-domain interoperability through attribute conversion.
Inf. Sci., 2011

Aligning Semantic Web applications with network access controls.
Computer Standards & Interfaces, 2011

Federated Autonomic Network Access Control.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

Reasoning about the Security Configuration of SAN Switch Fabrics.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

Trust management of XMPP federation.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Federated autonomic management of HAN services.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Avoiding Delegation Subterfuge Using Linked Local Permission Names.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

2010
Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria.
Security and Communication Networks, 2010

A risk-metric framework for enterprise risk management.
IBM Journal of Research and Development, 2010

Multidomain IT architectures for next-generation communications service providers [Next-Generation Telco IT Architectures].
IEEE Communications Magazine, 2010

Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Management of heterogeneous security access control configuration using an ontology engineering approach.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

A trust model for capability delegation in federated policy systems.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Virtual environment for the navigation of ideas and concepts in education (V.E.N.I.C.E).
Proceedings of the International Conference on Advanced Visual Interfaces, 2010

2009
Configuring storage-area networks using mandatory security.
Journal of Computer Security, 2009

Qualitative Analysis for Trust Management.
Proceedings of the Security Protocols XVII, 2009

Qualitative Analysis for Trust Management.
Proceedings of the Security Protocols XVII, 2009

An Approach to Security Policy Configuration Using Semantic Threat Graphs.
Proceedings of the Data and Applications Security XXIII, 2009

2008
Security Protocol Deployment Risk.
Proceedings of the Security Protocols XVI, 2008

Network Access Control Interoperation using Semantic Web Techniques.
Proceedings of the Security in Information Systems, 2008

Semantic Web and firewall alignment.
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008

From Marriages to Coalitions: A Soft CSP Approach.
Proceedings of the Recent Advances in Constraints, 2008

2006
Multilevel Security and Quality of Protection.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Supporting heterogeneous middleware security policies in WebCom.
J. High Speed Networks, 2006

Reconfiguring Role Based Access Control policies using risk semantics.
J. High Speed Networks, 2006

WEBCOM-G: A Candidate Middleware for Grid-Ireland.
IJHPCA, 2006

Synchronisation in Trust Management Using Push Authorisation.
Electr. Notes Theor. Comput. Sci., 2006

Soft Constraints for Security.
Electr. Notes Theor. Comput. Sci., 2006

Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration.
Proceedings of the Autonomic Principles of IP Operations and Management, 2006

A Framework for Establishing Decentralized Secure Coalitions.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

2005
Automating security configuration for the Grid.
Scientific Programming, 2005

A soft constraint-based approach to the cascade vulnerability problem.
Journal of Computer Security, 2005

Believing the Integrity of a System: (Invited Talk).
Electr. Notes Theor. Comput. Sci., 2005

Authorisation Subterfuge by Delegation in Decentralised Networks.
Proceedings of the Security Protocols, 2005

Authorisation Subterfuge by Delegation in Decentralised Networks.
Proceedings of the Security Protocols, 2005

Cross Cutting Condensed Graphs.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005

Approximating Saml Using Similarity Based Imprecision.
Proceedings of the Intelligence in Communication Systems, 2005

A Logic for Analysing Subterfuge in Delegation Chains.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

Trading Off Security in a Service Oriented Architecture.
Proceedings of the Data and Applications Security XIX, 2005

Highlights from the 2005 New Security Paradigms Workshop.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Security in WebCom: addressing naming issues for a web services architecture.
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004

Modeling and detecting the cascade vulnerability problem using soft constraints.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

A collaborative approach to autonomic security protocols.
Proceedings of the New Security Paradigms Workshop 2004, 2004

GridAdmin: Decentralising Grid Administration Using Trust Management.
Proceedings of the 3rd International Symposium on Parallel and Distributed Computing (ISPDC 2004), 2004

A Framework for Heterogeneous Middleware Security.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Reasoning about Secure Interoperation Using Soft Constraints.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

Configuring Storage Area Networks for Mandatory Security.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

Themes and Highlights of the New Security Paradigms Workshop 2004.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints.
Proceedings of the Nineteenth National Conference on Artificial Intelligence, 2004

2003
A nonfunctional approach to system integrity.
IEEE Journal on Selected Areas in Communications, 2003

Towards a Framework for Autonomic Security Protocols.
Proceedings of the Security Protocols, 2003

Towards a Framework for Autonomic Security Protocols (Discussion).
Proceedings of the Security Protocols, 2003

A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity.
Proceedings of the Computer Safety, 2003

Analysis of Integrity Policies using Soft Constraints.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

Using Trust Management to Support Transferable Hash-Based Micropayments.
Proceedings of the Financial Cryptography, 2003

Fast automatic synthesis of security protocols using backward search.
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003

2002
Supporting Imprecise Delegation in KeyNote.
Proceedings of the Security Protocols, 2002

Secure Component Distribution Using WebCom.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2001
Are handheld viruses a significant threat?
Commun. ACM, 2001

Trust Management and Whether to Delegate (Transcript of Discussion).
Proceedings of the Security Protocols, 2001

Trust Management and Whether to Delegate.
Proceedings of the Security Protocols, 2001

Computational paradigms and protection.
Proceedings of the New Security Paradigms Workshop 2001, 2001

2000
Conduit cascades and secure synchronization.
Proceedings of the 2000 Workshop on New Security Paradigms, 2000

1998
External Consistency and the Verification of Security Protocols (Transcript of Discussion).
Proceedings of the Security Protocols, 1998

External Consistency and the Verification of Security Protocols (Position Paper).
Proceedings of the Security Protocols, 1998

Evaluating System Integrity.
Proceedings of the 1998 Workshop on New Security Paradigms, 1998

A Kernelized Architecture for Multilevel Secure Application Policies.
Proceedings of the Computer Security, 1998

1997
Building Chinese walls in standard unixTM.
Computers & Security, 1997

The Specification and Implementation of "Commercial" Security Requirements Including Dynamic Segregation of Duties.
Proceedings of the CCS '97, 1997

Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1996
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

1995
Specifying Security for Computer Supported Collaborative Working.
Journal of Computer Security, 1995

Specifying security for CSCW systems.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

1994
Reasoning about Confidentiality Requirements.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

1992
Aggregation and Separation as Noninterference Properties.
Journal of Computer Security, 1992

1991
A Taxonomy for Information Flow Policies and Models.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

Separation of Duty using High Water Marks.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
Secure Information Flow Using Security Groups.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990

1989
A Model for Secure Information Flow.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

1987
A Universal Theory of Information Flow.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987


  Loading...