|
|
Dr. Simon N. Foley Lecturer in Computer Science, Department of Computer Science, University College, Cork, Ireland. Phone: +353 21 4902929 Email: s.foley@cs.ucc.ie |
- Research interests: computer security and formal techniques.
- Teaching activities: computer security, formal techniques and software engineering.
Security Research
Note: Thomas, Barry and Hongbin are due to complete their PhDs this year (2006) and are looking for jobs in industry and/or academia; I recommend them as excellent candidates. The security group at UCC is currently composed of myself, Thomas Quillinan, Barry Mulcahy, Hongbin Zhou and William Fitzgerald. Our research areas include the areas of distributed systems security and security configuration. I'm currently on the editorial board of the Journal of Computer Security and serve on the program committees of a number of conferences. In the past, I served as Program/General Chair for the ACM New Security Paradigms Workshop and the IEEE Computer Security Foundations Workshop.
Publications
- Hongbin Zhou, Simon N Foley
A Framework for Establishing Decentralized Secure Coalitions
Proceedings of IEEE Computer Security Foundations Workshop, Venice, Italy,
July 2006, IEEE CS Press, to appear.
- S.N. Foley, B.P. Mulcahy, T.B. Quillinan and J.P. Morrison.
Supporting Heterogenous Middleware Security Policies in WebCom
Journal of High Speed Networks, Special issue on Security Policy Management,
accepted for publication.
- B. Aziz, S.N. Foley, J. Herbert and G. Swart.
Reconfiguring Role Based Access Control Policies Using Risk Semantics.
Journal of High Speed Networks, Special issue on Security Policy Management,
accepted for publication.
-
J.P Morrison, B. Coughlan, A. Shearer,
S.N. Foley, D. Power, and R. Perrot
WebCom-G: A Candidate Middleware for Grid Ireland\/}
International Journal of High Performance Computing Applications,
to appear.
- Stefano Bistarelli, Simon N. Foley and Barry O'Sullivan
A Soft Constraint-based Approach to the Cascade Vulnerability Problem
Journal of Computer Security, 13(5), pp699-720, 2005.
- B.C. Clayton and T.B. Quillinan and S.N. Foley.
Automating Security Configuration for the Grid.
International Journal of High Performance Computing and Networking,
Volume 13, Number 2 / 2005
Pages: 113 - 125.
- T.B. Quillinan, S.N. Foley,
Synchronisation in Trust Management using Push Authorisation
First International Workshop on Security and Trust Management (STM'05),
Milan, Italy, September 2005.
paper
- S.N. Foley, S. Bistaelli, B. O'Sullivan, J. Herbert and G. Swart
Multilevel Security and Quality of Protection
First Workshop on Quality of Protection, Como, Italy, September 2005.
paper
- G. Navarro, S.N. Foley,
Approximating SAML using Similarity Based Imprecision
2005 IFIP International Conference on Intelligence in Communication Systems.
paper
- G. Swart, B. Aziz, S.N. Foley and J. Herbert.
Trading Off Security in a Service Oriented Architecture ,
In Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and
Applications Security, Storrs, CT, USA, August 7-10, 2005.
paper
- H. Zhou, S.N. Foley.
A Logic for Analysing Subterfuge in Delegation Chains.
Workshop on Formal Aspects in Security and Trust (FAST2005),
Newcastle upon Tyne, UK, July 18-19, 2005.
paper
-
B.P. Mulcahy, S.N. Foley and J.P. Morrison
Cross Cutting Condensed Graphs
2005 International Conference on
Parallel and Distributed Processing Techniques and
Applications (PDPTA 2005).
IEEE CS Press.
- S.N. Foley, H Zhou.
Authorisation Subterfuge by Delegation in Decentralised Networks
In Proceedings of International Security Protocols Workshop,
Cambridge UK.
April, 2005. Springer Verlag LNCS.
paper
- S.N. Foley, B. Mulcahy and T.B. Quillinan
Dynamic Adinistrative Coalitions with WebCom_DAC
Proceedings of Web 2004: Third Workshop on e-Business.
Washington DC, December, 2004.
paper
- T.B. Quillinan, S.N. Foley.
Security in WebCom: Addressing
naming issues for a Web Service architecture,
ACM Workshop on Secure Web Services (ACM-SWS2004).
paper
- G. Swart, B. Aziz, S.N. Foley and J. Herbert.
Automatic Configuration of Services for Security, Bandwidth, Throughput,
and Availability.
ICSOC04 Forum/Short Paper
(2nd International Conference on Service Oriented Computing) 2004.
- S. Bistarelli, G. Bella and S.N. Foley
Soft Constraints for Security,
First International Workshop on Views
On Designing Complex Architectures (VODCA), September 2004.
Springer Verlag Electronic Notes in Computer Science.
paper
- H. Zhou, S.N. Foley
A Collaborative Approach to Autonomic Security Protocols
Proceedings of the ACSA New Security Paradigms Workshop,
Nova Scotia, September 2004.
paper
- S. Bistarelli, S.N. Foley and B. O'Sullivan
Reasoning about Secure Interoperation using Soft Constraints
Proceedings of FAST-2004 Workshop on Formal Aspects of Security and Trust,
Toulouse, August 2004.
paper
- B. Aziz, S.N. Foley, J. Herbert, G. Swart
Configuring Storage-Area Networks for Mandatory Security,
18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Sitges, Spain, July 25-28, 2004.
paper
- T. Quillinan, B. Clayton, S.N. Foley.
GridAdmin: Decentralising Grid Administration using Trust Management.
3rd International Symposium on Parallel and Distributed Computing,
IEEE Press, July 2004.
paper
- S.N. Foley
Believing the Integrity of a System. Invited paper.
IJCAR 2004 Workshop on
Automated Reasoning for Security Protocol Analysis,
July 4, 2004.
Springer Verlag Electronic Notes in Computer Science.
paper
- S. Bistarelli, S. Foley and B. O'Sullivan
Detecting and Eliminating the Cascade Vulnerability Problem from
Multi-level Security Networks using Soft Constraints.
Proceedings of AAAI/IAAI-2004 (16th Innovative Applications of AI Conference),
AAAI Press
San Jose, USA, July 2004.
paper
- S.N. Foley, T.B Quillinan, B. Mulcahy, M. O'Connor,
J.P. Morrison.
A Framework for Heterogeneous Middleware Security,
13th Heterogeneous Computing Workshop (HCW 2004),
Santa Fe, New Mexico, USA, April 26, 2004.
paper
- S. Bistarelli, S.N. Foley, B. O'Sullivan.
Modelling and Detecting the Cascade Vulnerability Problem using Soft
Constraints.
Proceedings of ACM Symposium on Applied Computing (SAC-2004), ACM Press
Nicosia, Cyprus, March 2004.
paper
- S. Bistarelli, S.N. Foley, B. O'Sullivan.
A Constraint Based Framework for Modelling the
Cascade Vulnerability Problem
Workshop on COnstraint and LOgic Programming in Security.
Workshop held alongside ICLP-2003
Mumbai, India, December 2003.
Electronic Notes in Theoretical Computer Science.
- H. Zhou, S.N. Foley.
Fast Automatic Synthesis of Security Protocols using Backward Search,
In proceedings of the
ACM Workshop on Formal Methods for Security Engineering (FMSE),
Washington DC, October 2003.
paper
- S. Bisterelli, S.N. Foley.
A Constraint framework for the qualitative analysis of dependability
goals: Integrity.
In Proceedings of the International Conference of
Computer Safety, Reliability and Security.
Scotland, September 2003. Springer Verlag LNCS.
paper
- S. Bistarelli, S.N. Foley.
Analysis of Integrity Policies using Soft Constraints.
In Proceedings of IEEE International Workshop on Policies for
Distributed Systems and Networks. Lake Como, Italy. June 2003.
paper
- S.N. Foley, H. Zhou,
Towards an Architecture for Autonomic Security Protocols
In Proceedings of International Security Protocols Workshop,
Cambridge UK.
April, 2003. Springer Verlag LNCS
paper
- S.N. Foley
Using Trust Management to Support Transferable Hash-Based Micropayments.
In proceedings of the 7th International Financial
Cryptography Conference. Guadeloupe FWI, January 2003.
Springer Verlag LNCS.
paper
- S.N. Foley.
A Non-Functional Approach to Systems Integrity,
IEEE Journal on Selected Areas in Communications. 21(1), pages
36-43. January 2003.
paper
- S.N. Foley, T.B. Quillinan.
Using Trust Management to Support MicroPayments,
In proceedings of the Annual Conference on Information
Technology and Telecommunications, Waterford, Ireland,
October 2002.
paper
- C. Wolf, P. Fitzpatrick, S.N. Foley, E. Popovici.
HFE in Java: Implementing Hidden Field Equations
for Public Key Cryptography
In proceedings of the Irish Signals and Systems Conference,
Cork, Ireland, June 2002.
paper
- S.N. Foley
Supporting Imprecise Delegation in KeyNote.
In Proceedings of International Security Protocols Workshop,
Cambridge UK.
April, 2002. Springer Verlag LNCS,
paper
- S.N. Foley, T.B. Quillinan, J.P. Morrison,
Secure Component Distribution using WebCom.
In Proceedings of IFIP/Sec 2002 17th International Conference on Information Security, pages 387-398,
Cairo Egypt, May 2002.
paper
- S.N. Foley
Supporting Imprecise Delegation in KeyNote using
Similarity Measures
Proceedings of The Sixth Nordic Workshop on Secure IT Systems, Pages 101-119, November, 2001, Copenhagen.. - S.N. Foley and R. Dumigan.
Are Palm Handheld Viruses a Significant Threat?,
Communications of the ACM, Technical Opinion.
Pages 105-107, January 2001.
An interview on this work appeared in the New York Times - S.N. Foley and J.P. Morrison
Computational Paradigms and Protection.
Proceeding of New Security Paradigms Workshop,
pages 3-11, New Mexico, 2001. ACM Press.
paper
- S.N.Foley Trust Management and Whether to Delegate.
Proceedings of the International Security Protocols
Workshop, (Cambridge, UK),
April 2001. Springer Verlag, forthcoming.
paper
- S.N. Foley, T.B. Quillinan, J.P. Morrison, D.A. Power and J.J. Kennedy
Exploiting KeyNote in WebCom: Architecture Neutral Glue
for Trust Management.
In Proceedings of The Fifth Nordic Workshop
on Secure IT Systems, Pages 101-119,
October, 2000, Reykjavik, Iceland.
paper
- S.N. Foley
Conduit Cascades and Secure Synchronisation.
In Proceeding of ACM New Security Paradigms Workshop,
pages 141-150, (Cork, Ireland) 2000, ACM Press.
paper
This paper was also selected from this workshop for special presentation and inclusion in the Proceedings of the National Information Systems Security Conference (Baltimore, MD, USA), October 16-19, 2000.
- S.N. Foley
Evaluating System Integrity.
Proceeding of ACM New Security Paradigms Workshop
(Charlottesville, VA, USA), 1998, ACM Press, pages 40-47.
paper
- S.N. Foley.
External Consistency and the Verification of Security Protocols.
6th International Workshop on Security Protocols.
(Cambridge, UK), April 1998. Springer LNCS 1550, pp24-35.
paper
- S.N. Foley.
A Kernelized Architecture for Multilevel Secure Application
Policies.
European Symposium on Research in Computer Security,
Louvain-la-Neuve, Belgium, 17 pages,
September 16-18, 1998, Springer LNCS 1485,
pp 33-49..
paper
- S.N. Foley.
Supporting Secure Canonical Upgrade Policies in Multilevel
Secure Object Stores.
In Proceedings of the 13th IEEE Annual Computer
Security Applications
Conference (San Diego, CA), IEEE Computer Society Press, 1997,
pages 69-80.
paper
- S.N. Foley.
The Specification and Implementation of Commercial Security
Requirements Including Dynamic Segregation of Duties.
In
Proceedings of the 4th ACM Conference on Computer and
Communications Security (Zurich, Switzerland), ACM Press, 1997, pages
125-134.
paper
- S.N. Foley.
Building Chinese Walls in Standard Unix.
December 1997.
In Computers and Security Journal,
16(6):551-563.
paper
- S.N. Foley, L. Gong, and X. Qian.
A Security Model of Dynamic Labelling Providing a Tiered Approach to
Verification.
In Proceedings of the IEEE Symposium on Security and Privacy
(Oakland, CA),
IEEE Computer Society Press, 1996, pages 142-153.
full length TR
- S.N. Foley and J.L. Jacob.
Specifying Security for CSCW Systems.
In Proceedings of the IEEE Computer Security Foundations Workshop
(Kenmare, Co. Kerry),
IEEE Computer Society Press, 1995,
pages 136-145.
- S.N. Foley.
Reasoning about Confidentiality Requirements.
In Proceedings of the IEEE Computer Security Foundations Workshop
(Franconia, NH),
IEEE Computer Society Press, 1994, pages 150-160.
paper
- S.N. Foley.
Aggregation and Separation as Noninterference Properties.
Journal of Computer Security, 1(2):159-188, 1992.
paper
- S.N. Foley.
Separation of Duty Using High Water Marks.
In Proceedings of the IEEE Computer Security Foundations Workshop
(Franconia, NH),
IEEE Computer Society Press, 1991, pages 79-88.
- S.N. Foley.
A Taxonomy for Information Flow Policies and Models.
In Proceedings of the IEEE Symposium on Security and Privacy.
IEEE Computer Society Press, 1991, pages 98-108.
- S.N. Foley.
Secure Information Flow Using Security Groups.
In Proceedings of the IEEE Computer Security Foundations Workshop
(Franconia, NH),
IEEE Computer Society Press, 1990, pages 62-72.
- S.N. Foley.
Unifying Information Flow Policies.
Technical Report 900020, Royal Signals and Radar Establishment,
Malvern, Worcs., UK., 1990.
- S.N. Foley.
Lattices for Security Policies.
Technical Report 90005, Royal Signals and Radar Establishment,
Malvern, Worcs., UK., 1990.
- S.N. Foley.
A Model for Secure Information Flow.
In Proceedings of the IEEE Symposium on Security and Privacy
(Oakland, CA),
IEEE Computer Society Press, 1989, pages 248-258.
- S.N. Foley.
A Universal Theory of Information Flow.
In Proceedings 1987 IEEE Symposium on Security and Privacy
(Oakland, CA),
IEEE Computer Society Press, pages 116-122.
November 28, 2004