Year |
Citation |
Score |
2018 |
Jillepalli AA, Leon DCd, Steiner S, Alves-Foss J. Analysis of Web Browser Security Configuration Options Ksii Transactions On Internet and Information Systems. 12: 6139-6160. DOI: 10.3837/Tiis.2018.12.028 |
0.43 |
|
2016 |
Yang X, Shi P, Sun H, Zheng W, Alves-Foss J. A fast boot, fast shutdown technique for android OS devices Computer. 49: 62-68. DOI: 10.1109/Mc.2016.210 |
0.321 |
|
2016 |
Song J, Alves-Foss J. Expanding RTEMS to a multiuser system by using security tags Communications in Computer and Information Science. 589: 3-18. DOI: 10.1007/978-3-319-28313-5_1 |
0.43 |
|
2016 |
Haltinner K, Sarathchandra D, Alves-Foss J, Chang K, de Leon DC, Song J. Cyber security: Second international symposium, CSS 2015 coeur d’Alene, ID, USA, April 7-8, 2015 revised selected papers Communications in Computer and Information Science. 589. DOI: 10.1007/978-3-319-28313-5 |
0.347 |
|
2015 |
Song J, Alves-Foss J. The DARPA cyber grand challenge: A competitor's perspective Ieee Security and Privacy. 13: 72-76. DOI: 10.1109/MSP.2015.132 |
0.336 |
|
2015 |
Alves-Foss J, Song J, Amack AS, Kerr L, Steiner S. Evaluating the use of security tags in security policy enforcement mechanisms Proceedings of the Annual Hawaii International Conference On System Sciences. 2015: 5201-5210. DOI: 10.1109/HICSS.2015.614 |
0.465 |
|
2013 |
Yang X, Alves-Foss J. Security policy refinement: High-level specification to low-level implementation Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 502-511. DOI: 10.1109/SocialCom.2013.77 |
0.431 |
|
2013 |
Song J, Alves-Foss J. Security tagging for a zero-kernel operating system Proceedings of the Annual Hawaii International Conference On System Sciences. 5049-5058. DOI: 10.1109/HICSS.2013.474 |
0.307 |
|
2012 |
Lundeen B, Alves-Foss J. Practical clickjacking with BeEF 2012 Ieee International Conference On Technologies For Homeland Security, Hst 2012. 614-619. DOI: 10.1109/THS.2012.6459919 |
0.337 |
|
2011 |
Weis J, Alves-Foss J. Securing database as a service: Issues and compromises Ieee Security and Privacy. 9: 49-55. DOI: 10.1109/MSP.2011.127 |
0.345 |
|
2011 |
Linda O, Manic M, Alves-Foss J, Vollmer T. Towards resilient critical infrastructures: Application of Type-2 Fuzzy Logic in embedded network security cyber sensor Proceedings - Isrcs 2011: 4th International Symposium On Resilient Control Systems. 26-32. DOI: 10.1109/ISRCS.2011.6016083 |
0.317 |
|
2010 |
Manz D, Oman P, Alves-Foss J. A framework for group key management protocol assessment independent of view synchrony Journal of Computer Science. 6: 229-234. DOI: 10.3844/Jcssp.2010.229.234 |
0.369 |
|
2010 |
Conrad JR, Alves-Foss J, Lee SS. Analyzing uncertainty in TG protection graphs with TG/MC Journal of Computer Security. 18: 667-699. DOI: 10.3233/Jcs-2009-0378 |
0.424 |
|
2009 |
Son J, Alves-Foss J. A formal framework for real-time information flow analysis Computers and Security. 28: 421-432. DOI: 10.1016/J.Cose.2009.01.005 |
0.453 |
|
2008 |
Wahsheh LA, de Leon DC, Alves-Foss J. Formal verification and visualization of security policies Journal of Computers. 3: 22-31. DOI: 10.4304/Jcp.3.6.22-31 |
0.479 |
|
2008 |
Wahsheh LA, Alves-Foss J. Security policy development: Towards a life-cycle and logic-based verification model American Journal of Applied Sciences. 5: 1117-1126. DOI: 10.3844/Ajassp.2008.1117.1126 |
0.485 |
|
2008 |
Zhou J, Alves-Foss J. Security policy refinement and enforcement for the design of multi-level secure systems Journal of Computer Security. 16: 107-131. DOI: 10.3233/Jcs-2008-16202 |
0.527 |
|
2007 |
Wahsheh LA, Alves-Foss J. Policy-Based Security for Wireless Components in High Assurance Computer Systems Journal of Computer Science. 3: 726-735. DOI: 10.3844/Jcssp.2007.726.735 |
0.539 |
|
2007 |
Robinson JC, Scott Harrison W, Hanebutte N, Oman P, Alves-Foss J. Implementing middleware for content filtering and information flow control Proceedings of the Acm Conference On Computer and Communications Security. 47-53. DOI: 10.1145/1314466.1314474 |
0.379 |
|
2007 |
Robinson JC, Alves-Foss J. A high assurance MLS file server Operating Systems Review (Acm). 41: 45-53. DOI: 10.1145/1228291.1228303 |
0.477 |
|
2007 |
Wahsheh LA, Alves-Foss J. Using policy enforcement graphs in a separation-based high assurance architecture 2007 Ieee International Conference On Information Reuse and Integration, Ieee Iri-2007. 183-189. DOI: 10.1109/IRI.2007.4296618 |
0.475 |
|
2007 |
De Leon DC, Alves-Foss J, Oman PW. Implementation-oriented secure architectures Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2007.264 |
0.419 |
|
2007 |
Zheng S, Manz D, Alves-Foss J. A communication-computation efficient group key algorithm for large and dynamic groups Computer Networks. 51: 69-93. DOI: 10.1016/J.Comnet.2006.03.008 |
0.348 |
|
2007 |
Son J, Alves-Foss J. High level specification of non-Interference security policies in partitioned MLS systems Proceedings of the 4th Iasted International Conference On Communication, Network, and Information Security. 83-89. |
0.442 |
|
2006 |
Alves-Foss J, Oman PW, Taylor C, Harrison WS. The MILS architecture for high-assurance embedded systems International Journal of Embedded Systems. 2: 239-247. DOI: 10.1504/Ijes.2006.014859 |
0.457 |
|
2006 |
De Leon DC, Alves-Foss J. Hidden implementation dependencies in high assurance and critical computing systems Ieee Transactions On Software Engineering. 32: 790-811. DOI: 10.1109/Tse.2006.103 |
0.323 |
|
2006 |
Wei H, Alves-Foss J. Applying the layered decision model to the design of language-based security systems Proceedings of the 2006 Ieee International Conference On Information Reuse and Integration, Iri-2006. 182-187. DOI: 10.1109/IRI.2006.252410 |
0.423 |
|
2006 |
Harrison WS, Hanebutte N, Alves-Foss J. Programming education in the era of the internet: A paradigm shift Proceedings of the Annual Hawaii International Conference On System Sciences. 9. DOI: 10.1109/HICSS.2006.395 |
0.368 |
|
2006 |
Wang B, Alves-Foss J. AN MSLS-EMM for enforcing confidentiality in malicious environments Proceedings of the Third Iasted International Conference On Communication, Network, and Information Security, Cnis 2006. 126-131. |
0.418 |
|
2006 |
Son J, Alves-Foss J. Covert timing channel analysis of rate monotonic real-time scheduling algorithm in MLS systems Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 361-368. |
0.316 |
|
2006 |
Zheng S, Manz D, Alves-Foss J, Chen Y. Security and performance of group key agreement protocols Proceedings of the Iasted International Conference On Networks and Communication Systems 2006. 2006: 321-327. |
0.343 |
|
2006 |
Taylor C, Alves-Foss J. Diversity as a computer defense mechanism a panel Proceedings New Security Paradigms Workshop. 2006: 11-14. |
0.345 |
|
2005 |
Hanebutte N, Oman P, Loosbrock M, Holland A, Harrison WS, Alves-Foss J. Software mediators for transparent channel control in unbounded environments Proceedings From the 6th Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc 2005. 2005: 201-206. DOI: 10.1109/IAW.2005.1495953 |
0.41 |
|
2005 |
Harrison WS, Hanebutte N, Oman PW, Alves-Foss J. The MILS architecture for a secure Global Information Grid Crosstalk. 18. |
0.442 |
|
2004 |
Alves-Foss J, Taylor C, Oman P. A multi-layered approach to security in high assurance systems Proceedings of the Hawaii International Conference On System Sciences. 37: 4817-4826. |
0.429 |
|
2004 |
Hyungjick L, Alves-Foss J, Harrison S. The use of encrypted functions for mobile agent security Proceedings of the Hawaii International Conference On System Sciences. 37: 4757-4766. |
0.326 |
|
2004 |
Lee H, Alves-Foss J, Harrison S. The construction of secure mobile agents via evaluating encrypted functions Web Intelligence and Agent Systems. 2: 1-19. |
0.332 |
|
2004 |
Song T, Ko C, Alves-Foss J, Zhang C, Levitt K. Formal Reasoning about Intrusion Detection Systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3224: 278-295. |
0.333 |
|
2002 |
Malladi S, Alves-Foss J. What are multi-protocol guessing attacks and how to prevent them Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2002: 77-82. DOI: 10.1109/ENABL.2002.1029992 |
0.396 |
|
1996 |
Cavaiani C, Alves-Foss J. Mutual authenticating protocol with key distribution in client/server environment Acm Crossroads Student Magazine. 2: 17-22. DOI: 10.1145/332159.332164 |
0.465 |
|
1995 |
Alves-Foss J, Barbosa S. Assessing computer security vulnerability Operating Systems Review. 29: 3-13. DOI: 10.1145/206826.206829 |
0.483 |
|
Show low-probability matches. |