dblp.uni-trier.dewww.uni-trier.de

Ian Welch Vis

Ian S. Welch

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
28EEChristian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch: Measurement Study on Malicious Web Servers in the .nz Domain. ACISP 2009: 8-25
27EEVipul Delwadia, Stuart Marshall, Ian Welch: Remotely shooting asteroids on our mobile phone. CHINZ 2009: 45-52
2008
26EEDavid Stirling, Ian Welch, Peter Komisarczuk: Designing Workflows for Grid Enabled Internet Instruments. CCGRID 2008: 218-225
25EEChristian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch: Identifying and Analyzing Web Server Attacks. IFIP Int. Conf. Digital Forensics 2008: 151-161
24EEChristian Seifert, Ian Welch, Peter Komisarczuk, Chiraag Uday Aval, Barbara Endicott-Popovsky: Identification of malicious web pages through analysis of underlying DNS and web server relationships. LCN 2008: 935-941
23EEChristian Seifert, Ian Welch, Peter Komisarczuk: Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots. SAC 2008: 1426-1432
22EEYvonne Coady, Corrado Santoro, Emiliano Tramontana, Ian Welch: Special track on Programming for Separation of Concerns: editorial message. SAC 2008: 251-252
2006
21EEKris Bubendorfer, Ian Welch, Blayne Chard: Trustworthy Auctions for Grid-Style Economies. CCGRID 2006: 386-390
20EEIan Welch, Fan Lu: Policy-driven reflective enforcement of security policies. SAC 2006: 1580-1584
19EEPaulo Veríssimo, Nuno Ferreira Neves, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch: Intrusion-tolerant middleware: the road to automatic security. IEEE Security & Privacy 4(4): 54-62 (2006)
2004
18EERobert J. Stroud, Ian S. Welch, John P. Warne, Peter Y. A. Ryan: A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture. DSN 2004: 453-
17EEEmiliano Tramontana, Ian Welch: Reflections on Programming with Grid Toolkits. RAM-SE 2004: 3-8
2003
16EEIan S. Welch, Robert J. Stroud: Re-engineering Security as a Crosscutting Concern. Comput. J. 46(5): 578-589 (2003)
2002
15EECliff B. Jones, Alexander B. Romanovsky, Ian Welch: A Structured Approach to Handling On-Line Interface Upgrades. COMPSAC 2002: 1000-1005
14EECliff B. Jones, Panayiotis Periorellis, Alexander B. Romanovsky, Ian Welch: Structured Handling of Online Interface Upgrades in Integrating Dependable Systems of Systems. FIDJI 2002: 73-86
13 Ian Welch, Robert J. Stroud: Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code. Journal of Computer Security 10(4): 399-432 (2002)
2001
12EEIan Welch, Robert J. Stroud: Kava - Using Byte code Rewriting to add Behavioural Reflection to Java. COOTS 2001: 119-130
11EEEric Jul, Andrew P. Black, Doug Lea, Robert E. Filman, Ian Welch: Panel: The Next 700 Distributed Object Systems. ECOOP Workshops 2001: 208-212
10EEIan Welch, Robert J. Stroud, Alexander B. Romanovsky: Aspects of Exceptions at the Meta-level. Reflection 2001: 280-281
2000
9EEIan Welch, Robert J. Stroud: Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. ESORICS 2000: 309-323
1999
8 Ian Welch, Robert J. Stroud: Runtime Implementation of Aspects Using Kava. ECOOP Workshops 1999: 303-304
7EEIan Welch, Robert J. Stroud: Supporting Real World Security Models in Java. FTDCS 1999: 155-162
6EEIan Welch, Robert J. Stroud: From Dalang to Kava - The Evolution of a Reflective Java Extension. Reflection 1999: 2-21
5EEIan Welch, Robert J. Stroud: Kava - A Reflective Java Based on Bytecode Rewriting. Reflection and Software Engineering 1999: 155-167
4 Avelino F. Zorzo, Alexander B. Romanovsky, Jie Xu, Brian Randell, Robert J. Stroud, Ian Welch: Using Coordinated Atomic Actions to Design Safety-Critical Systems: a Production Cell Case Study. Softw., Pract. Exper. 29(8): 677-697 (1999)
1998
3EEIan Welch, Robert J. Stroud: Adaptation of Connectors in Software Architectures. ECOOP Workshops 1998: 145-146
2EEIan Welch, Robert J. Stroud: Dynamic Adaptation of the Security Properties of Applications and Components. ECOOP Workshops 1998: 282
1EEIan Welch, Robert J. Stroud: A Reflective Java Class Loader. ECOOP Workshops 1998: 374-375

Coauthor Index

1Chiraag Uday Aval [24]
2Andrew P. Black [11]
3Kris Bubendorfer [21]
4Christian Cachin [19]
5Blayne Chard [21]
6Yvonne Coady [22]
7Vipul Delwadia [27] [28]
8Yves Deswarte [19]
9Barbara Endicott-Popovsky [24] [25]
10Robert E. Filman [11]
11Deborah A. Frincke [25]
12Cliff B. Jones [14] [15]
13Eric Jul [11]
14Peter Komisarczuk [23] [24] [25] [26] [28]
15Doug Lea [11]
16Fan Lu [20]
17Stuart Marshall [27]
18Radu Muschevici [25]
19Nuno Ferreira Neves [19]
20Panayiotis Periorellis [14]
21Jonathan A. Poritz [19]
22David Powell [19]
23Brian Randell [4]
24Alexander Romanovsky (Alexander B. Romanovsky) [4] [10] [14] [15]
25Peter Y. A. Ryan (Peter Ryan) [18]
26Corrado Santoro [22]
27Christian Seifert [23] [24] [25] [28]
28David Stirling [26] [28]
29Robert J. Stroud [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [12] [13] [16] [18] [19]
30Emiliano Tramontana [17] [22]
31Paulo Veríssimo [19]
32John P. Warne [18]
33Jie Xu [4]
34Avelino Francisco Zorzo (Avelino F. Zorzo) [4]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)