James Alves-Foss - Publications

Affiliations: 
University of Idaho, Moscow, ID, United States 
Area:
Computer Science

41 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Jillepalli AA, Leon DCd, Steiner S, Alves-Foss J. Analysis of Web Browser Security Configuration Options Ksii Transactions On Internet and Information Systems. 12: 6139-6160. DOI: 10.3837/Tiis.2018.12.028  0.43
2016 Yang X, Shi P, Sun H, Zheng W, Alves-Foss J. A fast boot, fast shutdown technique for android OS devices Computer. 49: 62-68. DOI: 10.1109/Mc.2016.210  0.321
2016 Song J, Alves-Foss J. Expanding RTEMS to a multiuser system by using security tags Communications in Computer and Information Science. 589: 3-18. DOI: 10.1007/978-3-319-28313-5_1  0.43
2016 Haltinner K, Sarathchandra D, Alves-Foss J, Chang K, de Leon DC, Song J. Cyber security: Second international symposium, CSS 2015 coeur d’Alene, ID, USA, April 7-8, 2015 revised selected papers Communications in Computer and Information Science. 589. DOI: 10.1007/978-3-319-28313-5  0.347
2015 Song J, Alves-Foss J. The DARPA cyber grand challenge: A competitor's perspective Ieee Security and Privacy. 13: 72-76. DOI: 10.1109/MSP.2015.132  0.336
2015 Alves-Foss J, Song J, Amack AS, Kerr L, Steiner S. Evaluating the use of security tags in security policy enforcement mechanisms Proceedings of the Annual Hawaii International Conference On System Sciences. 2015: 5201-5210. DOI: 10.1109/HICSS.2015.614  0.465
2013 Yang X, Alves-Foss J. Security policy refinement: High-level specification to low-level implementation Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 502-511. DOI: 10.1109/SocialCom.2013.77  0.431
2013 Song J, Alves-Foss J. Security tagging for a zero-kernel operating system Proceedings of the Annual Hawaii International Conference On System Sciences. 5049-5058. DOI: 10.1109/HICSS.2013.474  0.307
2012 Lundeen B, Alves-Foss J. Practical clickjacking with BeEF 2012 Ieee International Conference On Technologies For Homeland Security, Hst 2012. 614-619. DOI: 10.1109/THS.2012.6459919  0.337
2011 Weis J, Alves-Foss J. Securing database as a service: Issues and compromises Ieee Security and Privacy. 9: 49-55. DOI: 10.1109/MSP.2011.127  0.345
2011 Linda O, Manic M, Alves-Foss J, Vollmer T. Towards resilient critical infrastructures: Application of Type-2 Fuzzy Logic in embedded network security cyber sensor Proceedings - Isrcs 2011: 4th International Symposium On Resilient Control Systems. 26-32. DOI: 10.1109/ISRCS.2011.6016083  0.317
2010 Manz D, Oman P, Alves-Foss J. A framework for group key management protocol assessment independent of view synchrony Journal of Computer Science. 6: 229-234. DOI: 10.3844/Jcssp.2010.229.234  0.369
2010 Conrad JR, Alves-Foss J, Lee SS. Analyzing uncertainty in TG protection graphs with TG/MC Journal of Computer Security. 18: 667-699. DOI: 10.3233/Jcs-2009-0378  0.424
2009 Son J, Alves-Foss J. A formal framework for real-time information flow analysis Computers and Security. 28: 421-432. DOI: 10.1016/J.Cose.2009.01.005  0.453
2008 Wahsheh LA, de Leon DC, Alves-Foss J. Formal verification and visualization of security policies Journal of Computers. 3: 22-31. DOI: 10.4304/Jcp.3.6.22-31  0.479
2008 Wahsheh LA, Alves-Foss J. Security policy development: Towards a life-cycle and logic-based verification model American Journal of Applied Sciences. 5: 1117-1126. DOI: 10.3844/Ajassp.2008.1117.1126  0.485
2008 Zhou J, Alves-Foss J. Security policy refinement and enforcement for the design of multi-level secure systems Journal of Computer Security. 16: 107-131. DOI: 10.3233/Jcs-2008-16202  0.527
2007 Wahsheh LA, Alves-Foss J. Policy-Based Security for Wireless Components in High Assurance Computer Systems Journal of Computer Science. 3: 726-735. DOI: 10.3844/Jcssp.2007.726.735  0.539
2007 Robinson JC, Scott Harrison W, Hanebutte N, Oman P, Alves-Foss J. Implementing middleware for content filtering and information flow control Proceedings of the Acm Conference On Computer and Communications Security. 47-53. DOI: 10.1145/1314466.1314474  0.379
2007 Robinson JC, Alves-Foss J. A high assurance MLS file server Operating Systems Review (Acm). 41: 45-53. DOI: 10.1145/1228291.1228303  0.477
2007 Wahsheh LA, Alves-Foss J. Using policy enforcement graphs in a separation-based high assurance architecture 2007 Ieee International Conference On Information Reuse and Integration, Ieee Iri-2007. 183-189. DOI: 10.1109/IRI.2007.4296618  0.475
2007 De Leon DC, Alves-Foss J, Oman PW. Implementation-oriented secure architectures Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2007.264  0.419
2007 Zheng S, Manz D, Alves-Foss J. A communication-computation efficient group key algorithm for large and dynamic groups Computer Networks. 51: 69-93. DOI: 10.1016/J.Comnet.2006.03.008  0.348
2007 Son J, Alves-Foss J. High level specification of non-Interference security policies in partitioned MLS systems Proceedings of the 4th Iasted International Conference On Communication, Network, and Information Security. 83-89.  0.442
2006 Alves-Foss J, Oman PW, Taylor C, Harrison WS. The MILS architecture for high-assurance embedded systems International Journal of Embedded Systems. 2: 239-247. DOI: 10.1504/Ijes.2006.014859  0.457
2006 De Leon DC, Alves-Foss J. Hidden implementation dependencies in high assurance and critical computing systems Ieee Transactions On Software Engineering. 32: 790-811. DOI: 10.1109/Tse.2006.103  0.323
2006 Wei H, Alves-Foss J. Applying the layered decision model to the design of language-based security systems Proceedings of the 2006 Ieee International Conference On Information Reuse and Integration, Iri-2006. 182-187. DOI: 10.1109/IRI.2006.252410  0.423
2006 Harrison WS, Hanebutte N, Alves-Foss J. Programming education in the era of the internet: A paradigm shift Proceedings of the Annual Hawaii International Conference On System Sciences. 9. DOI: 10.1109/HICSS.2006.395  0.368
2006 Wang B, Alves-Foss J. AN MSLS-EMM for enforcing confidentiality in malicious environments Proceedings of the Third Iasted International Conference On Communication, Network, and Information Security, Cnis 2006. 126-131.  0.418
2006 Son J, Alves-Foss J. Covert timing channel analysis of rate monotonic real-time scheduling algorithm in MLS systems Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 361-368.  0.316
2006 Zheng S, Manz D, Alves-Foss J, Chen Y. Security and performance of group key agreement protocols Proceedings of the Iasted International Conference On Networks and Communication Systems 2006. 2006: 321-327.  0.343
2006 Taylor C, Alves-Foss J. Diversity as a computer defense mechanism a panel Proceedings New Security Paradigms Workshop. 2006: 11-14.  0.345
2005 Hanebutte N, Oman P, Loosbrock M, Holland A, Harrison WS, Alves-Foss J. Software mediators for transparent channel control in unbounded environments Proceedings From the 6th Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc 2005. 2005: 201-206. DOI: 10.1109/IAW.2005.1495953  0.41
2005 Harrison WS, Hanebutte N, Oman PW, Alves-Foss J. The MILS architecture for a secure Global Information Grid Crosstalk. 18.  0.442
2004 Alves-Foss J, Taylor C, Oman P. A multi-layered approach to security in high assurance systems Proceedings of the Hawaii International Conference On System Sciences. 37: 4817-4826.  0.429
2004 Hyungjick L, Alves-Foss J, Harrison S. The use of encrypted functions for mobile agent security Proceedings of the Hawaii International Conference On System Sciences. 37: 4757-4766.  0.326
2004 Lee H, Alves-Foss J, Harrison S. The construction of secure mobile agents via evaluating encrypted functions Web Intelligence and Agent Systems. 2: 1-19.  0.332
2004 Song T, Ko C, Alves-Foss J, Zhang C, Levitt K. Formal Reasoning about Intrusion Detection Systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3224: 278-295.  0.333
2002 Malladi S, Alves-Foss J. What are multi-protocol guessing attacks and how to prevent them Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2002: 77-82. DOI: 10.1109/ENABL.2002.1029992  0.396
1996 Cavaiani C, Alves-Foss J. Mutual authenticating protocol with key distribution in client/server environment Acm Crossroads Student Magazine. 2: 17-22. DOI: 10.1145/332159.332164  0.465
1995 Alves-Foss J, Barbosa S. Assessing computer security vulnerability Operating Systems Review. 29: 3-13. DOI: 10.1145/206826.206829  0.483
Show low-probability matches.