<?xml version="1.0"?>
<dblpperson name="Simon N. Foley" pid="f/SNFoley" n="139">
<person key="homepages/f/SNFoley" mdate="2024-05-01">
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="f/SNFoley">Simon Foley 0001</author>
<note type="affiliation">University College Cork, Ireland</note>
<url>http://www.cs.ucc.ie/~simon/</url>
<url>https://scholar.google.com/citations?user=BZEBnAYAAAAJ</url>
<url>https://dl.acm.org/profile/81100302385</url>
<url>https://zbmath.org/authors/?q=ai:foley.simon-n</url>
<url>https://orcid.org/0000-0002-0183-1215</url>
<url>https://www.wikidata.org/entity/Q58732935</url>
</person>
<homonyms n="2">
<h f="f/Foley:Simon"><name>Simon Foley</name>
</h>
<h f="f/Foley_0002:Simon"><person key="homepages/34/4474" mdate="2018-12-10">
<author pid="34/4474">Simon Foley 0002</author>
<note type="affiliation">Royal Holloway, University of London, UK</note>
<url>http://pure.rhul.ac.uk/portal/en/persons/simon-foley(474cffb5-233e-479e-99cd-ebfdce502c9a).html</url>
</person>
</h>
</homonyms>
<r><inproceedings key="conf/critis/HallettFMGJJR22" mdate="2023-06-19">
<author pid="154/3768">Joseph Hallett</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="349/6348">David Manda</author>
<author pid="150/6451">Joseph Gardiner</author>
<author pid="210/5249">Dimitri Jonckers</author>
<author pid="13/86">Wouter Joosen</author>
<author pid="26/3330">Awais Rashid</author>
<title>Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures.</title>
<pages>9-26</pages>
<year>2022</year>
<booktitle>CRITIS</booktitle>
<ee>https://doi.org/10.1007/978-3-031-35190-7_2</ee>
<crossref>conf/critis/2022</crossref>
<url>db/conf/critis/critis2022.html#HallettFMGJJR22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eisa/0001FO21" mdate="2022-03-02">
<author pid="64/10202-1">Muhammad Imran Khan 0001</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="o/BarryOSullivan">Barry O'Sullivan</author>
<title>Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.</title>
<pages>178-197</pages>
<year>2021</year>
<booktitle>EISA</booktitle>
<ee>https://doi.org/10.1007/978-3-030-93956-4_11</ee>
<crossref>conf/eisa/2021</crossref>
<url>db/conf/eisa/eisa2021.html#0001FO21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sin/KhanFO21" mdate="2022-02-23">
<author pid="64/10202-1">Muhammad Imran Khan 0001</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="o/BarryOSullivan">Barry O'Sullivan</author>
<title>Privacy Interpretation of Behaviour-based Anomaly Detection Approaches.</title>
<pages>1-7</pages>
<year>2021</year>
<booktitle>SIN</booktitle>
<ee>https://doi.org/10.1109/SIN54109.2021.9699212</ee>
<crossref>conf/sin/2021</crossref>
<url>db/conf/sin/sin2021.html#KhanFO21</url>
</inproceedings>
</r>
<r><article key="journals/fdata/0001FO20" mdate="2022-08-16">
<author pid="64/10202-1">Muhammad Imran Khan 0001</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="o/BarryOSullivan">Barry O'Sullivan</author>
<title>Quantitatively Measuring Privacy in Interactive Query Settings Within RDBMS Framework.</title>
<pages>11</pages>
<year>2020</year>
<volume>3</volume>
<journal>Frontiers Big Data</journal>
<ee type="oa">https://doi.org/10.3389/fdata.2020.00011</ee>
<ee>https://www.wikidata.org/entity/Q112681424</ee>
<url>db/journals/fdata/fdata3.html#0001FO20</url>
</article>
</r>
<r><inproceedings key="conf/fnc/0001FO20" mdate="2023-08-28">
<author pid="64/10202-1">Muhammad Imran Khan 0001</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="o/BarryOSullivan">Barry O'Sullivan</author>
<title>Towards Privacy-anomaly Detection: Discovering Correlation between Privacy and Security-anomalies.</title>
<pages>331-339</pages>
<year>2020</year>
<booktitle>FNC/MobiSPC</booktitle>
<ee type="oa">https://doi.org/10.1016/j.procs.2020.07.048</ee>
<ee>https://www.wikidata.org/entity/Q115037731</ee>
<crossref>conf/fnc/2020</crossref>
<url>db/conf/fnc/fnc2020.html#0001FO20</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2011-02308" mdate="2020-11-06">
<author pid="64/10202-1">Muhammad Imran Khan 0001</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="o/BarryOSullivan">Barry O'Sullivan</author>
<title>Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.</title>
<year>2020</year>
<volume>abs/2011.02308</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2011.02308</ee>
<url>db/journals/corr/corr2011.html#abs-2011-02308</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2012-11541" mdate="2021-01-04">
<author pid="64/10202-1">Muhammad Imran Khan 0001</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="o/BarryOSullivan">Barry O'Sullivan</author>
<title>Privacy Interpretation of Behavioural-based Anomaly Detection Approaches.</title>
<year>2020</year>
<volume>abs/2012.11541</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2012.11541</ee>
<url>db/journals/corr/corr2012.html#abs-2012-11541</url>
</article>
</r>
<r><inproceedings key="conf/ntms/0001FO19" mdate="2019-07-25">
<author pid="64/10202-1">Muhammad Imran Khan 0001</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="o/BarryOSullivan">Barry O'Sullivan</author>
<title>PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying Settings.</title>
<pages>1-5</pages>
<year>2019</year>
<booktitle>NTMS</booktitle>
<ee>https://doi.org/10.1109/NTMS.2019.8763781</ee>
<crossref>conf/ntms/2019</crossref>
<url>db/conf/ntms/ntms2019.html#0001FO19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/FoleyR19" mdate="2020-08-26">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0001-9983-5443" pid="125/4310">Vivien M. Rooney</author>
<title>Social Constructionism in Security Protocols - A Position on Human Experience, Psychology and Security.</title>
<pages>69-81</pages>
<year>2019</year>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/978-3-030-57043-9_7</ee>
<crossref>conf/spw/2019</crossref>
<url>db/conf/spw/spw2019.html#FoleyR19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/FoleyR19a" mdate="2020-08-24">
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="125/4310">Vivien M. Rooney</author>
<title>Social Constructionism in Security Protocols (Transcript of Discussion).</title>
<pages>82-88</pages>
<year>2019</year>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/978-3-030-57043-9_8</ee>
<crossref>conf/spw/2019</crossref>
<url>db/conf/spw/spw2019.html#FoleyR19a</url>
</inproceedings>
</r>
<r><proceedings key="conf/dbsec/2019" mdate="2019-07-04">
<editor pid="f/SNFoley">Simon N. Foley</editor>
<title>Data and Applications Security and Privacy XXXIII - 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings</title>
<booktitle>DBSec</booktitle>
<publisher>Springer</publisher>
<year>2019</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>11559</volume>
<isbn>978-3-030-22478-3</isbn>
<isbn>978-3-030-22479-0</isbn>
<ee>https://doi.org/10.1007/978-3-030-22479-0</ee>
<url>db/conf/dbsec/dbsec2019.html</url>
</proceedings>
</r>
<r><article key="journals/imcs/FoleyR18" mdate="2023-08-28">
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="125/4310">Vivien M. Rooney</author>
<title>A grounded theory approach to security policy elicitation.</title>
<pages>454-471</pages>
<year>2018</year>
<volume>26</volume>
<journal>Inf. Comput. Secur.</journal>
<number>4</number>
<ee>https://doi.org/10.1108/ICS-12-2017-0086</ee>
<ee>https://www.wikidata.org/entity/Q114992589</ee>
<url>db/journals/imcs/imcs26.html#FoleyR18</url>
</article>
</r>
<r><article key="journals/jcs/NevilleF18" mdate="2023-08-28">
<author pid="125/3015">Ultan Neville</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Reasoning about firewall policies through refinement and composition.</title>
<pages>207-254</pages>
<year>2018</year>
<volume>26</volume>
<journal>J. Comput. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.3233/JCS-17971</ee>
<ee>https://www.wikidata.org/entity/Q114944736</ee>
<url>db/journals/jcs/jcs26.html#NevilleF18</url>
</article>
</r>
<r><inproceedings key="conf/bigdataconf/KhanOF18" mdate="2021-03-31">
<author pid="64/10202-1">Muhammad Imran Khan 0001</author>
<author pid="o/BarryOSullivan">Barry O'Sullivan</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<title>Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access.</title>
<pages>3094-3099</pages>
<year>2018</year>
<booktitle>IEEE BigData</booktitle>
<ee>https://doi.org/10.1109/BigData.2018.8622047</ee>
<crossref>conf/bigdataconf/2018</crossref>
<url>db/conf/bigdataconf/bigdataconf2018.html#KhanOF18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/FoleyABCGRKLRV18" mdate="2020-10-25">
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="90/5042">Fabien Autrel</author>
<author pid="47/4014">Edwin Bourget</author>
<author pid="228/0632">Thomas Cl&#233;del</author>
<author pid="228/0604">Stephane Grunenwald</author>
<author orcid="0000-0001-9778-8049" pid="187/7343">Jose Rubio-Hernan</author>
<author orcid="0000-0002-6240-6407" pid="145/2465">Alexandre Kabil</author>
<author pid="228/0622">Raphael Larsen</author>
<author pid="125/4310">Vivien M. Rooney</author>
<author pid="228/0663">Kirsten Vanhulst</author>
<title>Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use.</title>
<pages>102-107</pages>
<year>2018</year>
<booktitle>CPS-SPC@CCS</booktitle>
<ee>https://doi.org/10.1145/3264888.3264897</ee>
<crossref>conf/ccs/2018cpsspc</crossref>
<url>db/conf/ccs/cpsspc2018.html#FoleyABCGRKLRV18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/css/CledelFCCKDLC18" mdate="2018-10-24">
<author pid="228/0632">Thomas Cl&#233;del</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="c/NoraCuppens">Nora Cuppens</author>
<author pid="c/FredericCuppens">Fr&#233;d&#233;ric Cuppens</author>
<author pid="88/4035">Yvon Kermarrec</author>
<author pid="30/1191">Fr&#233;d&#233;ric Dubois</author>
<author pid="21/4606">Youssef Laarouchi</author>
<author pid="226/7629">G&#233;rard Le Comte</author>
<title>Towards the Evaluation of End-to-End Resilience Through External Consistency.</title>
<pages>99-114</pages>
<year>2018</year>
<booktitle>CSS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-01689-0_8</ee>
<crossref>conf/css/2018</crossref>
<url>db/conf/css/css2018.html#CledelFCCKDLC18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/BourgetCCDFL18" mdate="2018-07-11">
<author pid="47/4014">Edwin Bourget</author>
<author pid="c/FredericCuppens">Fr&#233;d&#233;ric Cuppens</author>
<author pid="c/NoraCuppens">Nora Cuppens-Boulahia</author>
<author pid="60/901">Samuel Dubus</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="21/4606">Youssef Laarouchi</author>
<title>Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes.</title>
<pages>38-47</pages>
<year>2018</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-319-95729-6_3</ee>
<crossref>conf/dbsec/2018</crossref>
<url>db/conf/dbsec/dbsec2018.html#BourgetCCDFL18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nordsec/RooneyF18" mdate="2018-12-01">
<author orcid="0000-0001-9983-5443" pid="125/4310">Vivien M. Rooney</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>What You Can Change and What You Can't: Human Experience in Computer Network Defenses.</title>
<pages>219-235</pages>
<year>2018</year>
<booktitle>NordSec</booktitle>
<ee>https://doi.org/10.1007/978-3-030-03638-6_14</ee>
<crossref>conf/nordsec/2018</crossref>
<url>db/conf/nordsec/nordsec2018.html#RooneyF18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nspw/RooneyF18" mdate="2019-04-12">
<author pid="125/4310">Vivien M. Rooney</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<title>An Online Consent Maturity Model: Moving from Acceptable Use Towards Ethical Practice.</title>
<pages>64-79</pages>
<year>2018</year>
<booktitle>NSPW</booktitle>
<ee>https://doi.org/10.1145/3285002.3285003</ee>
<crossref>conf/nspw/2018</crossref>
<url>db/conf/nspw/nspw2018.html#RooneyF18</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1811-03974" mdate="2018-11-23">
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="90/5042">Fabien Autrel</author>
<author pid="47/4014">Edwin Bourget</author>
<author pid="228/0632">Thomas Cl&#233;del</author>
<author pid="228/0604">Stephane Grunenwald</author>
<author pid="187/7343">Jos&#233; Rubio-Hern&#225;n</author>
<author pid="145/2465">Alexandre Kabil</author>
<author pid="228/0622">Raphael Larsen</author>
<author pid="125/4310">Vivien M. Rooney</author>
<author pid="228/0663">Kirsten Vanhulst</author>
<title>Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use.</title>
<year>2018</year>
<volume>abs/1811.03974</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1811.03974</ee>
<url>db/journals/corr/corr1811.html#abs-1811-03974</url>
</article>
</r>
<r><inproceedings key="conf/crisis/KhanOF17" mdate="2019-02-19">
<author pid="64/10202-1">Muhammad Imran Khan 0001</author>
<author pid="o/BarryOSullivan">Barry O'Sullivan</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<title>A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management Systems.</title>
<pages>18-28</pages>
<year>2017</year>
<booktitle>CRiSIS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-76687-4_2</ee>
<crossref>conf/crisis/2017</crossref>
<url>db/conf/crisis/crisis2017.html#KhanOF17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/RooneyF17" mdate="2018-11-02">
<author orcid="0000-0001-9983-5443" pid="125/4310">Vivien M. Rooney</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>What Users Want: Adapting Qualitative Research Methods to Security Policy Elicitation.</title>
<pages>229-249</pages>
<year>2017</year>
<booktitle>CyberICPS/SECPRE@ESORICS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-72817-9_15</ee>
<crossref>conf/esorics/2017cicps</crossref>
<url>db/conf/esorics/cicps2017.html#RooneyF17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iccns/KhanFO17" mdate="2025-01-19">
<author pid="64/10202-1">Muhammad Imran Khan 0001</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="o/BarryOSullivan">Barry O'Sullivan</author>
<title>On database intrusion detection: A Query analytics-based model of normative behavior to detect insider attacks.</title>
<pages>12-17</pages>
<year>2017</year>
<booktitle>ICCNS</booktitle>
<ee>https://doi.org/10.1145/3163058.3163068</ee>
<ee>https://www.wikidata.org/entity/Q130848638</ee>
<crossref>conf/iccns/2017</crossref>
<url>db/conf/iccns/iccns2017.html#KhanFO17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nspw/PieczulFZ17" mdate="2018-11-06">
<author pid="153/2670">Olgierd Pieczul</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="02/6774">Mary Ellen Zurko</author>
<title>Developer-centered security and the symmetry of ignorance.</title>
<pages>46-56</pages>
<year>2017</year>
<booktitle>NSPW</booktitle>
<ee>https://doi.org/10.1145/3171533.3171539</ee>
<crossref>conf/nspw/2017</crossref>
<url>db/conf/nspw/nspw2017.html#PieczulFZ17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/Foley17" mdate="2018-11-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System.</title>
<pages>18-29</pages>
<year>2017</year>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/978-3-319-71075-4_3</ee>
<crossref>conf/spw/2017</crossref>
<url>db/conf/spw/spw2017.html#Foley17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/Foley17a" mdate="2018-11-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System (Transcript of Discussion).</title>
<pages>30-37</pages>
<year>2017</year>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/978-3-319-71075-4_4</ee>
<crossref>conf/spw/2017</crossref>
<url>db/conf/spw/spw2017.html#Foley17a</url>
</inproceedings>
</r>
<r><proceedings key="conf/esorics/2017-1" mdate="2019-05-14">
<editor pid="f/SNFoley">Simon N. Foley</editor>
<editor pid="39/5760">Dieter Gollmann</editor>
<editor pid="13/6186">Einar Snekkenes</editor>
<title>Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I</title>
<booktitle>ESORICS (1)</booktitle>
<publisher>Springer</publisher>
<year>2017</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>10492</volume>
<isbn>978-3-319-66401-9</isbn>
<isbn>978-3-319-66402-6</isbn>
<ee>https://doi.org/10.1007/978-3-319-66402-6</ee>
<url>db/conf/esorics/esorics2017-1.html</url>
</proceedings>
</r>
<r><proceedings key="conf/esorics/2017-2" mdate="2019-05-14">
<editor pid="f/SNFoley">Simon N. Foley</editor>
<editor pid="39/5760">Dieter Gollmann</editor>
<editor pid="13/6186">Einar Snekkenes</editor>
<title>Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II</title>
<booktitle>ESORICS (2)</booktitle>
<publisher>Springer</publisher>
<year>2017</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>10493</volume>
<isbn>978-3-319-66398-2</isbn>
<isbn>978-3-319-66399-9</isbn>
<ee>https://doi.org/10.1007/978-3-319-66399-9</ee>
<url>db/conf/esorics/esorics2017-2.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1710-10022" mdate="2018-08-13">
<author pid="125/4310">Vivien M. Rooney</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<title>An Online Consent Maturity Model: Moving from Acceptable Use towards Ethical Practice.</title>
<year>2017</year>
<volume>abs/1710.10022</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1710.10022</ee>
<url>db/journals/corr/corr1710.html#abs-1710-10022</url>
</article>
</r>
<r><inproceedings key="conf/crisis/KhanF16" mdate="2019-02-19">
<author pid="64/10202-1">Muhammad Imran Khan 0001</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Detecting Anomalous Behavior in DBMS Logs.</title>
<pages>147-152</pages>
<year>2016</year>
<booktitle>CRiSIS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-54876-0_12</ee>
<crossref>conf/crisis/2016</crossref>
<url>db/conf/crisis/crisis2016.html#KhanF16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/NevilleF16" mdate="2018-11-02">
<author pid="125/3015">Ultan Neville</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Reasoning About Firewall Policies Through Refinement and Composition.</title>
<pages>268-284</pages>
<year>2016</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-319-41483-6_19</ee>
<crossref>conf/dbsec/2016</crossref>
<url>db/conf/dbsec/dbsec2016.html#NevilleF16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/PieczulF16" mdate="2018-11-02">
<author pid="153/2670">Olgierd Pieczul</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems.</title>
<pages>347-363</pages>
<year>2016</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-319-41483-6_24</ee>
<crossref>conf/dbsec/2016</crossref>
<url>db/conf/dbsec/dbsec2016.html#PieczulF16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/PieczulF16" mdate="2018-11-02">
<author pid="153/2670">Olgierd Pieczul</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>The Evolution of a Security Control.</title>
<pages>67-84</pages>
<year>2016</year>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/978-3-319-62033-6_9</ee>
<crossref>conf/spw/2016</crossref>
<url>db/conf/spw/spw2016.html#PieczulF16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/PieczulF16a" mdate="2017-07-19">
<author pid="153/2670">Olgierd Pieczul</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<title>The Evolution of a Security Control or Why Do We Need More Qualitative Research of Software Vulnerabilties? (Transcript of Discussion).</title>
<pages>85-89</pages>
<year>2016</year>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/978-3-319-62033-6_10</ee>
<crossref>conf/spw/2016</crossref>
<url>db/conf/spw/spw2016.html#PieczulF16a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cns/FoleyN15" mdate="2018-11-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="125/3015">Ultan Neville</author>
<title>A firewall algebra for OpenStack.</title>
<pages>541-549</pages>
<year>2015</year>
<booktitle>CNS</booktitle>
<ee>https://doi.org/10.1109/CNS.2015.7346867</ee>
<crossref>conf/cns/2015</crossref>
<url>db/conf/cns/cns2015.html#FoleyN15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/PieczulF15" mdate="2018-11-02">
<author pid="153/2670">Olgierd Pieczul</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>The Dark Side of the Code.</title>
<pages>1-11</pages>
<year>2015</year>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/978-3-319-26096-9_1</ee>
<crossref>conf/spw/2015</crossref>
<url>db/conf/spw/spw2015.html#PieczulF15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/FoleyP15" mdate="2018-11-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="153/2670">Olgierd Pieczul</author>
<title>The Dark Side of the Code (Transcript of Discussion).</title>
<pages>12-21</pages>
<year>2015</year>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/978-3-319-26096-9_2</ee>
<crossref>conf/spw/2015</crossref>
<url>db/conf/spw/spw2015.html#FoleyP15</url>
</inproceedings>
</r>
<r><article key="journals/cm/BrennanEFOFF14" mdate="2021-10-14">
<author orcid="0000-0001-8236-362X" pid="30/625">Rob Brennan</author>
<author pid="26/8901">Zohar Etzioni</author>
<author pid="94/236">Kevin Feeney</author>
<author orcid="0000-0003-1090-3548" pid="16/508">Declan O'Sullivan</author>
<author pid="81/1948">William M. Fitzgerald</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon Foley 0001</author>
<title>Consumer-Managed Federated Homes.</title>
<pages>194-201</pages>
<year>2014</year>
<volume>52</volume>
<journal>IEEE Commun. Mag.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/MCOM.2014.6829964</ee>
<ee>https://www.wikidata.org/entity/Q58833214</ee>
<url>db/journals/cm/cm52.html#BrennanEFOFF14</url>
</article>
</r>
<r><inproceedings key="conf/nspw/PieczulFR14" mdate="2018-11-06">
<author pid="153/2670">Olgierd Pieczul</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0001-9983-5443" pid="125/4310">Vivien M. Rooney</author>
<title>I'm OK, You're OK, the System's OK: Normative Security for Systems.</title>
<pages>95-104</pages>
<year>2014</year>
<booktitle>NSPW</booktitle>
<ee>https://doi.org/10.1145/2683467.2683476</ee>
<crossref>conf/nspw/2014</crossref>
<url>db/conf/nspw/nspw2014.html#PieczulFR14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/PieczulF14" mdate="2018-11-02">
<author pid="153/2670">Olgierd Pieczul</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Collaborating as Normal: Detecting Systemic Anomalies in Your Partner.</title>
<pages>18-27</pages>
<year>2014</year>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/978-3-319-12400-1_3</ee>
<crossref>conf/spw/2014</crossref>
<url>db/conf/spw/spw2014.html#PieczulF14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/Foley14" mdate="2018-11-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Collaborating as Normal: Detecting Systemic Anomalies in Your Partner (Transcript of Discussion).</title>
<pages>28-37</pages>
<year>2014</year>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/978-3-319-12400-1_4</ee>
<crossref>conf/spw/2014</crossref>
<url>db/conf/spw/spw2014.html#Foley14</url>
</inproceedings>
</r>
<r><proceedings key="conf/esorics/2013-8247" mdate="2020-10-25">
<editor orcid="0000-0002-7453-4393" pid="g/JoaquinGarcia">Joaqu&#237;n Garc&#237;a-Alfaro</editor>
<editor orcid="0000-0002-4628-6265" pid="51/1190">Georgios V. Lioudakis</editor>
<editor pid="c/NoraCuppens">Nora Cuppens-Boulahia</editor>
<editor orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</editor>
<editor pid="81/1948">William M. Fitzgerald</editor>
<title>Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers</title>
<year>2014</year>
<publisher>Springer</publisher>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>8247</volume>
<ee>https://doi.org/10.1007/978-3-642-54568-9</ee>
<isbn>978-3-642-54567-2</isbn>
<booktitle>DPM/SETOP</booktitle>
<url>db/conf/esorics/lncs8247.html</url>
</proceedings>
</r>
<r><article key="journals/ijis/FoleyN13" mdate="2018-11-30">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0003-3535-942X" pid="n/GuillermoNavarroArribas">Guillermo Navarro-Arribas</author>
<title>A Bloom Filter Based Model for Decentralized Authorization.</title>
<pages>565-582</pages>
<year>2013</year>
<volume>28</volume>
<journal>Int. J. Intell. Syst.</journal>
<number>6</number>
<ee>https://doi.org/10.1002/int.21593</ee>
<url>db/journals/ijis/ijis28.html#FoleyN13</url>
</article>
</r>
<r><article key="journals/istr/FitzgeraldNF13" mdate="2020-03-04">
<author pid="81/1948">William M. Fitzgerald</author>
<author pid="125/3015">Ultan Neville</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>MASON: Mobile autonomic security for network access controls.</title>
<pages>14-29</pages>
<year>2013</year>
<volume>18</volume>
<journal>J. Inf. Secur. Appl.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/j.jisa.2013.08.001</ee>
<url>db/journals/istr/istr18.html#FitzgeraldNF13</url>
</article>
</r>
<r><inproceedings key="conf/cns/PieczulF13" mdate="2018-11-02">
<author pid="153/2670">Olgierd Pieczul</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Discovering emergent norms in security logs.</title>
<pages>438-445</pages>
<year>2013</year>
<booktitle>CNS</booktitle>
<ee>https://doi.org/10.1109/CNS.2013.6682758</ee>
<crossref>conf/cns/2013</crossref>
<url>db/conf/cns/cns2013.html#PieczulF13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cns/FitzgeraldF13" mdate="2018-11-02">
<author pid="81/1948">William M. Fitzgerald</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Avoiding inconsistencies in the Security Content Automation Protocol.</title>
<pages>454-461</pages>
<year>2013</year>
<booktitle>CNS</booktitle>
<ee>https://doi.org/10.1109/CNS.2013.6682760</ee>
<crossref>conf/cns/2013</crossref>
<url>db/conf/cns/cns2013.html#FitzgeraldF13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ictai/TurkmenFOFHBB13" mdate="2023-03-24">
<author orcid="0000-0002-6262-4869" pid="22/2474">Fatih Turkmen</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0002-0090-2085" pid="o/BarryOSullivan">Barry O'Sullivan</author>
<author pid="81/1948">William M. Fitzgerald</author>
<author pid="62/6349">Tarik Hadzic</author>
<author orcid="0000-0002-4513-0541" pid="18/2391">Stylianos Basagiannis</author>
<author pid="96/1998">Menouer Boubekeur</author>
<title>Explanations and Relaxations for Policy Conflicts in Physical Access Control.</title>
<pages>330-336</pages>
<year>2013</year>
<booktitle>ICTAI</booktitle>
<ee>https://doi.org/10.1109/ICTAI.2013.57</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICTAI.2013.57</ee>
<crossref>conf/ictai/2013</crossref>
<url>db/conf/ictai/ictai2013.html#TurkmenFOFHBB13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifiptm/Foley13" mdate="2018-06-26">
<author pid="f/SNFoley">Simon N. Foley</author>
<title>Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems.</title>
<pages>193-207</pages>
<year>2013</year>
<booktitle>IFIPTM</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-38323-6_14</ee>
<crossref>conf/ifiptm/2013</crossref>
<url>db/conf/ifiptm/ifiptm2013.html#Foley13</url>
</inproceedings>
</r>
<r><article key="journals/jcs/ZhouF12" mdate="2020-05-11">
<author pid="64/6351">Hongbin Zhou</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Fast automatic security protocol generation.</title>
<pages>119-167</pages>
<year>2012</year>
<volume>20</volume>
<journal>J. Comput. Secur.</journal>
<number>2-3</number>
<ee>https://doi.org/10.3233/JCS-2011-0432</ee>
<url>db/journals/jcs/jcs20.html#ZhouF12</url>
</article>
</r>
<r><inproceedings key="conf/crisis/FitzgeraldTFO12" mdate="2023-03-24">
<author pid="81/1948">William M. Fitzgerald</author>
<author orcid="0000-0002-6262-4869" pid="22/2474">Fatih Turkmen</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0002-0090-2085" pid="o/BarryOSullivan">Barry O'Sullivan</author>
<title>Anomaly analysis for Physical Access Control security configuration.</title>
<pages>1-8</pages>
<year>2012</year>
<booktitle>CRiSIS</booktitle>
<ee>https://doi.org/10.1109/CRISIS.2012.6378953</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CRISIS.2012.6378953</ee>
<crossref>conf/crisis/2012</crossref>
<url>db/conf/crisis/crisis2012.html#FitzgeraldTFO12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crisis/MercadalNFB12" mdate="2023-03-24">
<author orcid="0000-0002-1835-8671" pid="35/9592">Estanislao Mercadal</author>
<author orcid="0000-0003-3535-942X" pid="n/GuillermoNavarroArribas">Guillermo Navarro-Arribas</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0001-6649-0450" pid="32/2714">Joan Borrell</author>
<title>Towards efficient access control in a mobile agent based wireless sensor network.</title>
<pages>1-4</pages>
<year>2012</year>
<booktitle>CRiSIS</booktitle>
<ee>https://doi.org/10.1109/CRISIS.2012.6378940</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CRISIS.2012.6378940</ee>
<ee>https://www.wikidata.org/entity/Q61731242</ee>
<crossref>conf/crisis/2012</crossref>
<url>db/conf/crisis/crisis2012.html#MercadalNFB12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/FoleyF12" mdate="2018-11-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="81/1948">William M. Fitzgerald</author>
<title>Decentralized Semantic Threat Graphs.</title>
<pages>177-192</pages>
<year>2012</year>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-31540-4_14</ee>
<crossref>conf/dbsec/2012</crossref>
<url>db/conf/dbsec/dbsec2012.html#FoleyF12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/FitzgeraldNF12" mdate="2018-11-02">
<author pid="81/1948">William M. Fitzgerald</author>
<author pid="125/3015">Ultan Neville</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Automated Smartphone Security Configuration.</title>
<pages>227-242</pages>
<year>2012</year>
<booktitle>DPM/SETOP</booktitle>
<ee>https://doi.org/10.1007/978-3-642-35890-6_17</ee>
<crossref>conf/esorics/2012-7731</crossref>
<url>db/conf/esorics/lncs7731.html#FitzgeraldNF12</url>
</inproceedings>
</r>
<r><proceedings key="conf/crisis/2012" mdate="2019-10-16">
<editor pid="m/FMartinelli">Fabio Martinelli</editor>
<editor pid="l/JeanLouisLanet">Jean-Louis Lanet</editor>
<editor pid="81/1948">William M. Fitzgerald</editor>
<editor pid="f/SNFoley">Simon N. Foley</editor>
<title>7th International Conference on Risks and Security of Internet and Systems, CRiSIS 2012, Cork, Ireland, October 10-12, 2012</title>
<publisher>IEEE Computer Society</publisher>
<year>2012</year>
<isbn>978-1-4673-3087-9</isbn>
<ee>https://ieeexplore.ieee.org/xpl/conhome/6362373/proceeding</ee>
<ee>http://www.computer.org/csdl/proceedings/crisis/2012/3087/00/index.html</ee>
<booktitle>CRiSIS</booktitle>
<url>db/conf/crisis/crisis2012.html</url>
</proceedings>
</r>
<r><article key="journals/csi/FitzgeraldF11" mdate="2020-02-20">
<author pid="81/1948">William M. Fitzgerald</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Aligning Semantic Web applications with network access controls.</title>
<pages>24-34</pages>
<year>2011</year>
<volume>33</volume>
<journal>Comput. Stand. Interfaces</journal>
<number>1</number>
<ee>https://doi.org/10.1016/j.csi.2009.10.002</ee>
<url>db/journals/csi/csi33.html#FitzgeraldF11</url>
</article>
</r>
<r><article key="journals/isci/Martinez-GarciaNFTB11" mdate="2018-11-30">
<author pid="91/8103">Carles Mart&#237;nez-Garc&#237;a</author>
<author orcid="0000-0003-3535-942X" pid="n/GuillermoNavarroArribas">Guillermo Navarro-Arribas</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0002-0368-8037" pid="t/VicencTorra">Vicen&#231; Torra</author>
<author orcid="0000-0001-6649-0450" pid="32/2714">Joan Borrell</author>
<title>Flexible secure inter-domain interoperability through attribute conversion.</title>
<pages>3491-3507</pages>
<year>2011</year>
<volume>181</volume>
<journal>Inf. Sci.</journal>
<number>16</number>
<ee>https://doi.org/10.1016/j.ins.2011.04.023</ee>
<ee>https://www.wikidata.org/entity/Q57608827</ee>
<url>db/journals/isci/isci181.html#Martinez-GarciaNFTB11</url>
</article>
</r>
<r><article key="journals/jcs/FoleyF11" mdate="2020-05-11">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="81/1948">William M. Fitzgerald</author>
<title>Management of security policy configuration using a Semantic Threat Graph approach.</title>
<pages>567-605</pages>
<year>2011</year>
<volume>19</volume>
<journal>J. Comput. Secur.</journal>
<number>3</number>
<ee>https://doi.org/10.3233/JCS-2011-0421</ee>
<url>db/journals/jcs/jcs19.html#FoleyF11</url>
</article>
</r>
<r><inproceedings key="conf/crisis/FeeneyFB11" mdate="2023-03-24">
<author pid="94/236">Kevin Feeney</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0001-8236-362X" pid="30/625">Rob Brennan</author>
<title>A Trust Model for Capability Delegation in Federated Policy Systems.</title>
<pages>47-54</pages>
<year>2011</year>
<booktitle>CRiSIS</booktitle>
<ee>https://doi.org/10.1109/CRiSIS.2011.6061828</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CRiSIS.2011.6061828</ee>
<ee>https://www.wikidata.org/entity/Q58833250</ee>
<crossref>conf/crisis/2011</crossref>
<url>db/conf/crisis/crisis2011.html#FeeneyFB11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip1-7/FoleyA11" mdate="2018-11-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="116/4989">Samane Abdi</author>
<title>Avoiding Delegation Subterfuge Using Linked Local Permission Names.</title>
<pages>100-114</pages>
<year>2011</year>
<booktitle>Formal Aspects in Security and Trust</booktitle>
<ee>https://doi.org/10.1007/978-3-642-29420-4_7</ee>
<crossref>conf/ifip1-7/2011</crossref>
<url>db/conf/ifip1-7/fast2011.html#FoleyA11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/im/BrennanEKFOFF11" mdate="2021-10-14">
<author orcid="0000-0001-8236-362X" pid="30/625">Rob Brennan</author>
<author pid="26/8901">Zohar Etzioni</author>
<author pid="06/5075">John Keeney</author>
<author pid="94/236">Kevin Feeney</author>
<author orcid="0000-0003-1090-3548" pid="16/508">Declan O'Sullivan</author>
<author pid="81/1948">William M. Fitzgerald</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Federated autonomic management of HAN services.</title>
<pages>646-649</pages>
<year>2011</year>
<booktitle>Integrated Network Management</booktitle>
<ee>https://doi.org/10.1109/INM.2011.5990646</ee>
<ee>https://www.wikidata.org/entity/Q58833259</ee>
<crossref>conf/im/2011</crossref>
<url>db/conf/im/im2011.html#BrennanEKFOFF11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/im/FoleyA11" mdate="2018-11-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="73/9977">Wayne Mac Adams</author>
<title>Trust management of XMPP federation.</title>
<pages>1192-1195</pages>
<year>2011</year>
<booktitle>Integrated Network Management</booktitle>
<ee>https://doi.org/10.1109/INM.2011.5990581</ee>
<crossref>conf/im/2011</crossref>
<url>db/conf/im/im2011.html#FoleyA11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/safeconfig/FitzgeraldF11" mdate="2018-11-30">
<author pid="81/1948">William M. Fitzgerald</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Reasoning about the Security Configuration of SAN Switch Fabrics.</title>
<year>2011</year>
<booktitle>SafeConfig</booktitle>
<ee>https://doi.org/10.1109/SafeConfig.2011.6111673</ee>
<crossref>conf/safeconfig/2011</crossref>
<url>db/conf/safeconfig/safeconfig2011.html#FitzgeraldF11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/safeconfig/FoleyFA11" mdate="2018-11-30">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="81/1948">William M. Fitzgerald</author>
<author pid="73/9977">Wayne Mac Adams</author>
<title>Federated Autonomic Network Access Control.</title>
<year>2011</year>
<booktitle>SafeConfig</booktitle>
<ee>https://doi.org/10.1109/SafeConfig.2011.6111668</ee>
<crossref>conf/safeconfig/2011</crossref>
<url>db/conf/safeconfig/safeconfig2011.html#FoleyFA11</url>
</inproceedings>
</r>
<r><proceedings key="conf/crisis/2011" mdate="2019-10-16">
<editor pid="c/FredericCuppens">Fr&#233;d&#233;ric Cuppens</editor>
<editor pid="f/SNFoley">Simon N. Foley</editor>
<editor pid="41/136">Bogdan Groza</editor>
<editor pid="84/4315">Marius Minea</editor>
<title>CRiSIS 2011, Proceedings of the Sixth International Conference on Risks and Security of Internet and Systems, Timi&#537;oara, Romania, September 26-28, 2011</title>
<booktitle>CRiSIS</booktitle>
<publisher>IEEE Computer Society</publisher>
<year>2011</year>
<isbn>978-1-4577-1889-2</isbn>
<ee>https://ieeexplore.ieee.org/xpl/conhome/6051620/proceeding</ee>
<ee>http://www.computer.org/csdl/proceedings/crisis/2011/1890/00/index.html</ee>
<url>db/conf/crisis/crisis2011.html</url>
</proceedings>
</r>
<r><article key="journals/cm/BrennanFKOFFM10" mdate="2021-10-14">
<author orcid="0000-0001-8236-362X" pid="30/625">Rob Brennan</author>
<author pid="94/236">Kevin Feeney</author>
<author pid="06/5075">John Keeney</author>
<author orcid="0000-0003-1090-3548" pid="16/508">Declan O'Sullivan</author>
<author pid="46/10924">Joel J. Fleck II</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0003-0049-7320" pid="82/3243">Sven van der Meer</author>
<title>Multidomain IT architectures for next-generation communications service providers [Next-Generation Telco IT Architectures].</title>
<pages>110-117</pages>
<year>2010</year>
<volume>48</volume>
<journal>IEEE Commun. Mag.</journal>
<number>8</number>
<ee>https://doi.org/10.1109/MCOM.2010.5534595</ee>
<ee>https://www.wikidata.org/entity/Q58833307</ee>
<url>db/journals/cm/cm48.html#BrennanFKOFFM10</url>
</article>
</r>
<r><article key="journals/ibmrd/FoleyM10" mdate="2020-03-13">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="90/9483">H. Moss</author>
<title>A risk-metric framework for enterprise risk management.</title>
<pages>3</pages>
<year>2010</year>
<volume>54</volume>
<journal>IBM J. Res. Dev.</journal>
<number>3</number>
<ee>https://doi.org/10.1147/JRD.2010.2043403</ee>
<url>db/journals/ibmrd/ibmrd54.html#FoleyM10</url>
</article>
</r>
<r><article key="journals/scn/BistarelliFOS10" mdate="2020-09-10">
<author orcid="0000-0001-7411-9678" pid="53/6380">Stefano Bistarelli</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0002-0090-2085" pid="o/BarryOSullivan">Barry O'Sullivan</author>
<author orcid="0000-0002-3935-4696" pid="95/4886">Francesco Santini 0001</author>
<title>Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria.</title>
<pages>595-610</pages>
<year>2010</year>
<volume>3</volume>
<journal>Secur. Commun. Networks</journal>
<number>6</number>
<ee>https://doi.org/10.1002/sec.252</ee>
<url>db/journals/scn/scn3.html#BistarelliFOS10</url>
</article>
</r>
<r><inproceedings key="conf/avi/Foley10" mdate="2018-11-08">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Virtual environment for the navigation of ideas and concepts in education (V.E.N.I.C.E).</title>
<pages>428</pages>
<year>2010</year>
<booktitle>AVI</booktitle>
<ee>https://doi.org/10.1145/1842993.1843105</ee>
<crossref>conf/avi/2010</crossref>
<url>db/conf/avi/avi2010.html#Foley10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cnsm/FeeneyBF10" mdate="2018-11-24">
<author pid="94/236">Kevin Feeney</author>
<author orcid="0000-0001-8236-362X" pid="30/625">Rob Brennan</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>A trust model for capability delegation in federated policy systems.</title>
<pages>226-229</pages>
<year>2010</year>
<booktitle>CNSM</booktitle>
<ee>https://doi.org/10.1109/CNSM.2010.5691300</ee>
<ee>https://www.wikidata.org/entity/Q58833287</ee>
<crossref>conf/cnsm/2010</crossref>
<url>db/conf/cnsm/cnsm2010.html#FeeneyBF10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/safeconfig/FitzgeraldF10" mdate="2018-11-06">
<author pid="81/1948">William M. Fitzgerald</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Management of heterogeneous security access control configuration using an ontology engineering approach.</title>
<pages>27-36</pages>
<year>2010</year>
<booktitle>SafeConfig</booktitle>
<ee>https://doi.org/10.1145/1866898.1866903</ee>
<crossref>conf/safeconfig/2010</crossref>
<url>db/conf/safeconfig/safeconfig2010.html#FitzgeraldF10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/stm/FoleyAO10" mdate="2018-11-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="73/9977">Wayne Mac Adams</author>
<author orcid="0000-0002-0090-2085" pid="o/BarryOSullivan">Barry O'Sullivan</author>
<title>Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System.</title>
<pages>100-115</pages>
<year>2010</year>
<booktitle>STM</booktitle>
<ee>https://doi.org/10.1007/978-3-642-22444-7_7</ee>
<crossref>conf/stm/2010</crossref>
<url>db/conf/stm/stm2010.html#FoleyAO10</url>
</inproceedings>
</r>
<r><article key="journals/jcs/AzizFHS09" mdate="2020-05-11">
<author pid="15/2711">Benjamin Aziz</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="97/5016">John Herbert</author>
<author pid="46/4288">Garret Swart</author>
<title>Configuring storage-area networks using mandatory security.</title>
<pages>191-210</pages>
<year>2009</year>
<volume>17</volume>
<journal>J. Comput. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.3233/JCS-2009-0337</ee>
<url>db/journals/jcs/jcs17.html#AzizFHS09</url>
</article>
</r>
<r><inproceedings key="conf/dbsec/FoleyF09" mdate="2020-03-12">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="81/1948">William M. Fitzgerald</author>
<title>An Approach to Security Policy Configuration Using Semantic Threat Graphs.</title>
<pages>33-48</pages>
<year>2009</year>
<booktitle>DBSec</booktitle>
<crossref>conf/dbsec/2009</crossref>
<ee type="oa">https://doi.org/10.1007/978-3-642-03007-9_3</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2009/FoleyF09.pdf</ee>
<url>db/conf/dbsec/dbsec2009.html#FoleyF09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/FoleyR09" mdate="2018-11-02">
<author pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0001-9983-5443" pid="125/4310">Vivien M. Rooney</author>
<title>Qualitative Analysis for Trust Management.</title>
<pages>298-307</pages>
<year>2009</year>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/978-3-642-36213-2_33</ee>
<crossref>conf/spw/2009</crossref>
<url>db/conf/spw/spw2009.html#FoleyR09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/Foley09" mdate="2017-05-25">
<author pid="f/SNFoley">Simon N. Foley</author>
<title>Qualitative Analysis for Trust Management.</title>
<pages>308-320</pages>
<year>2009</year>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/978-3-642-36213-2_34</ee>
<crossref>conf/spw/2009</crossref>
<url>db/conf/spw/spw2009.html#Foley09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csclp/BistarelliFOS08" mdate="2018-11-02">
<author orcid="0000-0001-7411-9678" pid="53/6380">Stefano Bistarelli</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0002-0090-2085" pid="o/BarryOSullivan">Barry O'Sullivan</author>
<author orcid="0000-0002-3935-4696" pid="95/4886">Francesco Santini 0001</author>
<title>From Marriages to Coalitions: A Soft CSP Approach.</title>
<pages>1-15</pages>
<year>2008</year>
<booktitle>CSCLP</booktitle>
<ee>https://doi.org/10.1007/978-3-642-03251-6_1</ee>
<crossref>conf/csclp/2008</crossref>
<url>db/conf/csclp/csclp2008.html#BistarelliFOS08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icde/FoleyF08" mdate="2023-03-23">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="81/1948">William M. Fitzgerald</author>
<title>Semantic Web and firewall alignment.</title>
<pages>447-453</pages>
<year>2008</year>
<booktitle>ICDE Workshops</booktitle>
<ee>https://doi.org/10.1109/ICDEW.2008.4498359</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDEW.2008.4498359</ee>
<crossref>conf/icde/2008w</crossref>
<url>db/conf/icde/icdew2008.html#FoleyF08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sis/FitzgeraldFF08" mdate="2008-11-19">
<author pid="81/1948">William M. Fitzgerald</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="99/6666">M&#237;che&#225;l &#211; Foghl&#250;</author>
<title>Network Access Control Interoperation using Semantic Web Techniques.</title>
<pages>26-37</pages>
<year>2008</year>
<booktitle>WOSIS</booktitle>
<crossref>conf/sis/2008</crossref>
<url>db/conf/sis/wosis2008.html#FitzgeraldFF08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/FoleyBB08" mdate="2019-10-19">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0002-7615-8643" pid="93/3317">Giampaolo Bella</author>
<author orcid="0000-0001-7411-9678" pid="53/6380">Stefano Bistarelli</author>
<title>Security Protocol Deployment Risk.</title>
<pages>12-20</pages>
<year>2008</year>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/978-3-642-22137-8_3</ee>
<crossref>conf/spw/2008</crossref>
<url>db/conf/spw/spw2008.html#FoleyBB08</url>
</inproceedings>
</r>
<r><article key="journals/ijhpca/MorrisonCSFPP06" mdate="2020-03-12">
<author pid="56/3725">John P. Morrison</author>
<author pid="83/5448">Brian A. Coghlan</author>
<author orcid="0000-0001-7903-0074" pid="24/7006">Andy Shearer</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="09/6535">David A. Power</author>
<author pid="74/7520">R. Perrott</author>
<title>WEBCOM-G: A Candidate Middleware for Grid-Ireland.</title>
<pages>409-422</pages>
<year>2006</year>
<volume>20</volume>
<journal>Int. J. High Perform. Comput. Appl.</journal>
<number>3</number>
<ee>https://doi.org/10.1177/1094342006067475</ee>
<ee>https://www.wikidata.org/entity/Q63410817</ee>
<url>db/journals/ijhpca/ijhpca20.html#MorrisonCSFPP06</url>
</article>
</r>
<r><article key="journals/jhsn/AzizFHS06" mdate="2015-05-18">
<author pid="15/2711">Benjamin Aziz</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="97/5016">John Herbert</author>
<author pid="46/4288">Garret Swart</author>
<title>Reconfiguring Role Based Access Control policies using risk semantics.</title>
<pages>261-273</pages>
<year>2006</year>
<volume>15</volume>
<journal>J. High Speed Networks</journal>
<number>3</number>
<ee>http://content.iospress.com/articles/journal-of-high-speed-networks/jhs290</ee>
<url>db/journals/jhsn/jhsn15.html#AzizFHS06</url>
</article>
</r>
<r><article key="journals/jhsn/FoleyMQOM06" mdate="2015-05-18">
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="81/5312">Barry P. Mulcahy</author>
<author pid="05/5007">Thomas B. Quillinan</author>
<author pid="91/676">Meabh O'Connor</author>
<author pid="56/3725">John P. Morrison</author>
<title>Supporting heterogeneous middleware security policies in WebCom.</title>
<pages>301-313</pages>
<year>2006</year>
<volume>15</volume>
<journal>J. High Speed Networks</journal>
<number>3</number>
<ee>http://content.iospress.com/articles/journal-of-high-speed-networks/jhs293</ee>
<url>db/journals/jhsn/jhsn15.html#FoleyMQOM06</url>
</article>
</r>
<r><inproceedings key="conf/csfw/ZhouF06" mdate="2023-03-24">
<author pid="64/6351">Hongbin Zhou</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>A Framework for Establishing Decentralized Secure Coalitions.</title>
<pages>270-282</pages>
<year>2006</year>
<crossref>conf/csfw/2006</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.2006.5</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.2006.5</ee>
<url>db/conf/csfw/csfw2006.html#ZhouF06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ipom/FoleyFBOF06" mdate="2017-06-04">
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="81/1948">William M. Fitzgerald</author>
<author orcid="0000-0001-7411-9678" pid="53/6380">Stefano Bistarelli</author>
<author pid="o/BarryOSullivan">Barry O'Sullivan</author>
<author pid="99/6666">M&#237;che&#225;l &#211; Foghl&#250;</author>
<title>Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration.</title>
<pages>168-180</pages>
<year>2006</year>
<crossref>conf/ipom/2006</crossref>
<booktitle>IPOM</booktitle>
<ee>https://doi.org/10.1007/11908852_15</ee>
<url>db/conf/ipom/ipom2006.html#FoleyFBOF06</url>
</inproceedings>
</r>
<r><incollection key="series/ais/FoleyBOHS06" mdate="2017-06-09">
<author pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0001-7411-9678" pid="53/6380">Stefano Bistarelli</author>
<author pid="o/BarryOSullivan">Barry O'Sullivan</author>
<author pid="97/5016">John Herbert</author>
<author pid="46/4288">Garret Swart</author>
<title>Multilevel Security and Quality of Protection.</title>
<pages>93-105</pages>
<year>2006</year>
<booktitle>Quality of Protection</booktitle>
<ee>https://doi.org/10.1007/978-0-387-36584-8_8</ee>
<crossref>series/ais/23</crossref>
<url>db/series/ais/ais23.html#FoleyBOHS06</url>
</incollection>
</r>
<r><article key="journals/jcs/BistarelliFO05" mdate="2023-08-28">
<author orcid="0000-0001-7411-9678" pid="53/6380">Stefano Bistarelli</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0002-0090-2085" pid="o/BarryOSullivan">Barry O'Sullivan</author>
<title>A soft constraint-based approach to the cascade vulnerability problem.</title>
<pages>699-720</pages>
<year>2005</year>
<volume>13</volume>
<journal>J. Comput. Secur.</journal>
<number>5</number>
<ee>https://doi.org/10.3233/jcs-2005-13502</ee>
<ee>https://www.wikidata.org/entity/Q114250860</ee>
<url>db/journals/jcs/jcs13.html#BistarelliFO05</url>
</article>
</r>
<r><article key="journals/sp/ClaytonQF05" mdate="2026-02-01">
<author pid="90/3496">Brian C. Clayton</author>
<author orcid="0009-0007-4390-1983" pid="05/5007">Thomas B. Quillinan</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Automating security configuration for the Grid.</title>
<pages>113-125</pages>
<year>2005</year>
<volume>13</volume>
<journal>Sci. Program.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.1155/2005/657947</ee>
<ee>http://content.iospress.com/articles/scientific-programming/spr00180</ee>
<url>db/journals/sp/sp13.html#ClaytonQF05</url>
</article>
</r>
<r><inproceedings key="conf/acsac/FoleySLSKMTOSFBB05" mdate="2023-09-30">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0000-0002-9300-7521" pid="24/4984">Abe Singer</author>
<author pid="l/MichaelELocasto">Michael E. Locasto</author>
<author pid="37/1475">Stelios Sidiroglou</author>
<author pid="k/AngelosDKeromytis">Angelos D. Keromytis</author>
<author pid="82/4517">John P. McDermott</author>
<author orcid="0000-0002-6629-158X" pid="53/114">Julie Thorpe</author>
<author orcid="0000-0002-5038-5370" pid="o/PCvOorschot">Paul C. van Oorschot</author>
<author pid="56/1202">Anil Somayaji</author>
<author pid="23/3237">Richard Ford</author>
<author orcid="0000-0001-6894-8613" pid="53/2383">Mark Bush</author>
<author pid="58/1370">Alex Boulatov</author>
<title>Highlights from the 2005 New Security Paradigms Workshop.</title>
<pages>393-396</pages>
<year>2005</year>
<crossref>conf/acsac/2005</crossref>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1109/CSAC.2005.29</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSAC.2005.29</ee>
<ee>https://www.wikidata.org/entity/Q117935686</ee>
<url>db/conf/acsac/acsac2005.html#FoleySLSKMTOSFBB05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/SwartAFH05" mdate="2018-06-26">
<author pid="46/4288">Garret Swart</author>
<author pid="15/2711">Benjamin Aziz</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="97/5016">John Herbert</author>
<title>Trading Off Security in a Service Oriented Architecture.</title>
<pages>295-309</pages>
<year>2005</year>
<crossref>conf/dbsec/2005</crossref>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/11535706_22</ee>
<url>db/conf/dbsec/dbsec2005.html#SwartAFH05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip1-7/ZhouF05" mdate="2017-05-19">
<author pid="64/6351">Hongbin Zhou</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<title>A Logic for Analysing Subterfuge in Delegation Chains.</title>
<pages>127-141</pages>
<year>2005</year>
<crossref>conf/ifip1-7/2005</crossref>
<booktitle>Formal Aspects in Security and Trust</booktitle>
<ee>https://doi.org/10.1007/11679219_10</ee>
<url>db/conf/ifip1-7/fast2005.html#ZhouF05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/intellcomm/NavarroF05" mdate="2018-06-26">
<author pid="n/GuillermoNavarroArribas">Guillermo Navarro 0001</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<title>Approximating Saml Using Similarity Based Imprecision.</title>
<pages>191-200</pages>
<year>2005</year>
<booktitle>INTELLCOMM</booktitle>
<ee type="oa">https://doi.org/10.1007/0-387-32015-6_18</ee>
<crossref>conf/intellcomm/2005</crossref>
<url>db/conf/intellcomm/intellcomm2005.html#NavarroF05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pdpta/MulcahyFM05" mdate="2006-01-25">
<author pid="81/5312">Barry P. Mulcahy</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="56/3725">John P. Morrison</author>
<title>Cross Cutting Condensed Graphs.</title>
<pages>965-973</pages>
<year>2005</year>
<crossref>conf/pdpta/2005-3</crossref>
<booktitle>PDPTA</booktitle>
<url>db/conf/pdpta/pdpta2005-3.html#MulcahyFM05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/FoleyZ05" mdate="2017-05-25">
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="64/6351">Hongbin Zhou</author>
<title>Authorisation Subterfuge by Delegation in Decentralised Networks.</title>
<pages>97-102</pages>
<year>2005</year>
<crossref>conf/spw/2005</crossref>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/978-3-540-77156-2_12</ee>
<url>db/conf/spw/spw2005.html#FoleyZ05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/Foley05" mdate="2017-05-25">
<author pid="f/SNFoley">Simon N. Foley</author>
<title>Authorisation Subterfuge by Delegation in Decentralised Networks.</title>
<pages>103-111</pages>
<year>2005</year>
<crossref>conf/spw/2005</crossref>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/978-3-540-77156-2_13</ee>
<url>db/conf/spw/spw2005.html#Foley05</url>
</inproceedings>
</r>
<r><inproceedings key="journals/entcs/QuillinanF06" mdate="2026-02-01">
<author orcid="0009-0007-4390-1983" pid="05/5007">Thomas B. Quillinan</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Synchronisation in Trust Management Using Push Authorisation.</title>
<pages>143-158</pages>
<year>2005</year>
<crossref>conf/stm/2005</crossref>
<booktitle>STM</booktitle>
<ee type="oa">https://doi.org/10.1016/j.entcs.2005.09.035</ee>
<url>db/conf/stm/stm2005.html#QuillinanF06</url>
</inproceedings>
</r>
<r><proceedings key="conf/nspw/2005" mdate="2018-11-06">
<editor pid="f/SNFoley">Simon N. Foley</editor>
<title>Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005</title>
<booktitle>NSPW</booktitle>
<publisher>ACM</publisher>
<year>2005</year>
<isbn>1-59593-317-4</isbn>
<ee>https://doi.org/10.1145/1146269</ee>
<url>db/conf/nspw/nspw2005.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/aaai/BistarelliFO04" mdate="2004-07-21">
<author pid="53/6380">Stefano Bistarelli</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="o/BarryOSullivan">Barry O'Sullivan</author>
<title>Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints.</title>
<pages>808-813</pages>
<year>2004</year>
<crossref>conf/aaai/2004</crossref>
<booktitle>AAAI</booktitle>
<url>db/conf/aaai/aaai2004.html#BistarelliFO04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acsac/MarceauF04" mdate="2023-03-23">
<author pid="49/4371">Carla Marceau</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<title>Themes and Highlights of the New Security Paradigms Workshop 2004.</title>
<pages>382-383</pages>
<year>2004</year>
<crossref>conf/acsac/2004</crossref>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1109/CSAC.2004.42</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSAC.2004.42</ee>
<url>db/conf/acsac/acsac2004.html#MarceauF04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/AzizFHS04" mdate="2017-05-26">
<author pid="15/2711">Benjamin Aziz</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="97/5016">John Herbert</author>
<author pid="46/4288">Garret Swart</author>
<title>Configuring Storage Area Networks for Mandatory Security.</title>
<pages>357-370</pages>
<year>2004</year>
<crossref>conf/dbsec/2004</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2004.html#AzizFHS04</url>
<ee>https://doi.org/10.1007/1-4020-8128-6_24</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip1-7/BistarelliFO04" mdate="2018-06-26">
<author orcid="0000-0001-7411-9678" pid="53/6380">Stefano Bistarelli</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="o/BarryOSullivan">Barry O'Sullivan</author>
<title>Reasoning about Secure Interoperation Using Soft Constraints.</title>
<pages>173-186</pages>
<year>2004</year>
<crossref>conf/ifip1-7/2004</crossref>
<booktitle>Formal Aspects in Security and Trust</booktitle>
<ee type="oa">https://doi.org/10.1007/0-387-24098-5_13</ee>
<url>db/conf/ifip1-7/fast2004.html#BistarelliFO04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ipps/FoleyQOMM04" mdate="2026-02-01">
<author pid="f/SNFoley">Simon N. Foley</author>
<author orcid="0009-0007-4390-1983" pid="05/5007">Thomas B. Quillinan</author>
<author pid="61/5643">Maeve O'Connor</author>
<author pid="81/5312">Barry P. Mulcahy</author>
<author pid="56/3725">John P. Morrison</author>
<title>A Framework for Heterogeneous Middleware Security.</title>
<year>2004</year>
<crossref>conf/ipps/2004</crossref>
<booktitle>IPDPS</booktitle>
<ee>https://doi.org/10.1109/IPDPS.2004.1303059</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/IPDPS.2004.1303059</ee>
<url>db/conf/ipps/ipdps2004-w1.html#FoleyQOMM04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ispdc/QuillinanCF04" mdate="2026-02-01">
<author orcid="0009-0007-4390-1983" pid="05/5007">Thomas B. Quillinan</author>
<author pid="90/3496">Brian C. Clayton</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>GridAdmin: Decentralising Grid Administration Using Trust Management.</title>
<pages>184-192</pages>
<year>2004</year>
<crossref>conf/ispdc/2004</crossref>
<booktitle>ISPDC/HeteroPar</booktitle>
<ee>https://doi.org/10.1109/ISPDC.2004.28</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ISPDC.2004.28</ee>
<url>db/conf/ispdc/ispdc2004.html#QuillinanCF04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nspw/ZhouF04" mdate="2018-11-06">
<author pid="64/6351">Hongbin Zhou</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<title>A collaborative approach to autonomic security protocols.</title>
<pages>13-21</pages>
<year>2004</year>
<crossref>conf/nspw/2004</crossref>
<booktitle>NSPW</booktitle>
<ee>https://doi.org/10.1145/1065907.1066029</ee>
<url>db/conf/nspw/nspw2004.html#ZhouF04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/BistarelliFO04" mdate="2025-01-19">
<author orcid="0000-0001-7411-9678" pid="53/6380">Stefano Bistarelli</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="o/BarryOSullivan">Barry O'Sullivan</author>
<title>Modeling and detecting the cascade vulnerability problem using soft constraints.</title>
<pages>383-390</pages>
<year>2004</year>
<crossref>conf/sac/2004</crossref>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1145/967900.967984</ee>
<ee>https://www.wikidata.org/entity/Q130921816</ee>
<url>db/conf/sac/sac2004.html#BistarelliFO04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sws/QuillinanF04" mdate="2026-02-01">
<author orcid="0009-0007-4390-1983" pid="05/5007">Thomas B. Quillinan</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Security in WebCom: addressing naming issues for a web services architecture.</title>
<pages>97-105</pages>
<year>2004</year>
<booktitle>SWS</booktitle>
<ee>https://doi.org/10.1145/1111348.1111359</ee>
<crossref>conf/sws/2004</crossref>
<url>db/conf/sws/sws2004.html#QuillinanF04</url>
</inproceedings>
</r>
<r><inproceedings key="journals/entcs/Foley05" mdate="2022-12-13">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Believing the Integrity of a System: (Invited Talk).</title>
<pages>3-12</pages>
<year>2004</year>
<crossref>conf/arspa/2004</crossref>
<booktitle>ARSPA@IJCAR</booktitle>
<ee type="oa">https://doi.org/10.1016/j.entcs.2004.09.037</ee>
<url>db/conf/arspa/arspa2004.html#Foley05</url>
</inproceedings>
</r>
<r><inproceedings key="journals/entcs/BellaBF06" mdate="2023-08-28">
<author orcid="0000-0002-7615-8643" pid="93/3317">Giampaolo Bella</author>
<author orcid="0000-0001-7411-9678" pid="53/6380">Stefano Bistarelli</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Soft Constraints for Security.</title>
<pages>11-29</pages>
<year>2004</year>
<crossref>conf/vodca/2004</crossref>
<booktitle>VODCA@FOSAD</booktitle>
<ee type="oa">https://doi.org/10.1016/j.entcs.2005.07.011</ee>
<ee>https://www.wikidata.org/entity/Q115044296</ee>
<url>db/journals/entcs/entcs142.html#BellaBF06</url>
</inproceedings>
</r>
<r><article key="journals/jsac/Foley03" mdate="2020-04-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>A nonfunctional approach to system integrity.</title>
<pages>36-43</pages>
<year>2003</year>
<volume>21</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/JSAC.2002.806124</ee>
<url>db/journals/jsac/jsac21.html#Foley03</url>
</article>
</r>
<r><inproceedings key="conf/ccs/ZhouF03" mdate="2018-11-06">
<author pid="64/6351">Hongbin Zhou</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<title>Fast automatic synthesis of security protocols using backward search.</title>
<pages>1-10</pages>
<year>2003</year>
<crossref>conf/ccs/2003fmse</crossref>
<booktitle>FMSE</booktitle>
<ee>https://doi.org/10.1145/1035429.1035430</ee>
<url>db/conf/ccs/ccs2003fmse.html#ZhouF03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fc/Foley03" mdate="2017-05-26">
<author pid="f/SNFoley">Simon N. Foley</author>
<title>Using Trust Management to Support Transferable Hash-Based Micropayments.</title>
<pages>1-14</pages>
<ee>https://doi.org/10.1007/978-3-540-45126-6_1</ee>
<year>2003</year>
<crossref>conf/fc/2003</crossref>
<booktitle>Financial Cryptography</booktitle>
<url>db/conf/fc/fc2003.html#Foley03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/policy/BistarelliF03" mdate="2023-03-23">
<author orcid="0000-0001-7411-9678" pid="53/6380">Stefano Bistarelli</author>
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Analysis of Integrity Policies using Soft Constraints.</title>
<pages>77-80</pages>
<year>2003</year>
<crossref>conf/policy/2003</crossref>
<booktitle>POLICY</booktitle>
<ee>https://doi.org/10.1109/POLICY.2003.1206959</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/POLICY.2003.1206959</ee>
<url>db/conf/policy/policy2003.html#BistarelliF03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/safecomp/BistarelliF03" mdate="2017-06-05">
<author orcid="0000-0001-7411-9678" pid="53/6380">Stefano Bistarelli</author>
<author pid="f/SNFoley">Simon N. Foley</author>
<title>A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity.</title>
<pages>130-143</pages>
<ee>https://doi.org/10.1007/978-3-540-39878-3_11</ee>
<year>2003</year>
<crossref>conf/safecomp/2003</crossref>
<booktitle>SAFECOMP</booktitle>
<url>db/conf/safecomp/safecomp2003.html#BistarelliF03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/FoleyZ03" mdate="2018-11-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="64/6351">Hongbin Zhou</author>
<title>Towards a Framework for Autonomic Security Protocols.</title>
<pages>49-54</pages>
<year>2003</year>
<crossref>conf/spw/2003</crossref>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/11542322_8</ee>
<url>db/conf/spw/spw2003.html#FoleyZ03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/Foley03" mdate="2018-11-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Towards a Framework for Autonomic Security Protocols (Discussion).</title>
<pages>55-62</pages>
<year>2003</year>
<crossref>conf/spw/2003</crossref>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/11542322_9</ee>
<url>db/conf/spw/spw2003.html#Foley03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/FoleyQM02" mdate="2005-01-04">
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="05/5007">Thomas B. Quillinan</author>
<author pid="56/3725">John P. Morrison</author>
<title>Secure Component Distribution Using WebCom.</title>
<pages>387-398</pages>
<year>2002</year>
<crossref>conf/sec/2002</crossref>
<booktitle>SEC</booktitle>
<url>db/conf/sec/sec2002.html#FoleyQM02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/Foley02" mdate="2017-05-25">
<author pid="f/SNFoley">Simon N. Foley</author>
<title>Supporting Imprecise Delegation in KeyNote.</title>
<pages>179-188</pages>
<ee>https://doi.org/10.1007/978-3-540-39871-4_15</ee>
<year>2002</year>
<crossref>conf/spw/2002</crossref>
<booktitle>Security Protocols Workshop</booktitle>
<url>db/conf/spw/spw2002.html#Foley02</url>
</inproceedings>
</r>
<r><proceedings key="conf/nspw/2002" mdate="2018-11-06">
<editor pid="27/5922">Cristina Serban</editor>
<editor pid="49/4371">Carla Marceau</editor>
<editor pid="f/SNFoley">Simon N. Foley</editor>
<title>Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, September 23-26, 2002</title>
<booktitle>NSPW</booktitle>
<publisher>ACM</publisher>
<year>2002</year>
<isbn>1-58113-598-X</isbn>
<ee>https://doi.org/10.1145/844102</ee>
<url>db/conf/nspw/nspw2002.html</url>
</proceedings>
</r>
<r><article key="journals/cacm/FoleyD01" mdate="2025-01-19">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="40/6697">Robert Dumigan</author>
<title>Are handheld viruses a significant threat?</title>
<pages>105-107</pages>
<year>2001</year>
<volume>44</volume>
<journal>Commun. ACM</journal>
<number>1</number>
<ee>https://doi.org/10.1145/357489.357516</ee>
<ee>https://www.wikidata.org/entity/Q130099238</ee>
<url>db/journals/cacm/cacm44.html#FoleyD01</url>
</article>
</r>
<r><inproceedings key="conf/nspw/FoleyM01" mdate="2018-11-06">
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="56/3725">John P. Morrison</author>
<title>Computational paradigms and protection.</title>
<pages>3-11</pages>
<year>2001</year>
<crossref>conf/nspw/2001</crossref>
<booktitle>NSPW</booktitle>
<ee>https://doi.org/10.1145/508171.508173</ee>
<url>db/conf/nspw/nspw2001.html#FoleyM01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/Foley01" mdate="2018-11-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Trust Management and Whether to Delegate.</title>
<pages>151-157</pages>
<year>2001</year>
<crossref>conf/spw/2001</crossref>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/3-540-45807-7_23</ee>
<url>db/conf/spw/spw2001.html#Foley01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/Foley01a" mdate="2018-11-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Trust Management and Whether to Delegate (Transcript of Discussion).</title>
<pages>158-165</pages>
<year>2001</year>
<crossref>conf/spw/2001</crossref>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/3-540-45807-7_24</ee>
<url>db/conf/spw/spw2001.html#Foley01a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nspw/Foley00" mdate="2018-11-06">
<author pid="f/SNFoley">Simon N. Foley</author>
<title>Conduit cascades and secure synchronization.</title>
<pages>141-150</pages>
<year>2000</year>
<booktitle>NSPW</booktitle>
<ee>https://doi.org/10.1145/366173.366205</ee>
<crossref>conf/nspw/2000</crossref>
<url>db/conf/nspw/nspw2000.html#Foley00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/Foley98" mdate="2018-11-30">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>A Kernelized Architecture for Multilevel Secure Application Policies.</title>
<pages>33-49</pages>
<year>1998</year>
<crossref>conf/esorics/1998</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/BFb0055854</ee>
<url>db/conf/esorics/esorics1998.html#Foley98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nspw/Foley98" mdate="2018-11-06">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Evaluating System Integrity.</title>
<pages>40-47</pages>
<year>1998</year>
<crossref>conf/nspw/1998</crossref>
<booktitle>Workshop on New Security Paradigms</booktitle>
<ee>https://doi.org/10.1145/310889.310909</ee>
<url>db/conf/nspw/nspw1998.html#Foley98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/Foley98" mdate="2018-11-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>External Consistency and the Verification of Security Protocols (Position Paper).</title>
<pages>24-27</pages>
<year>1998</year>
<crossref>conf/spw/1998</crossref>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/3-540-49135-X_3</ee>
<url>db/conf/spw/spw1998.html#Foley98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/Foley98a" mdate="2018-11-02">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>External Consistency and the Verification of Security Protocols (Transcript of Discussion).</title>
<pages>28-35</pages>
<year>1998</year>
<crossref>conf/spw/1998</crossref>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/3-540-49135-X_4</ee>
<url>db/conf/spw/spw1998.html#Foley98a</url>
</inproceedings>
</r>
<r><article key="journals/compsec/Foley97" mdate="2023-08-28">
<author pid="f/SNFoley">Simon N. Foley</author>
<title>Building Chinese walls in standard unix<sup>TM</sup>.</title>
<pages>551-563</pages>
<year>1997</year>
<volume>16</volume>
<journal>Comput. Secur.</journal>
<number>6</number>
<ee>https://doi.org/10.1016/S0167-4048(97)00010-2</ee>
<ee>https://www.wikidata.org/entity/Q115030408</ee>
<url>db/journals/compsec/compsec16.html#Foley97</url>
</article>
</r>
<r><inproceedings key="conf/acsac/Foley97" mdate="2023-03-23">
<author pid="f/SNFoley">Simon N. Foley</author>
<title>Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores.</title>
<pages>69-80</pages>
<year>1997</year>
<crossref>conf/acsac/1997</crossref>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1109/CSAC.1997.646176</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSAC.1997.646176</ee>
<url>db/conf/acsac/acsac1997.html#Foley97</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/Foley97" mdate="2020-11-10">
<author pid="f/SNFoley">Simon N. Foley</author>
<title>The Specification and Implementation of &#34;Commercial&#34; Security Requirements Including Dynamic Segregation of Duties.</title>
<pages>125-134</pages>
<year>1997</year>
<crossref>conf/ccs/1997</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/266420.266447</ee>
<url>db/conf/ccs/ccs1997.html#Foley97</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/FoleyGQ96" mdate="2023-09-21">
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="46/6786">Li Gong</author>
<author pid="91/2417">Xiaolei Qian</author>
<title>A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification.</title>
<pages>142-153</pages>
<year>1996</year>
<crossref>conf/sp/1996</crossref>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/SECPRI.1996.502677</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SECPRI.1996.502677</ee>
<ee>https://dl.acm.org/doi/10.5555/525080.884249</ee>
<url>db/conf/sp/sp1996.html#FoleyGQ96</url>
</inproceedings>
</r>
<r><article key="journals/jcs/FoleyJ95" mdate="2023-08-28">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<author pid="j/JeremyLJacob">Jeremy Jacob</author>
<title>Specifying Security for Computer Supported Collaborative Working.</title>
<pages>233-254</pages>
<year>1995</year>
<volume>3</volume>
<journal>J. Comput. Secur.</journal>
<number>4</number>
<url>db/journals/jcs/jcs3.html#FoleyJ95</url>
<ee>https://doi.org/10.3233/JCS-1994/1995-3402</ee>
<ee>https://www.wikidata.org/entity/Q114944534</ee>
</article>
</r>
<r><inproceedings key="conf/csfw/FoleyJ95" mdate="2023-03-24">
<author pid="f/SNFoley">Simon N. Foley</author>
<author pid="j/JeremyLJacob">Jeremy Jacob</author>
<title>Specifying security for CSCW systems.</title>
<pages>136-</pages>
<year>1995</year>
<crossref>conf/csfw/1995</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.1995.518559</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.1995.518559</ee>
<url>db/conf/csfw/csfw1995.html#FoleyJ95</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csfw/Foley94" mdate="2017-05-25">
<author pid="f/SNFoley">Simon N. Foley</author>
<title>Reasoning about Confidentiality Requirements.</title>
<year>1994</year>
<crossref>conf/csfw/1994</crossref>
<booktitle>CSFW</booktitle>
<url>db/conf/csfw/csfw1994.html#Foley94</url>
<pages>150-160</pages>
<ee>https://doi.org/10.1109/CSFW.1994.315939</ee>
</inproceedings>
</r>
<r><article key="journals/jcs/Foley92" mdate="2023-08-28">
<author orcid="0000-0002-0183-1215" pid="f/SNFoley">Simon N. Foley</author>
<title>Aggregation and Separation as Noninterference Properties.</title>
<pages>159-188</pages>
<year>1992</year>
<volume>1</volume>
<journal>J. Comput. Secur.</journal>
<number>2</number>
<url>db/journals/jcs/jcs1.html#Foley92</url>
<ee>https://doi.org/10.3233/JCS-1992-1203</ee>
<ee>https://www.wikidata.org/entity/Q114944631</ee>
</article>
</r>
<r><inproceedings key="conf/csfw/Foley91" mdate="2017-05-25">
<author pid="f/SNFoley">Simon N. Foley</author>
<title>Separation of Duty using High Water Marks.</title>
<pages>79-88</pages>
<year>1991</year>
<crossref>conf/csfw/1991</crossref>
<booktitle>CSFW</booktitle>
<url>db/conf/csfw/csfw1991.html#Foley91</url>
<ee>https://doi.org/10.1109/CSFW.1991.151572</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/Foley91" mdate="2023-09-21">
<author pid="f/SNFoley">Simon N. Foley</author>
<title>A Taxonomy for Information Flow Policies and Models.</title>
<pages>98-109</pages>
<year>1991</year>
<crossref>conf/sp/1991</crossref>
<booktitle>S&#38;P</booktitle>
<url>db/conf/sp/sp1991.html#Foley91</url>
<ee>https://doi.org/10.1109/RISP.1991.130778</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/RISP.1991.130778</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/csfw/Foley90" mdate="2017-05-25">
<author pid="f/SNFoley">Simon N. Foley</author>
<title>Secure Information Flow Using Security Groups.</title>
<pages>62-72</pages>
<year>1990</year>
<crossref>conf/csfw/1990</crossref>
<booktitle>CSFW</booktitle>
<url>db/conf/csfw/csfw1990.html#Foley90</url>
<ee>https://doi.org/10.1109/CSFW.1990.128186</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/Foley89" mdate="2023-09-21">
<author pid="f/SNFoley">Simon N. Foley</author>
<title>A Model for Secure Information Flow.</title>
<pages>248-258</pages>
<year>1989</year>
<crossref>conf/sp/1989</crossref>
<booktitle>S&#38;P</booktitle>
<url>db/conf/sp/sp1989.html#Foley89</url>
<ee>https://doi.org/10.1109/SECPRI.1989.36299</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SECPRI.1989.36299</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/Foley87" mdate="2023-09-21">
<author pid="f/SNFoley">Simon N. Foley</author>
<title>A Universal Theory of Information Flow.</title>
<pages>116-122</pages>
<year>1987</year>
<crossref>conf/sp/1987</crossref>
<booktitle>S&#38;P</booktitle>
<url>db/conf/sp/sp1987.html#Foley87</url>
<ee>https://doi.org/10.1109/SP.1987.10012</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.1987.10012</ee>
</inproceedings>
</r>
<coauthors n="90" nc="2">
<co c="0"><na f="a/Abdi:Samane" pid="116/4989">Samane Abdi</na></co>
<co c="0"><na f="a/Adams:Wayne_Mac" pid="73/9977">Wayne Mac Adams</na></co>
<co c="0"><na f="a/Autrel:Fabien" pid="90/5042">Fabien Autrel</na></co>
<co c="0"><na f="a/Aziz:Benjamin" pid="15/2711">Benjamin Aziz</na></co>
<co c="0"><na f="b/Basagiannis:Stylianos" pid="18/2391">Stylianos Basagiannis</na></co>
<co c="0"><na f="b/Bella:Giampaolo" pid="93/3317">Giampaolo Bella</na></co>
<co c="0"><na f="b/Bistarelli:Stefano" pid="53/6380">Stefano Bistarelli</na></co>
<co c="0"><na f="b/Borrell:Joan" pid="32/2714">Joan Borrell</na></co>
<co c="0"><na f="b/Boubekeur:Menouer" pid="96/1998">Menouer Boubekeur</na></co>
<co c="0"><na f="b/Boulatov:Alex" pid="58/1370">Alex Boulatov</na></co>
<co c="0"><na f="b/Bourget:Edwin" pid="47/4014">Edwin Bourget</na></co>
<co c="0"><na f="b/Brennan:Rob" pid="30/625">Rob Brennan</na></co>
<co c="0"><na f="b/Bush:Mark" pid="53/2383">Mark Bush</na></co>
<co c="0"><na f="c/Clayton:Brian_C=" pid="90/3496">Brian C. Clayton</na></co>
<co c="0"><na f="c/Cl=eacute=del:Thomas" pid="228/0632">Thomas Cl&#233;del</na></co>
<co c="0"><na f="c/Coghlan:Brian_A=" pid="83/5448">Brian A. Coghlan</na></co>
<co c="0"><na f="c/Comte:G=eacute=rard_Le" pid="226/7629">G&#233;rard Le Comte</na></co>
<co c="0"><na f="c/Cuppens:Fr=eacute=d=eacute=ric" pid="c/FredericCuppens">Fr&#233;d&#233;ric Cuppens</na></co>
<co c="0" n="2"><na f="c/Cuppens:Nora" pid="c/NoraCuppens">Nora Cuppens</na><na>Nora Cuppens-Boulahia</na></co>
<co c="0"><na f="d/Dubois:Fr=eacute=d=eacute=ric" pid="30/1191">Fr&#233;d&#233;ric Dubois</na></co>
<co c="0"><na f="d/Dubus:Samuel" pid="60/901">Samuel Dubus</na></co>
<co c="-1"><na f="d/Dumigan:Robert" pid="40/6697">Robert Dumigan</na></co>
<co c="0"><na f="e/Etzioni:Zohar" pid="26/8901">Zohar Etzioni</na></co>
<co c="0"><na f="f/Feeney:Kevin" pid="94/236">Kevin Feeney</na></co>
<co c="0"><na f="f/Fitzgerald:William_M=" pid="81/1948">William M. Fitzgerald</na></co>
<co c="0"><na f="f/Fleck_II:Joel_J=" pid="46/10924">Joel J. Fleck II</na></co>
<co c="0"><na f="f/Foghl=uacute=:M=iacute=che=aacute=l_=Oacute=" pid="99/6666">M&#237;che&#225;l &#211; Foghl&#250;</na></co>
<co c="0"><na f="f/Ford:Richard" pid="23/3237">Richard Ford</na></co>
<co c="0" n="2"><na f="g/Garc=iacute=a_0001:Joaqu=iacute=n" pid="g/JoaquinGarcia">Joaqu&#237;n Garc&#237;a 0001</na><na>Joaqu&#237;n Garc&#237;a-Alfaro</na></co>
<co c="0"><na f="g/Gardiner:Joseph" pid="150/6451">Joseph Gardiner</na></co>
<co c="0"><na f="g/Gollmann:Dieter" pid="39/5760">Dieter Gollmann</na></co>
<co c="0"><na f="g/Gong:Li" pid="46/6786">Li Gong</na></co>
<co c="0"><na f="g/Groza:Bogdan" pid="41/136">Bogdan Groza</na></co>
<co c="0"><na f="g/Grunenwald:Stephane" pid="228/0604">Stephane Grunenwald</na></co>
<co c="0"><na f="h/Hadzic:Tarik" pid="62/6349">Tarik Hadzic</na></co>
<co c="0"><na f="h/Hallett:Joseph" pid="154/3768">Joseph Hallett</na></co>
<co c="0"><na f="h/Herbert:John" pid="97/5016">John Herbert</na></co>
<co c="-1" n="2"><na f="j/Jacob:Jeremy_L=" pid="j/JeremyLJacob">Jeremy L. Jacob</na><na>Jeremy Jacob</na></co>
<co c="0"><na f="j/Jonckers:Dimitri" pid="210/5249">Dimitri Jonckers</na></co>
<co c="0"><na f="j/Joosen:Wouter" pid="13/86">Wouter Joosen</na></co>
<co c="0"><na f="k/Kabil:Alexandre" pid="145/2465">Alexandre Kabil</na></co>
<co c="0"><na f="k/Keeney:John" pid="06/5075">John Keeney</na></co>
<co c="0"><na f="k/Kermarrec:Yvon" pid="88/4035">Yvon Kermarrec</na></co>
<co c="0"><na f="k/Keromytis:Angelos_D=" pid="k/AngelosDKeromytis">Angelos D. Keromytis</na></co>
<co c="0"><na f="k/Khan_0001:Muhammad_Imran" pid="64/10202-1">Muhammad Imran Khan 0001</na></co>
<co c="0"><na f="l/Laarouchi:Youssef" pid="21/4606">Youssef Laarouchi</na></co>
<co c="0"><na f="l/Lanet:Jean=Louis" pid="l/JeanLouisLanet">Jean-Louis Lanet</na></co>
<co c="0"><na f="l/Larsen:Raphael" pid="228/0622">Raphael Larsen</na></co>
<co c="0"><na f="l/Lioudakis:Georgios_V=" pid="51/1190">Georgios V. Lioudakis</na></co>
<co c="0"><na f="l/Locasto:Michael_E=" pid="l/MichaelELocasto">Michael E. Locasto</na></co>
<co c="0"><na f="m/Manda:David" pid="349/6348">David Manda</na></co>
<co c="1"><na f="m/Marceau:Carla" pid="49/4371">Carla Marceau</na></co>
<co c="0"><na f="m/Martinelli:Fabio" pid="m/FMartinelli">Fabio Martinelli</na></co>
<co c="0"><na f="m/Mart=iacute=nez=Garc=iacute=a:Carles" pid="91/8103">Carles Mart&#237;nez-Garc&#237;a</na></co>
<co c="0"><na f="m/McDermott:John_P=" pid="82/4517">John P. McDermott</na></co>
<co c="0"><na f="m/Meer:Sven_van_der" pid="82/3243">Sven van der Meer</na></co>
<co c="0"><na f="m/Mercadal:Estanislao" pid="35/9592">Estanislao Mercadal</na></co>
<co c="0"><na f="m/Minea:Marius" pid="84/4315">Marius Minea</na></co>
<co c="0"><na f="m/Morrison:John_P=" pid="56/3725">John P. Morrison</na></co>
<co c="-1"><na f="m/Moss:H=" pid="90/9483">H. Moss</na></co>
<co c="0"><na f="m/Mulcahy:Barry_P=" pid="81/5312">Barry P. Mulcahy</na></co>
<co c="0" n="2"><na f="n/Navarro=Arribas:Guillermo" pid="n/GuillermoNavarroArribas">Guillermo Navarro-Arribas</na><na>Guillermo Navarro 0001</na></co>
<co c="0"><na f="n/Neville:Ultan" pid="125/3015">Ultan Neville</na></co>
<co c="0"><na f="o/O=Connor:Maeve" pid="61/5643">Maeve O'Connor</na></co>
<co c="0"><na f="o/O=Connor:Meabh" pid="91/676">Meabh O'Connor</na></co>
<co c="0"><na f="o/Oorschot:Paul_C=_van" pid="o/PCvOorschot">Paul C. van Oorschot</na></co>
<co c="0"><na f="o/O=Sullivan:Barry" pid="o/BarryOSullivan">Barry O'Sullivan</na></co>
<co c="0"><na f="o/O=Sullivan:Declan" pid="16/508">Declan O'Sullivan</na></co>
<co c="0"><na f="p/Perrott:R=" pid="74/7520">R. Perrott</na></co>
<co c="0"><na f="p/Pieczul:Olgierd" pid="153/2670">Olgierd Pieczul</na></co>
<co c="0"><na f="p/Power:David_A=" pid="09/6535">David A. Power</na></co>
<co c="0"><na f="q/Qian:Xiaolei" pid="91/2417">Xiaolei Qian</na></co>
<co c="0"><na f="q/Quillinan:Thomas_B=" pid="05/5007">Thomas B. Quillinan</na></co>
<co c="0"><na f="r/Rashid:Awais" pid="26/3330">Awais Rashid</na></co>
<co c="0"><na f="r/Rooney:Vivien_M=" pid="125/4310">Vivien M. Rooney</na></co>
<co c="0" n="2"><na f="r/Rubio=Hernan:Jose" pid="187/7343">Jose Rubio-Hernan</na><na>Jos&#233; Rubio-Hern&#225;n</na></co>
<co c="0"><na f="s/Santini_0001:Francesco" pid="95/4886">Francesco Santini 0001</na></co>
<co c="1"><na f="s/Serban:Cristina" pid="27/5922">Cristina Serban</na></co>
<co c="0" n="2"><na f="s/Shearer:Andrew" pid="24/7006">Andrew Shearer</na><na>Andy Shearer</na></co>
<co c="0" n="2"><na f="s/Sidiroglou=Douskos:Stelios" pid="37/1475">Stelios Sidiroglou-Douskos</na><na>Stelios Sidiroglou</na></co>
<co c="0"><na f="s/Singer:Abe" pid="24/4984">Abe Singer</na></co>
<co c="0"><na f="s/Snekkenes:Einar" pid="13/6186">Einar Snekkenes</na></co>
<co c="0"><na f="s/Somayaji:Anil" pid="56/1202">Anil Somayaji</na></co>
<co c="0"><na f="s/Swart:Garret" pid="46/4288">Garret Swart</na></co>
<co c="0"><na f="t/Thorpe:Julie" pid="53/114">Julie Thorpe</na></co>
<co c="0"><na f="t/Torra:Vicen=ccedil=" pid="t/VicencTorra">Vicen&#231; Torra</na></co>
<co c="0"><na f="t/Turkmen:Fatih" pid="22/2474">Fatih Turkmen</na></co>
<co c="0"><na f="v/Vanhulst:Kirsten" pid="228/0663">Kirsten Vanhulst</na></co>
<co c="-1"><na f="z/Zhou:Hongbin" pid="64/6351">Hongbin Zhou</na></co>
<co c="0"><na f="z/Zurko:Mary_Ellen" pid="02/6774">Mary Ellen Zurko</na></co>
</coauthors>
</dblpperson>

