Reconfiguring role based access control policies using risk semantics B Aziz, SN Foley, J Herbert, G Swart Journal of High Speed Networks 15 (3), 261-273, 2006 | 50 | 2006 |
A model for secure information flow SN Foley Proceedings. 1989 IEEE Symposium on Security and Privacy, 248-248, 1989 | 49 | 1989 |
A Universal Theory of Information Flow SN Foley Symposium on Security and Privacy, 1987 | 47 | 1987 |
The specification and implementation of “commercial” security requirements including dynamic segregation of duties SN Foley Proceedings of the 4th ACM Conference on Computer and Communications …, 1997 | 44 | 1997 |
A nonfunctional approach to system integrity SN Foley IEEE Journal on Selected Areas in Communications 21 (1), 36-43, 2003 | 42 | 2003 |
A security model of dynamic labelling providing a tiered approach to verification SN Foley, L Gong, X Qian Proceedings 1996 IEEE Symposium on Security and Privacy, 142-153, 1996 | 40 | 1996 |
Aggregation and separation as noninterference properties SN Foley Journal of Computer Security 1 (2), 159-188, 1992 | 38 | 1992 |
Challenges for federated, autonomic network management in the future internet B Jennings, R Brennan, W Donnelly, SN Foley, D Lewis, D O'Sullivan, ... 2009 IFIP/IEEE International Symposium on Integrated Network Management …, 2009 | 34 | 2009 |
Multilevel security and quality of protection SN Foley, S Bistarelli, B O’Sullivan, J Herbert, G Swart Quality of Protection, 93-105, 2006 | 34 | 2006 |
Using trust management to support transferable hash-based micropayments SN Foley International Conference on Financial Cryptography, 1-14, 2003 | 32 | 2003 |
Management of security policy configuration using a Semantic Threat Graph approach SN Foley, WM Fitzgerald Journal of Computer Security 19 (3), 567-605, 2011 | 29 | 2011 |
A framework for heterogeneous middleware security SN Foley, TB Quillinan, M O'Connor, BP Mulcahy, JP Morrison 18th International Parallel and Distributed Processing Symposium, 2004 …, 2004 | 28 | 2004 |
A taxonomy for information flow policies and models SN Foley Proceedings. 1991 IEEE Computer Society Symposium on Research in Security …, 1991 | 28 | 1991 |
Risk profiling for enterprise risk management SN Foley, HB Moss US Patent 10,248,915, 2019 | 27 | 2019 |
Fast automatic synthesis of security protocols using backward search H Zhou, SN Foley Proceedings of the 2003 ACM workshop on Formal methods in security …, 2003 | 24 | 2003 |
Security risk management using internal controls SN Foley Proceedings of the first ACM workshop on Information security governance, 59-64, 2009 | 23 | 2009 |
Specifying security for computer supported collaborative working SN Foley, JL Jacob Journal of Computer Security 3 (4), 233-253, 1995 | 22 | 1995 |
GridAdmin: Decentralising grid administration using trust management TB Quillinan, BC Clayton, SN Foley Third International Symposium on Parallel and Distributed Computing/Third …, 2004 | 21 | 2004 |
Specifying security for CSCW systems SN Foley, J Jacob Proceedings The Eighth IEEE Computer Security Foundations Workshop, 136-145, 1995 | 21 | 1995 |
WebCom-G: A candidate middleware for Grid-Ireland JP Morrison, B Coghlan, A Shearer, S Foley, D Power, R Perrott The International Journal of High Performance Computing Applications 20 (3 …, 2006 | 20 | 2006 |