Author image not provided
 Simon N Foley

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article1.79
Citation Count113
Publication count63
Publication years1992-2013
Available for download13
Average downloads per article462.00
Downloads (cumulative)6,006
Downloads (12 Months)157
Downloads (6 Weeks)27
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


63 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 63
Result page: 1 2 3 4

Sort by:

1
November 2013 ICTAI '13: Proceedings of the 2013 IEEE 25th International Conference on Tools with Artificial Intelligence
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

Physical access control policies define sets of rulesthat govern people's access to physical resources such asrooms and buildings. While simple decision-precedence canbe used to reconcile different rules that result in conflictingaccess decisions, the presence of rule conflicts and other ruleanomalies can make it difficult for a policy-administrator tocomprehend and effectively ...
Keywords: Access Control, Policy, Relaxations

2
July 2012 DBSec'12: Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Threat knowledge-bases such as those maintained by MITRE and NIST provide a basis with which to mitigate known threats to an enterprise. These centralised knowledge-bases assume a global and uniform level of trust for all threat and countermeasure knowledge. However, in practice these knowledge-bases are composed of threats and countermeasures ...
Keywords: decentralized threat management, security configuration

3
March 2012 Journal of Computer Security: Volume 20 Issue 2-3, March 2012
Publisher: IOS Press
Bibliometrics:
Citation Count: 0

An automatic security protocol generator is described that uses logic-based heuristic rules to guide it in a backward search for suitable protocols from protocol goals. The approach taken is unlike existing automatic protocol generators which typically carry out a forward search for candidate protocols from the protocol assumptions. A prototype ...
Keywords: Security Protocols, Automated Protocol Generation, Authentication Logics

4
September 2011 CRISIS '11: Proceedings of the 2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

This proceedings contains the papers presented at the 6th International Conference on Risks and Security of Internet and Systems (CRiSIS 2011). The conference was technically co-sponsored by the IEEE Computer Society (Technical Committee on Security and Privacy). It was hosted for the first time in Timis, oara, Romania, September 26 ...

5
August 2011 Journal of Computer Security - DBSEC 2008: Volume 19 Issue 3, August 2011
Publisher: IOS Press
Bibliometrics:
Citation Count: 1

Managing the configuration of heterogeneous enterprise security mechanisms is a complex task. The effectiveness of a configuration may be constrained by poor understanding and/or management of the overall security policy requirements, which may, in turn, unnecessarily expose the enterprise to known threats. This paper proposes a threat management based approach, ...
Keywords: threat tree, security compliance, Ontology, firewall

6
August 2011 Information Sciences—Informatics and Computer Science, Intelligent Systems, Applications: An International Journal: Volume 181 Issue 16, August, 2011
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 2

The access control policy of an application that is composed of interoperating components/services is defined in terms of the access control policies enforced by the respective services. These individual access control policies are heterogenous in the sense that the services may be independently developed and managed and it is not ...
Keywords: Attribute conversion, Flexibility, Interoperability, Access control

7
January 2011 Computer Standards & Interfaces: Volume 33 Issue 1, January, 2011
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 2

Access controls for Semantic Web applications are commonly considered at the level of the application-domain and do not necessarily consider the security controls of the underlying infrastructure to any great extent. Low-level network access controls such as firewalls and proxies are considered part of providing a generic network infrastructure that ...
Keywords: Semantic Web, Network access control, Ontology, Security

8 published by ACM
October 2010 SafeConfig '10: Proceedings of the 3rd ACM workshop on Assurable and usable security configuration
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 0,   Downloads (12 Months): 4,   Downloads (Overall): 223

Full text available: PDFPDF
Management of heterogeneous enterprise security mechanisms is complex and requires a security administrator to have deep knowledge of each security mechanism's configuration. Effective configuration may be hampered by poor understanding and/or management of the enterprise security policy which, in turn, may unnecessarily expose the enterprise to known threats. This paper ...
Keywords: access control, configuration management, ontology

9
September 2010 STM'10: Proceedings of the 6th international conference on Security and trust management
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 2

A Trust Management model that provides a measure of the degree to which a principal is trusted for some action is proposed. At the heart of the model is the notion that triangular norms and conorms provide a natural and consistent interpretation for trust aggregation across delegation chains. It is ...

10
August 2010 IEEE Communications Magazine: Volume 48 Issue 8, August 2010
Publisher: IEEE Press
Bibliometrics:
Citation Count: 3

Enabling interdomain and end-to-end management are major challenges for IT architectures supporting agile next-generation communications service providers. This requires explicit management of the interdomain relationships themselves rather than treating extradomain resources or services as equivalent to internal capabilities. In this article we describe a general layered model for describing interdomain ...

11 published by ACM
May 2010 AVI '10: Proceedings of the International Conference on Advanced Visual Interfaces
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 10,   Downloads (Overall): 92

Full text available: PDFPDF
This paper reports on current research into the development of an interactive visualisation tool for postgraduate research students. The aim of the research is to construct a virtual environment that allows students to navigate ideas, which they can then relate to conceptual structures. V. E.N.I.C.E offers users a virtual learning ...

12 published by ACM
November 2009 WISG '09: Proceedings of the first ACM workshop on Information security governance
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 17,   Downloads (12 Months): 84,   Downloads (Overall): 1,170

Full text available: PDFPDF
Rather than treating security as an independent technical concern, it should be considered as just another risk that needs to be managed alongside all other business risks. An Internal Controls approach to security risk management is proposed whereby automated catalogues are built in order to provide information about security controls ...
Keywords: configuration management, enterprise risk management, governance, internal controls

13
July 2009 Recent Advances in Constraints: 13th Annual ERCIM International Workshop on Constraint Solving and Constraint Logic Programming, CSCLP 2008, Rome, Italy, June 18-20, 2008, Revised Selected Papers
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

In this work we represent the Optimal Stable Marriage problem as a Soft Constraint Satisfaction Problem . In addition, we extend this problem from couples of individuals to coalitions of generic agents, in order to define new coalition-formation principles and stability conditions. In the coalition case, we suppose the preference ...

14
July 2009 Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 3

Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding and/or management of the overall security policy requirements, which may, in turn, unnecessarily expose the enterprise to known threats. This paper proposes a threat management approach, ...

15
April 2009 Journal of Computer Security: Volume 17 Issue 2, April 2009
Publisher: IOS Press
Bibliometrics:
Citation Count: 0

Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both environments the network and the storage has to be configured to ensure that the data is maintained securely and can be delivered efficiently. In ...
Keywords: configuration analysis, security, Storage-area networks (SAN), formal validation methods

16
April 2008 Security'08: Proceedings of the 16th International conference on Security protocols
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Security protocol participants are software and/or hardware agents that are -- as with any system -- potentially vulnerable to failure. Protocol analysis should extend not just to an analysis of the protocol specification, but also to its implementation and configuration in its target environment. However, an in-depth formal analysis that ...

17
April 2008 ICDEW '08: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering Workshop
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Secure Semantic Web applications, particularly those involving access control, are typically focused at the application-domain only, rather than taking a more holistic approach to also include the underlying infrastructure (for example, firewalls). As a result, infrastructure configurations may unintentionally hinder and prohibit the normal operation of the Semantic Web. This ...

18
October 2006 IPOM'06: Proceedings of the 6th IEEE international conference on IP Operations and Management
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

The challenge for autonomic network management is the provision of future network management systems that have the characteristics of self-management, self-configuration, self-protection and self-healing, in accordance with the high level objectives of the enterprise or human end-user. This paper proposes an abstract model for network configuration that is intended to ...

19
August 2006 International Journal of High Performance Computing Applications: Volume 20 Issue 3, August 2006
Publisher: Sage Publications, Inc.
Bibliometrics:
Citation Count: 0

WebCom-G is a fledgling Grid Operating System, designed to provide independent service access through interoperability with existing middlewares. It offers an expressive programming model that automatically handles task synchronisation - load balancing, fault tolerance, and task allocation are handled at the WebCom-G system level - without burdening the application writer. ...
Keywords: Grid, Middleware, WebCom-G, Grid Operating System

20
July 2006 CSFW '06: Proceedings of the 19th IEEE workshop on Computer Security Foundations
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 4

A coalition provides a virtual space across a network that allows its members to interact in a transparent manner. Coalitions may be formed for a variety of purposes. These range from simple spaces used by individuals to share resources and exchange information, to highly structured environments in which businesses and ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us