dblp.uni-trier.dewww.uni-trier.de

Jim Alves-Foss Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2008
43EELuay A. Wahsheh, Daniel Conte de Leon, Jim Alves-Foss: Formal Verification and Visualization of Security Policies. JCP 3(6): 22-31 (2008)
42EEJie Zhou, Jim Alves-Foss: Security policy refinement and enforcement for the design of multi-level secure systems. Journal of Computer Security 16(2): 107-131 (2008)
41EECarol Masuck, Jim Alves-Foss, Paul W. Oman: Analysis of fault models for student use. SIGCSE Bulletin 40(2): 79-83 (2008)
2007
40EEJeffrey Choi Robinson, W. Scott Harrison, Nadine Hanebutte, Paul W. Oman, Jim Alves-Foss: Implementing middleware for content filtering and information flow control. CSAW 2007: 47-53
39EEDaniel Conte de Leon, Jim Alves-Foss, Paul W. Oman: Implementation-Oriented Secure Architectures. HICSS 2007: 278
38EELu'ay A. Wahsheh, Jim Alves-Foss: Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture. IRI 2007: 183-189
37EEHuaqiang Wei, Jim Alves-Foss, Du Zhang, Deborah A. Frincke: Rationality Validation of a Layered Decision Model for Network Defense. IRI 2007: 85-90
36 Huaqiang Wei, Jim Alves-Foss, Du Zhang: Validating A Layered Decision Framework for Cost-Effective Network Defense. SEKE 2007: 105-110
35EEShanyu Zheng, David Manz, Jim Alves-Foss: A communication-computation efficient group key algorithm for large and dynamic groups. Computer Networks 51(1): 69-93 (2007)
34EEJeffrey Choi Robinson, Jim Alves-Foss: A high assurance MLS file server. Operating Systems Review 41(1): 45-53 (2007)
2006
33 Bei Wang, Jim Alves-Foss: An MSLS-EMM for enforcing confidentiality in malicious environments. Communication, Network, and Information Security 2006: 126-131
32 Joon Son, Jim Alves-Foss: Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systems. Communication, Network, and Information Security 2006: 13-18
31EEScott Harrison, Nadine Hanebutte, Jim Alves-Foss: Programming Education in the Era of the Internet: A Paradigm Shift. HICSS 2006
30 Huaqiang Wei, Jim Alves-Foss: Applying the layered decision model to the design of language-based security systems. IRI 2006: 182-187
29EEShanyu Zheng, Jim Alves-Foss, Stephen S. Lee: The Effect of Rebalancing on the Performance of a Group Key Agreement Protocol. LCN 2006: 983-989
28EEJie Zhou, Jim Alves-Foss: Architecture-based refinements for secure computer systems design. PST 2006: 15
27EEDaniel Conte de Leon, Jim Alves-Foss: Hidden Implementation Dependencies in High Assurance and Critical Computing Systems. IEEE Trans. Software Eng. 32(10): 790-811 (2006)
26EEJim Alves-Foss, Paul W. Oman, Carol Taylor, Scott Harrison: The MILS architecture for high-assurance embedded systems. IJES 2(3/4): 239-247 (2006)
25EELu'ay A. Wahsheh, Jim Alves-Foss: Specifying and enforcing a multi-policy paradigm for high assurance multi-enclave systems. J. High Speed Networks 15(3): 315-327 (2006)
2005
24 Shanyu Zheng, Jim Alves-Foss, Stephen S. Lee: Performance of Group Key Agreement Protocols over Multiple Operations. IASTED PDCS 2005: 600-606
23EEHuaqiang Wei, Deborah A. Frincke, Jim Alves-Foss, Terence Soule, Hugh Pforsich: A layered decision model for cost-effective network defense. IRI 2005: 506-511
2004
22EEJim Alves-Foss, Carol Taylor, Paul W. Oman: A Multi-Layered Approach to Security in High Assurance Systems. HICSS 2004
21EEDaniel Conte de Leon, Jim Alves-Foss: Experiments on Processing and Linking Semantically Augmented Requirement Specifications. HICSS 2004
20EEHyungjick Lee, Jim Alves-Foss, Scott Harrison: The Use of Encrypted Functions for Mobile Agent Security. HICSS 2004
19EETao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt: Formal Reasoning About Intrusion Detection Systems. RAID 2004: 278-295
18EEHyungjick Lee, Jim Alves-Foss, Scott Harrison: The construction of secure mobile agents via evaluating encrypted functions. Web Intelligence and Agent Systems 2(1): 1-19 (2004)
2003
17EECarol Taylor, Jim Alves-Foss: Attack Recognition for System Survivability: A Low-level Approach. HICSS 2003: 335
16 Jonathan Graham, Jim Alves-Foss: Efficient Allocation in Distributed Object Oriented Databases. ISCA PDCS 2003: 471-
2002
15EEJim Alves-Foss, Daniel Conte de Leon, Paul W. Oman: Experiments in the Use of XML to Enhance Traceability between Object-Oriented Design Specifications and Source Code. HICSS 2002: 276
14EESreekanth Malladi, Jim Alves-Foss: What are Multi-Protocol Guessing Attacks and How to Prevent Them. WETICE 2002: 77-82
2001
13EEJie Dai, Jim Alves-Foss: Certificate Based Authorization Simulation System. COMPSAC 2001: 190-195
12 M. Randall Holmes, Jim Alves-Foss: The Watson Theorem Prover. J. Autom. Reasoning 26(4): 357-408 (2001)
2000
11 Bart Rylander, Terence Soule, James A. Foster, Jim Alves-Foss: Quantum Genetic Algorithms. GECCO 2000: 373
10 Jim Alves-Foss: Cryptographic Protocol Engineering-Building Security from the Ground Up. International Conference on Internet Computing 2000: 371-378
1999
9 Jim Alves-Foss: Formal Syntax and Semantics of Java Springer 1999
8EEJim Alves-Foss, Deborah A. Frincke: Formal Grammar for Java. Formal Syntax and Semantics of Java 1999: 1-40
7EEJim Alves-Foss, Fong Shing Lam: Dynamic Denotational Semantics of Java. Formal Syntax and Semantics of Java 1999: 201-240
6EEJim Alves-Foss, Ann E. Kelley Sobel: Formal Methods and Industry - Introduction. HICSS 1999
1998
5EEJim Alves-Foss: The Architecture of Secure Systems. HICSS (3) 1998: 307-316
1995
4 E. Thomas Schubert, Phillip J. Windley, Jim Alves-Foss: Higher Order Logic Theorem Proving and Its Applications, 8th International Workshop, Aspen Grove, UT, USA, September 11-14, 1995, Proceedings Springer 1995
3 Jim Alves-Foss, Salvador Barbosa: Assessing Computer Security Vulnerability. Operating Systems Review 29(3): 3-13 (1995)
1992
2 Jim Alves-Foss: Modelling Non-Deterministic System in HOL. TPHOLs 1992: 295-304
1991
1 Jim Alves-Foss, Karl N. Levitt: Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components. IEEE Symposium on Security and Privacy 1991: 122-135

Coauthor Index

1Salvador Barbosa [3]
2Jie Dai [13]
3James A. Foster [11]
4Deborah A. Frincke [8] [23] [37]
5Jonathan Graham [16]
6Nadine Hanebutte [31] [40]
7Scott Harrison [18] [20] [26] [31]
8W. Scott Harrison [40]
9M. Randall Holmes [12]
10Calvin Ko [19]
11Fong Shing Lam [7]
12Hyungjick Lee [18] [20]
13Stephen S. Lee [24] [29]
14Daniel Conte de Leon [15] [21] [27] [39] [43]
15Karl N. Levitt [1] [19]
16Sreekanth Malladi [14]
17David Manz [35]
18Carol Masuck [41]
19Paul W. Oman [15] [22] [26] [39] [40] [41]
20Hugh Pforsich [23]
21Jeffrey Choi Robinson [34] [40]
22Bart Rylander [11]
23E. Thomas Schubert [4]
24Ann E. Kelley Sobel [6]
25Joon Son [32]
26Tao Song [19]
27Terence Soule [11] [23]
28Carol Taylor [17] [22] [26]
29Luay A. Wahsheh (Lu'ay A. Wahsheh) [25] [38] [43]
30Bei Wang [33]
31Huaqiang Wei [23] [30] [36] [37]
32Phillip J. Windley [4]
33Cui Zhang [19]
34Du Zhang [36] [37]
35Shanyu Zheng [24] [29] [35]
36Jie Zhou [28] [42]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)