Simon N Foley
Simon N Foley
IMT Atlantique, Rennes
Verified email at - Homepage
TitleCited byYear
Reconfiguring role based access control policies using risk semantics
B Aziz, SN Foley, J Herbert, G Swart
Journal of High Speed Networks 15 (3), 261-273, 2006
A model for secure information flow
SN Foley
Proceedings. 1989 IEEE Symposium on Security and Privacy, 248-258, 1989
The specification and implementation of'commercial'security requirements including dynamic segregation of duties
SN Foley
ACM Conference on Computer and Communications Security, 125-134, 1997
A Universal Theory of Information Flow
SN Foley
Symposium on Security and Privacy, 1987
A nonfunctional approach to system integrity
SN Foley
IEEE Journal on Selected Areas in Communications 21 (1), 36-43, 2003
A security model of dynamic labelling providing a tiered approach to verification
SN Foley, L Gong, X Qian
Proceedings 1996 IEEE Symposium on Security and Privacy, 142-153, 1996
Aggregation and separation as noninterference properties
SN Foley
Journal of Computer Security 1 (2), 159-188, 1992
Challenges for federated, autonomic network management in the Future Internet
B Jennings, R Brennan, W Donnelly, SN Foley, D Lewis, D O'Sullivan, ...
2009 IFIP/IEEE International Symposium on Integrated Network Management …, 2009
Multilevel security and quality of protection
SN Foley, S Bistarelli, B O’Sullivan, J Herbert, G Swart
Quality of Protection, 93-105, 2006
Using trust management to support transferable hash-based micropayments
SN Foley
International Conference on Financial Cryptography, 1-14, 2003
Management of security policy configuration using a Semantic Threat Graph approach
SN Foley, WM Fitzgerald
Journal of Computer Security 19 (3), 567-605, 2011
A taxonomy for information flow policies and models
SN Foley
null, 98, 1991
A framework for heterogeneous middleware security
SN Foley, TB Quillinan, M O'Connor, BP Mulcahy, JP Morrison
18th International Parallel and Distributed Processing Symposium, 2004 …, 2004
Fast automatic synthesis of security protocols using backward search
H Zhou, SN Foley
FMSE 3, 1-10, 2003
Security risk management using internal controls
SN Foley
Proceedings of the first ACM workshop on Information security governance, 59-64, 2009
GridAdmin: Decentralising grid administration using trust management
TB Quillinan, BC Clayton, SN Foley
Third International Symposium on Parallel and Distributed Computing/Third …, 2004
Specifying security for CSCW systems
SN Foley, J Jacob
Proceedings The Eighth IEEE Computer Security Foundations Workshop, 136-145, 1995
WebCom-G: A candidate middleware for Grid-Ireland
JP Morrison, B Coghlan, A Shearer, S Foley, D Power, R Perrott
The International Journal of High Performance Computing Applications 20 (3 …, 2006
Specifying security for computer supported collaborative working
SN Foley, JL Jacob
Journal of Computer Security 3 (4), 233-253, 1995
Are handheld viruses a significant threat?
SN Foley, R Dumigan
Communications of the ACM 44 (1), 105-107, 2001
The system can't perform the operation now. Try again later.
Articles 1–20