Jim Alves-Foss - Publications

University of Idaho, Moscow, ID, United States 
Computer Science

40 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Jillepalli AA, Leon DCd, Steiner S, Alves-Foss J. Analysis of Web Browser Security Configuration Options Ksii Transactions On Internet and Information Systems. 12: 6139-6160. DOI: 10.3837/Tiis.2018.12.028  0.457
2016 Yang X, Shi P, Sun H, Zheng W, Alves-Foss J. A fast boot, fast shutdown technique for android OS devices Computer. 49: 62-68. DOI: 10.1109/Mc.2016.210  0.31
2016 Song J, Alves-Foss J. Expanding RTEMS to a multiuser system by using security tags Communications in Computer and Information Science. 589: 3-18. DOI: 10.1007/978-3-319-28313-5_1  0.424
2016 Haltinner K, Sarathchandra D, Alves-Foss J, Chang K, de Leon DC, Song J. Cyber security: Second international symposium, CSS 2015 coeur d’Alene, ID, USA, April 7-8, 2015 revised selected papers Communications in Computer and Information Science. 589. DOI: 10.1007/978-3-319-28313-5  0.352
2015 Alves-Foss J, Song J, Amack AS, Kerr L, Steiner S. Evaluating the use of security tags in security policy enforcement mechanisms Proceedings of the Annual Hawaii International Conference On System Sciences. 2015: 5201-5210. DOI: 10.1109/HICSS.2015.614  0.453
2013 Yang X, Alves-Foss J. Security policy refinement: High-level specification to low-level implementation Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 502-511. DOI: 10.1109/SocialCom.2013.77  0.374
2013 Rounds M, Pendegraft N, Alves-Foss J. An experimental study to explore attacker response to changes in security and reward Proceedings of the Annual Hawaii International Conference On System Sciences. 2969-2977. DOI: 10.1109/HICSS.2013.84  0.592
2013 Song J, Alves-Foss J. Security tagging for a zero-kernel operating system Proceedings of the Annual Hawaii International Conference On System Sciences. 5049-5058. DOI: 10.1109/HICSS.2013.474  0.338
2012 Lundeen B, Alves-Foss J. Practical clickjacking with BeEF 2012 Ieee International Conference On Technologies For Homeland Security, Hst 2012. 614-619. DOI: 10.1109/THS.2012.6459919  0.303
2011 Weis J, Alves-Foss J. Securing database as a service: Issues and compromises Ieee Security and Privacy. 9: 49-55. DOI: 10.1109/MSP.2011.127  0.36
2011 Linda O, Manic M, Alves-Foss J, Vollmer T. Towards resilient critical infrastructures: Application of Type-2 Fuzzy Logic in embedded network security cyber sensor Proceedings - Isrcs 2011: 4th International Symposium On Resilient Control Systems. 26-32. DOI: 10.1109/ISRCS.2011.6016083  0.32
2010 Manz D, Oman P, Alves-Foss J. A framework for group key management protocol assessment independent of view synchrony Journal of Computer Science. 6: 229-234. DOI: 10.3844/Jcssp.2010.229.234  0.623
2010 Conrad JR, Alves-Foss J, Lee SS. Analyzing uncertainty in TG protection graphs with TG/MC Journal of Computer Security. 18: 667-699. DOI: 10.3233/Jcs-2009-0378  0.429
2009 Son J, Alves-Foss J. A formal framework for real-time information flow analysis Computers and Security. 28: 421-432. DOI: 10.1016/J.Cose.2009.01.005  0.585
2008 Wahsheh LA, de Leon DC, Alves-Foss J. Formal verification and visualization of security policies Journal of Computers. 3: 22-31. DOI: 10.4304/Jcp.3.6.22-31  0.446
2008 Wahsheh LA, Alves-Foss J. Security policy development: Towards a life-cycle and logic-based verification model American Journal of Applied Sciences. 5: 1117-1126. DOI: 10.3844/Ajassp.2008.1117.1126  0.456
2008 Zhou J, Alves-Foss J. Security policy refinement and enforcement for the design of multi-level secure systems Journal of Computer Security. 16: 107-131. DOI: 10.3233/Jcs-2008-16202  0.495
2007 Wahsheh LA, Alves-Foss J. Policy-Based Security for Wireless Components in High Assurance Computer Systems Journal of Computer Science. 3: 726-735. DOI: 10.3844/Jcssp.2007.726.735  0.529
2007 Robinson JC, Scott Harrison W, Hanebutte N, Oman P, Alves-Foss J. Implementing middleware for content filtering and information flow control Proceedings of the Acm Conference On Computer and Communications Security. 47-53. DOI: 10.1145/1314466.1314474  0.352
2007 Robinson JC, Alves-Foss J. A high assurance MLS file server Operating Systems Review (Acm). 41: 45-53. DOI: 10.1145/1228291.1228303  0.45
2007 Wahsheh LA, Alves-Foss J. Using policy enforcement graphs in a separation-based high assurance architecture 2007 Ieee International Conference On Information Reuse and Integration, Ieee Iri-2007. 183-189. DOI: 10.1109/IRI.2007.4296618  0.407
2007 De Leon DC, Alves-Foss J, Oman PW. Implementation-oriented secure architectures Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2007.264  0.394
2007 Zheng S, Manz D, Alves-Foss J. A communication-computation efficient group key algorithm for large and dynamic groups Computer Networks. 51: 69-93. DOI: 10.1016/J.Comnet.2006.03.008  0.619
2007 Son J, Alves-Foss J. High level specification of non-Interference security policies in partitioned MLS systems Proceedings of the 4th Iasted International Conference On Communication, Network, and Information Security. 83-89.  0.438
2006 Alves-Foss J, Oman PW, Taylor C, Harrison WS. The MILS architecture for high-assurance embedded systems International Journal of Embedded Systems. 2: 239-247. DOI: 10.1504/Ijes.2006.014859  0.407
2006 De Leon DC, Alves-Foss J. Hidden implementation dependencies in high assurance and critical computing systems Ieee Transactions On Software Engineering. 32: 790-811. DOI: 10.1109/Tse.2006.103  0.31
2006 Zheng S, Alves-Foss J, Lee SS. The effect of rebalancing on the performance of a group key agreement protocol Proceedings - Conference On Local Computer Networks, Lcn. 983-989. DOI: 10.1109/LCN.2006.322212  0.372
2006 Wei H, Alves-Foss J. Applying the layered decision model to the design of language-based security systems Proceedings of the 2006 Ieee International Conference On Information Reuse and Integration, Iri-2006. 182-187. DOI: 10.1109/IRI.2006.252410  0.379
2006 Harrison WS, Hanebutte N, Alves-Foss J. Programming education in the era of the internet: A paradigm shift Proceedings of the Annual Hawaii International Conference On System Sciences. 9. DOI: 10.1109/HICSS.2006.395  0.346
2006 Taylor C, Alves-Foss J. Diversity as a computer defense mechanism a panel Proceedings New Security Paradigms Workshop. 2006: 11-14.  0.354
2006 Wang B, Alves-Foss J. AN MSLS-EMM for enforcing confidentiality in malicious environments Proceedings of the Third Iasted International Conference On Communication, Network, and Information Security, Cnis 2006. 126-131.  0.392
2006 Zheng S, Manz D, Alves-Foss J, Chen Y. Security and performance of group key agreement protocols Proceedings of the Iasted International Conference On Networks and Communication Systems 2006. 2006: 321-327.  0.644
2005 Hanebutte N, Oman P, Loosbrock M, Holland A, Harrison WS, Alves-Foss J. Software mediators for transparent channel control in unbounded environments Proceedings From the 6th Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc 2005. 2005: 201-206. DOI: 10.1109/IAW.2005.1495953  0.438
2005 Harrison WS, Hanebutte N, Oman PW, Alves-Foss J. The MILS architecture for a secure Global Information Grid Crosstalk. 18.  0.412
2004 Alves-Foss J, Taylor C, Oman P. A multi-layered approach to security in high assurance systems Proceedings of the Hawaii International Conference On System Sciences. 37: 4817-4826.  0.365
2004 Lee H, Alves-Foss J, Harrison S. The construction of secure mobile agents via evaluating encrypted functions Web Intelligence and Agent Systems. 2: 1-19.  0.355
2004 Hyungjick L, Alves-Foss J, Harrison S. The use of encrypted functions for mobile agent security Proceedings of the Hawaii International Conference On System Sciences. 37: 4757-4766.  0.349
2002 Malladi S, Alves-Foss J. What are multi-protocol guessing attacks and how to prevent them Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2002: 77-82. DOI: 10.1109/ENABL.2002.1029992  0.618
1996 Cavaiani C, Alves-Foss J. Mutual authenticating protocol with key distribution in client/server environment Acm Crossroads Student Magazine. 2: 17-22. DOI: 10.1145/332159.332164  0.499
1995 Alves-Foss J, Barbosa S. Assessing computer security vulnerability Operating Systems Review. 29: 3-13. DOI: 10.1145/206826.206829  0.492
Show low-probability matches.