What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Simon N. Foley
Google Scholar
27
publications in security and cryptology related venues
Year
Venue
Title
2018
conf/ccs
Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use.
Simon N. Foley
Fabien Autrel
Edwin Bourget
Thomas Clédel
Stephane Grunenwald
Jose Rubio-Hernan
Alexandre Kabil
Raphael Larsen
Vivien M. Rooney
Kirsten Vanhulst
2018
conf/nspw
An Online Consent Maturity Model: Moving from Acceptable Use Towards Ethical Practice.
Vivien M. Rooney
Simon N. Foley
2017
conf/nspw
Developer-centered security and the symmetry of ignorance.
Olgierd Pieczul
Simon N. Foley
Mary Ellen Zurko
2017
conf/esorics
What Users Want: Adapting Qualitative Research Methods to Security Policy Elicitation.
Vivien M. Rooney
Simon N. Foley
2015
conf/cns
A firewall algebra for OpenStack.
Simon N. Foley
Ultan Neville
2014
conf/nspw
I'm OK, You're OK, the System's OK: Normative Security for Systems.
Olgierd Pieczul
Simon N. Foley
Vivien M. Rooney
2013
journals/istr
MASON: Mobile autonomic security for network access controls.
William M. Fitzgerald
Ultan Neville
Simon N. Foley
2013
conf/cns
Avoiding inconsistencies in the Security Content Automation Protocol.
William M. Fitzgerald
Simon N. Foley
2013
conf/cns
Discovering emergent norms in security logs.
Olgierd Pieczul
Simon N. Foley
2012
conf/esorics
Automated Smartphone Security Configuration.
William M. Fitzgerald
Ultan Neville
Simon N. Foley
2005
conf/acsac
Highlights from the 2005 New Security Paradigms Workshop.
Simon N. Foley
Abe Singer
Michael E. Locasto
Stelios Sidiroglou
Angelos D. Keromytis
John P. McDermott
Julie Thorpe
Paul C. van Oorschot
Anil Somayaji
Richard Ford
Mark Bush
Alex Boulatov
2004
conf/nspw
A collaborative approach to autonomic security protocols.
Hongbin Zhou
Simon N. Foley
2004
conf/acsac
Themes and Highlights of the New Security Paradigms Workshop 2004.
Carla Marceau
Simon N. Foley
2003
conf/ccs
Fast automatic synthesis of security protocols using backward search.
Hongbin Zhou
Simon N. Foley
2003
conf/fc
Using Trust Management to Support Transferable Hash-Based Micropayments.
Simon N. Foley
2002
conf/sec
Secure Component Distribution Using WebCom.
Simon N. Foley
Thomas B. Quillinan
John P. Morrison
2001
conf/nspw
Computational paradigms and protection.
Simon N. Foley
John P. Morrison
2000
conf/nspw
Conduit cascades and secure synchronization.
Simon N. Foley
1998
conf/nspw
Evaluating System Integrity.
Simon N. Foley
1998
conf/esorics
A Kernelized Architecture for Multilevel Secure Application Policies.
Simon N. Foley
1997
journals/compsec
Building Chinese walls in standard unix<sup>TM</sup>.
Simon N. Foley
1997
conf/ccs
The Specification and Implementation of "Commercial" Security Requirements Including Dynamic Segregation of Duties.
Simon N. Foley
1997
conf/acsac
Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores.
Simon N. Foley
1996
conf/sp
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification.
Simon N. Foley
Li Gong
Xiaolei Qian
1991
conf/sp
A Taxonomy for Information Flow Policies and Models.
Simon N. Foley
1989
conf/sp
A Model for Secure Information Flow.
Simon N. Foley
1987
conf/sp
A Universal Theory of Information Flow.
Simon N. Foley
Coauthors
Abe Singer
(1)
Alex Boulatov
(1)
Alexandre Kabil
(1)
Angelos D. Keromytis
(1)
Anil Somayaji
(1)
Carla Marceau
(1)
Edwin Bourget
(1)
Fabien Autrel
(1)
Hongbin Zhou
(2)
John P. McDermott
(1)
John P. Morrison
(2)
Jose Rubio-Hernan
(1)
Julie Thorpe
(1)
Kirsten Vanhulst
(1)
Li Gong
(1)
Mark Bush
(1)
Mary Ellen Zurko
(1)
Michael E. Locasto
(1)
Olgierd Pieczul
(3)
Paul C. van Oorschot
(1)
Raphael Larsen
(1)
Richard Ford
(1)
Simon N. Foley
(27)
Stelios Sidiroglou
(1)
Stephane Grunenwald
(1)
Thomas B. Quillinan
(1)
Thomas Clédel
(1)
Ultan Neville
(3)
Vivien M. Rooney
(4)
William M. Fitzgerald
(3)
Xiaolei Qian
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to