students walk on University of Idaho campus

Visit U of I

Learn about the many reasons the University of Idaho could be a perfect fit for you. Schedule Your Visit

Parents on campus during orientation

Homecoming Oct. 1-7

Join other Vandal families for a week of celebration and Vandal traditions. View Calendar

campus full of students

U of I Retirees Association

UIRA has a membership of nearly 500 from every part of the University. Learn More

Publications

  • J. Alves-Foss and J. Song. “The DARPA Cyber Grand Challenge: A Competitors Perspective, Part 2”. IEEE Security and Privacy, January/February 2016. 10.1109/MSP.2016.14
  • L. Kerr and J. Alves-Foss. “Combining Mandatory and Attribute-based Access Control”. 49th Hawaii International Conference on System Sciences 2016. 10.1109/HICSS.2016.328
  • J. Guild. “An Assessment Methodology, Models for Cyber Systems”. 2016. In process.
  • A. Jillepalli and D. Conte de Leon. “An Architecture for a Policy-Oriented Web Browser Management System: HiFiPol: Browser”. Proceedings of STPSA Workshop, IEEE COMPSAC 2016. To be published April 7th.
  • A. Jillepalli and D. Conte de Leon. “HERMES: A High-Level Policy Language for High-Granularity Enterprise-wide Secure Browser Configuration Management”, Information Security, Privacy and Policy mini-track at HICSS 2017.
  • A. Jillepalli and D. Conte de Leon. “Detection and Prevention of PCO Threats Through Cross-Layer, Serial Module Architecture”. Cybersecurity Symposium: Your Security, Your Future 2016: Edited Proceedings Volume.
  • A. Jillepalli. “A Policy-Oriented Web Browser Management System: HiFiPol: Browser”. Masters’ Thesis, University of Idaho, Moscow.

  • L. Kerr. “UI Tags: Confidentiality in Office Open XML”. Cyber Security 2015. 10.1007/978-3-319-28313-5_2
  • J. Alves-Foss, J. Song, A. S. Amack, L. Kerr, and S. Steiner. “Evaluating the Use of Security Tags in Security Policy Enforcement Mechanisms”. 48th Hawaii International Conference on System Sciences 2015. 10.1109/HICSS.2015.614
  • J. Song and J. Alves-Foss. “Expanding RTEMS to a Multiuser System by Using Security Tags”. Cyber Security 2015. 10.1007/978-3-319-28313-5_1
  • K. Haltinner, D. Sarathchandra, and N. Lichtenberg. “Can I Live? College Student Perceptions of Risks, Security, and Privacy in Online Spaces”. Cyber Security 2015. 10.1007/978-3-319-28313-5_6
  • K. Chang, K. Haltinner, and R. Scott. “How the Secure Use of Technology Could Influence Travel to and from School for Elementary School-Aged Children”. Cyber Security 2015. 10.1007/978-3-319-28313-5_7

  • J. Alves-Foss, J. Song, S. Steiner, and S. Zakeri. “A New Operating System for Security Tagged Architecture Hardware in Support of Multiple Independent Levels of Security”. Air Force Research Laboratory 2014. No website
  • L. D. VanGundy. “An Analysis of Network Interface Card Promiscuous Mode Detection Methods in a Virtual Network”. 2014. Website
  • D. Drobny. “Creating Highly Specialized Fragmented File System Data Sets for Forensic Research”. 2014. Website
  • X. Yang, N. Sang, and J. Alves-Foss. “Shortening the Boot Time of Android OS”. IEEE 2014. 10.1109/MC.2013.264
  • S. Zakeri. “Modified SPARC Instruction Simulator (SIS) to Support Experimental Tagging”. 2014. Website
  • J. Son and J. Alves-Foss. “Security/Performance Tradeoffs in Hybrid Real-Time Scheduling Algorithms”. Pacific Journal of Business Research 2014.
  • T. R. Rice. “The Development of a Cross-Disciplinary Approach in Industrial Control System Cyber Forensics”. 2014. Website
  • M. Rounds. “Defining Attacker Behavior Patterns in the Context of an Information System”. May 2014. 10.13140/2.1.3234.8485

  • J. Alves-Foss and P. Oman. “The Known Unknowns”. IEEE September/October 2013. 10.1109/MSP.2013.125
  • J. Song* and J. Alves-Foss. “Security Tagging for a Zero-Kernel Operating System”. HICSS 2013. 10.1109/HICSS.2013.474
  • X. Yang* and J. Alves-Foss. “Security Policy Refinement: High Level Specification to Low-Level Implementation”. PASSAT 2013. Website
  • L. Kerr* and J. Alves-Foss. “Maintaining Confidentiality in the Multilevel XM”. Issues in Information Systems 14:1 (224-233) 2013. Website
  • J. Song* and J. Alves-Foss. “Hardware Security Tags for Enhanced Operating System Security”. Issues in Information Systems 14:1 (61-71) 2013. Website
  • K. Krause and J. Alves-Foss. “On Designing an ACL2-Based C Integer Type Safety Checking Tool”. NASA Formal Methods 2013. 10.1007/978-3-642-38088-4_36

  • M. Rounds, N. Pendegraft, and J. Alves-Foss. “An Experimental Study to Explore Attacker Response to Changes in Security and Reward”. IEEE 2012. 10.1109/HICSS.2013.84
  • J. Song* and J. Alves-Foss. “Performance Review of Zero Copy Techniques”. IJCSS 6:4 2012. No website
  • B. Lundeen and J. Alves-Foss. “Practical Clickjacking with BeEF”. IEEE 2012. 10.1109/THS.2012.6459919

  • D. Wnuk and J. Alves-Foss. “Securing Database as a Service Review and Summary”. 2011. No website
  • T. Vollmer*, M. Manic, and J. Alves-Foss. “Autonomous Rule Creation for Intrusion Detection”. IEEE Symposium on Computational Intelligence in Cyber Security 2011. 10.1109/CICYBS.2011.5949394
  • X. He and J. Alves-Foss. “A Lightweight Virtual Machine Monitor for Security Analysis on Intel64 Architecture”. Consortium for Computing Sciences in Colleges 2011. No website
  • R. Bradetich, P. Oman, J. Alves-Foss, and T. Rice. “Evaluating Multicore Architectures for Application in High Assurance Systems”. 2011. Web
  • J. Alves-Foss, X. He, and J. Song. “Layered Assurance Scheme for Multi-Core Architectures”. 2011. Website

  • J. Smith*, X. He*, and J. Alves-Foss. “A Security Review of the Cell Broadband Engine Processor”. HICCS 2010. 10.1109/HICSS.2010.31
  • J. Conrad*, J. Alves-Foss, and S. Lee. “Analyzing uncertainty in TG protection graphs with TG/MC”. Journal of Computer Security 2010. Website
  • D. Manz*, J. Alves-Foss, and P. Oman “A Framework for Group Key Management Protocol Assessment Independent of View Synchrony”, Journal of Computer Sciences, 6(30):229-234, March 2010. No website
  • P. Oman, R. Bradetich, J. Alves-Foss, and J. Smith. “Towards Resilient Multicore Architectures for Real-time Controls”. IRCS August 2010. 10.1109/ISRCS.2010.5603488
  • J. Alves-Foss and W. Vanfleet. “Just in Time Assurance”. UI 2010. No website
  • M. Wilder, R. Rinker, J. Alves-Foss. “Automated Preemptive Hardware Isolation of High-Risk Computing Applications”. 2010. Website

  • C. Hinds* and J. Alves-Foss. “Efficient Detection of Compromised Nodes in a Wireless Sensor Network”. In International Conference on Sensor Networks and Applications, November 2009. 10.1145/1639809.1639908
  • J. Son* and J. Alves-Foss. “A formal framework for real-time information flow analysis, Computers & Security”. 28(6):421-432, 2009. 10.1016/j.cose.2009.01.005
  • J. Alves-Foss and P. Oman. “Network Authentication Protocol Studies”. Defense Advanced Research Projects Agency 2009. No website

  • P. Cravens and P. Oman. “Modeling the NAJPTC Network Using NS-2”. International Journal of Critical Infrastructure Protection, Vo. 1(4), 2008. 10.1016/j.ijcip.2008.08.002
  • P. Cravens and P. Oman. “Modeling ATCS Networks Using NS-2”. Critical Infrastructure Protection II, (M. Papa & S. Shenoi, eds.) March 2008.
  • L. A. Wahsheh, D. Conte de Leon, and J. Alves-Foss. “Formal Verification and Visualization of Security Policies”. Journal of Computers, 3(6):22-31, 2008. 10.4304/jcp.3.6.22-31
  • L. A. Wahsheh and J. Alves-Foss. “Security Policy Development: Towards a Life-Cycle and Logic-Based Verification Model”. American Journal of Applied Sciences, 5(9): 1117-1126, 2008. 10.3844/ajassp.2008.1117.1126
  • H. Wei, J. Alves-Foss. T. Soule, H. Pforsich, D. Zhang, and D. Frincke. “A Layered Decision Model for the Design of Cost-Effective Network Defense”. International Journal of Information and Computer Security, 2(3):297-324, 2008. 10.1109/IRI-05.2005.1506524
  • J. Zhou and J. Alves-Foss. “Security Policy Refinement and Enforcement in Secure Computer Systems Design”. Journal of Computer Security, 16(2):107-131, 2008. 10.3233/JCS-2008-16202
  • C. Masuck, J. Alves-Foss, and P. Oman. “Analysis of Fault Models for Student Use”. SIGCSE Bulletin, 40(2):79-83, 2008. 10.1145/1383602.1383640
  • R. Bradetich and P. Oman. “Connecting SCADA Systems to Corporate IT Networks Using Security-Enhanced Linux”. Western Power Delivery Automation Conference 2008. No website
  • D. Manz*, J. Alves-Foss, and S. Zheng*. “Network Simulation of Group Key Management Protocols”. Journal of Information Assurance and Security 1 (67-79) 2008. Website

  • J. Robinson and J. Alves-Foss. “A High Assurance MLS File Server”. 2007. 10.1145/1228291.1228303
  • D. Conte de Leon*, J. Alves-Foss, and P. Oman. “Implementation-Oriented Secure Architectures”. HICCS 2007. 10.1109/HICSS.2007.264
  • J. Robinson*, W. Harrison*, N. Hanebutte*, P. Oman, and J. Alves-Foss. “Implementing Middleware for Content Filtering and Information Flow Control”. 2007.  10.1145/1314466.1314474
  • L. Wahsheh* and J. Alves-Foss. “Policy-Based Security for Wireless Components in High Assurance Computer Systems”. Journal of Computer Science 3:9 (726-735) 2007. 10.3844/jcssp.2007.726.735
  • H. Wei*, J. Alves-Foss, D. Zhang, and D. Frincke. “Rationality Validation of a Layered Decision Model for Network Defense”. 2007. 10.1109/IRI.2007.4296602
  • L. Wahsheh and J. Alves-Foss. “Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture”. IEEE International Conference (182-187) 2006. 10.1109/IRI.2007.4296618

  • D. Yu. “A Novel Alert Correlation and Confidence Fusion Framework in Intrusion Detection Systems”. 2006. Website
  • S. Zheng*, J. Alves-Foss, and S. Lee. “The Effect of Rebalancing on the Performance of a Group Key Agreement Protocol”. IEEE LCN Workshop on Network Security, November 2006. 10.1109/LCN.2006.322212
  • D. Conte de Leon* and J. Alves-Foss. “Hidden Implementation Dependencies in High Assurance and Critical Computing Systems”. IEEE Transactions on Software Engineering, 32(10):790-811, October 2006. 10.1109/TSE.2006.103
  • J. Zhou* and J. Alves-Foss. “Architecture-Based Refinements for Secure Computer Systems Design”. Proc. Policy, Security and Trust, November 2006. 10.1145/1501434.1501453
  • B. Wang* and J. Alves-Foss. “An MSLS-EMM for Enforcing Confidentiality in Malicious Environments”. IASTED International Conf. on Communication, Network and Information Security (CNIS 2006), October 2006. Website
  • J. Son* and J. Alves-Foss. “Covert Timing Channel Capacity of Rate Monotonic Real-Time Scheduling Algorithm in MLS Systems”. IASTED International Conf. on Communication, Network and Information Security (CNIS 2006), October 2006. 10.1109/IAW.2006.1652117
  • H. Wei* and J. Alves-Foss. “Applying a Layered Decision Model to the Design of Language-Based Security Systems”. To appear in Proc. IEEE International Conference on Information Reuse and Integration, September 2006. 10.1109/IRI.2006.252410
  • L. Wahsheh and J. Alves-Foss. “Specifying and Enforcing a Multi-Policy Paradigm for High Assurance Embedded Systems”. Journal of High Speed Networks, October 2006. Website
  • J. Son* and J. Alves-Foss. “Covert Timing Channel Analysis of Rate Monotonic Real-Time Scheduling Algorithm in MLS Systems”. In Proc. IEEE Information Assurance Workshop, June 2006. 10.1109/IAW.2006.1652117
  • C. Taylor, J. Alves-Foss and V. Freeman. “An Academic Perspective on the CNSS Standards: A Survey”. In Proc. 10th Colloquium for Information Systems Security Education, June 2006. No website
  • S. Zheng*, D. Manz* and J. Alves-Foss. “A Communication-Computation Efficient Group Key Algorithm for Large and Dynamic Groups”. Journal of Computer Networks, 51(1):69-93, 2007. 10.1016/j.comnet.2006.03.008
  • S. Zheng*, D. Manz*, J. Alves-Foss, and Y. Chen. “Security and Performance of Group Key Agreement Protocols”. In Proc. IASTED Networks and Communication Systems, March 2006. Website
  • B. Rossebo*, P. Oman, J. Alves-Foss, R. Blue*, and P. Jaszkowiak*. “Using Spark-Ada to Model and Verify a MILS Message Router”. In Proc. International Symposium on Secure Software Engineering, March 2006. No website
  • W. S. Harrison, N. Hanebutte, and J. Alves-Foss. “Programming Education in the Era of the Internet: A Paradigm Shift”. 2006. 10.1109/HICSS.2006.395

  • J. Graham* and J. Alves-Foss. “Efficient Allocations in Distributed Object Oriented Databases with Capacity and Security Restraints”. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2007. Website
  • J. Alves-Foss, W. S. Harrison, P. Oman, and C. Taylor. “The MILS Architecture for High Assurance Embedded Systems”. International Journal of Embedded Systems, 2005. 10.1504/IJES.2006.014859
  • S. Zheng*, J. Alves-Foss, and S. Lee. “Performance of Group Key Agreement Protocols over Multiple Operations”. In Proc. IASTED Parallel and Distributed Computing and Systems (PDCS 2005), November 2005. Website
  • S. Zheng*, J. Alves-Foss, and S. Lee. “Exploring Average Performance of Group Key Management Algorithms over Multiple Operations” In Proc. IASTED International Conference on Communications, Internet and Information Technology (CIIT 2005), October 2005. Website
  • W. S. Harrison, N. Hanebutte, P. Oman and J. Alves-Foss. “The MILS Architecture for a Secure Global Information Grid”. Crosstalk: The Journal of Defense Software Engineering, 18(10):20-24, October 2005. Website
  • N. Hanebutte, O. Oman, P. M. Loosbrock*, A. Holland*, W. S. Harrison, and J. Alves-Foss. “Software Mediators for Transparent Channel Control in Unbounded Environments”. In Proc. IEEE Information Assurance Workshop, June 2005, pp. 201-206. 10.1109/IAW.2005.1495953
  • C. Taylor and J. Alves-Foss. “The Need for Information Assurance Curriculum Standards”. In Proc. Ninth Colloquium for Information Systems Security Education, June 2005, pp. 67-74. No website
  • J. Alves-Foss. “Implementing Secure Applications Using the MILS High Assurance Architecture”. In Proc. Software Technology Conference, April 2005.
  • H. Wei, D. Frincke, J. Alves-Foss, T. Soule, and H. Pforsich. “A Layered Decision Model for Cost-Effective Network Defense”. IEEE 2005. 10.1109/IRI-05.2005.1506524
  • C. Taylor* and J. Alves-Foss. “Diversity as a Computer Defense Mechanism: A Panel”. NSPW 2005. 10.1145/1146269.1146275

  • J. Alves-Foss and C. Taylor. “An Analysis of the GWV Security Policy”. In Proc. ACL2 Workshop, November 2004. Website
  • T. Song*, C. Ko, J. Alves-Foss, and K. Levitt. “Formal Reasoning about Intrusion Detection Systems”. In Proc. RAID, September 2004, pp. 278-295. 10.1007/978-3-540-30143-1_15
  • P. Oman, A. Krings, D. Conte de Leon*, and J. Alves-Foss. “Analyzing the Security and Survivability of Real-Time Control Systems”. In IEEE Systems, Man and Cybernetics Information Assurance Workshop, June 2004, pp. 342-349. 10.1109/IAW.2004.1437837
  • J. Alves-Foss, C. Taylor*, and P. Oman. “A Multi-layered Approach to Security in High Assurance Systems”. In Proc. Hawaii International Conference on System Sciences, January 2004. 10.1109/HICSS.2004.1265709
  • D. Conte de Leon* and J. Alves-Foss. “Experiments on Processing and Linking Semantically Augmented Requirement Specifications”. In Proc. Hawai'i International Conference on System Sciences, January 2004. 10.1109/HICSS.2004.1265657
  • H. Lee*, J. Alves-Foss, and W. S. Harrison. “The Use of Encrypted Functions for Mobile Agent Security”. In Proc. Hawai'i International Conference on System Sciences, January 2004. 10.1109/HICSS.2004.1265700
  • H. Lee*, J. Alves-Foss, and W. S. Harrison. “Securing Mobile Agents Through Evaluation of Encrypted Functions”. Web Intelligence and Agent Systems, Vol. 2(1):1-19, 2004. 10.1.1.79.4664
  • S. Malladi. “Formal Analysis and Verification of Password Protocols”. 2004. Website
  • C. Taylor. “Techniques for the Survivability of Critical Computer Systems”. 2004. Website
  • H. Lee, J. Alves-Foss, and S. Harrison. “The Construction of Secure Mobile Agents Via Evaluating Encrypted Functions”. 2004. Website

  • J. Graham* and J. Alves-Foss. “Efficient Allocation in a Distributed Object Oriented Databases”. Proc. International Conference on Parallel and Distributed Computing Systems (PDCS 2003), Las Vegas, August 2003. 10.1080/1206212X.2006.11441786
  • T. Song*, J. Alves-Foss, C. Ko, C. Zhang, and K. Levitt. “Using ACL2 to Verify Security Properties of Specification-based Intrusion”. In Proc. ACL2 Workshop 2003, Boulder, July 2003. Website
  • Sreekanth Malladi* and J. Alves-Foss. “How to Prevent Type-Flaw Guessing Attacks on Password Protocols”. Proc. Foundations of Computer Security, Ottawa, June 2003.
  • J. Dai* and J. Alves-Foss. “A Formal Authorization Policy Model”. Proc. Software Engineering Research & Applications (SERA '03), June 2003. Website
  • R. Corin*, S. Malladi*, J. Alves-Foss and S. Etalle. “Guess What? Here Is a New Tool that Finds Some New Guessing Attacks”. In Proc. Workshop on Issues in the Theory of Security (WITS '03), Warsaw, March 2003. Website
  • C. Taylor* and J. Alves-Foss. “Attack Recognition for System Survivability: A Low-Level Approach”. Proc. of the Thirty Sixth Annual Hawaii International Conference on System Sciences (CD/ROM), Computer Society Press, 2003. 10.1109/HICSS.2003.1174912

  • C. Taylor*, A. Krings, and J. Alves-Foss. “Risk Analysis and Probabilistic Survivability Assessment (RAPSA): An Assessment Approach for Power Substation Hardening”. Proc. of SACT, November 2002. No website
  • D. Conte de Leon, J. Alves-Foss, A. Krings, and P. Oman. “Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack”. Proc. of SACT, November 2002. Website
  • C. Taylor and J. Alves-Foss. “An Empirical Analysis of NATE: Network Analysis of Anomalous Traffic Events”. New Security Paradigms Workshop, September 2002. 10.1145/844102.844106
  • J. Dai and J. Alves-Foss. “Logic Based Authorization Policy Engineering”. Proc. 6th World Multi-conference on Systemics, Cybernetics, and Informatics, July 2002, pp. 230-238. Website
  • S. Malladi, J. Alves-Foss, and Sreenivas Malladi. “What Are Guessing Attacks and How to Prevent Them?” Proc. Seventh International Workshop on Enterprise Security, June 2002. (Best Paper Award) 10.1109/ENABL.2002.1029992
  • S. Malladi, J. Alves-Foss, and R. Heckendorn. “On Preventing Replay Attacks on Security Protocols”. Proc. International Conference on Security and Management, June 2002, pp. 77-83. Website
  • S. Malladi and J. Alves-Foss. “Preventing Guessing Attacks Using Fingerprint Biometrics”. Proc. International Conference on Security and Management, June 2002, pp. 215-221. Website
  • C. Taylor, J. Alves-Foss, and B. Rinker. “Merging Safety and Assurance: The Process of Dual Certification for Software”. Proc. Software Technology Conference, April 2002. Website
  • J. Alves-Foss, Bob Rinker, and C. Taylor. “Towards Common Criteria Certification for DO-178B Compliant Airborne Software Systems”. January 2002. Website
  • J. Alves-Foss, D. Conte de Leon, and P. Oman. “Experiments in the Use of XML to Enhance Traceability Between Object-Oriented Design Specifications and Source Code”. Proc. 35th Annual Hawaii International Conference on System Sciences, January 2002, pp. 3592-3599. 10.1109/HICSS.2002.994466
  • J. Alves-Foss, B. Rinker, M. Benke*, J. Marshall*, P. O’Connell*, and C. Taylor*. “Formal Modelling of Security Policies for Multi-Partition Systems”. 2002. Website
  • J. Alves-Foss, B. Rinker, M. Benke*, J. Marshall*, P. O’Connell*, and C. Taylor*. “The Idaho Partitioning Machine: An ACL2 Model”. November 2002. Website
  • A. Al-Muhaitheef. “The Firewall Mobile Custom Agent - A Distributed Firewall Architecture”. 2002. Website

  • J. Dai and J. Alves-Foss. “Certificate Based Authorization Simulation System”. Proc. Computer Software and Applications Conference 2001. October 2001, pp. 190-195. 10.1109/CMPSAC.2001.960616
  • C. Taylor and J. Alves-Foss. “NATE - Network Analysis of Anomalous Traffic Events, A Low-Cost Approach”. Proc. New Security Paradigms Workshop. September 2001, pp 89-96. 10.1145/508171.508186
  • M. R. Holmes and J. Alves-Foss. “The Watson Theorem Prover”. Journal of Automated Reasoning, Vol 26(4), May 2001, pp. 357-408. 10.1023/A:1010652212067
  • B. Rylander, T. Soule, J. Foster, J. Alves-Foss. “Quantum Evolutionary Programming”. 2001. Website

  • J. Alves-Foss. “An Efficient Secure Group Key Exchange Algorithm for Large and Dynamic Groups”. Proc. 23rd National Information Systems Security Conference, October 2000. Website
  • J. Alves-Foss. “Cryptographic Protocol Engineering: Building Security from the Group Up”. In Proc. International Conference on Internet Computing 2000, June 2000, pp. 371-377. Website
  • C. Taylor* and J. Alves-Foss. “Low-Cost Network Intrusion Detection”. 2000. No website
  • B. Rylander, T. Soule, J. Foster, and J. Alves-Foss. “Quantum Genetic Algorithms”. 2000. Website

  • J. Alves-Foss. “Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case”. Proc. 22nd National Information Systems Security Conference, October 1999. Website
  • A. E. K. Sobel and J. Alves-Foss. “A Trace-Based Model of the Chinese Wall Security Policy”. Proc. 22nd National Information Systems Security Conference, October 1999. Website
  • J. Alves-Foss and D. Frincke. “Formal Grammar for Java”. In J. Alves-Foss (ed) Formal Syntax and Semantics of Java, LNCS #1523 pp. 1-40, June 1999. Website
  • J. Alves-Foss and F.S. Lam. “Dynamic Denotational Semantics of Java”. In J. Alves-Foss (ed) Formal Syntax and Semantics of Java. LNCS #1523 pp. 201-240, June 1999. Website
  • J. Alves-Foss, G. Goos, J. Hartmanis, and J. van Leeuwen. “Formal Syntax and Semantics of Java – Lecture Notes in Computer Science 1523- 1999”. 1999. Website

  • J. Alves-Foss. “Multi-Protocol Attacks and the Public-Key Infrastructure”. Proc. 21st National Information Systems Security Conference, October 1998, pp. 566-576. Website
  • J. Alves-Foss. “Security Implications of Quantum Technologies”. Proc. 21st National Information Systems Security Conference, October 1998, pp. 196-202. Website
  • J. Alves-Foss. “The Architecture of Secure Systems”. Proc. 31st Annual Hawaii International Conference on System Sciences, January 1998, pp 307-316. 10.1109/HICSS.1998.656293

  • J. Alves-Foss, D. Frincke, and G. Saghi. “Applying the TCSEC Guidelines to a Real-Time Embedded System Environment”. 1997. Website
  • J Alves-Foss. “The Use of Belief Logics in the Presence of Causal Consistency and Attacks”. 1997. Website
  • Munna and J. Alves-Foss. “A Methodology for Mechanically Verifying Protocols Using an Authentication Logic”. 1997. Website
  • J. Alves-Foss and T. Soule. “A Weakest Precondition Calculus for Analysis of Cryptographic Protocols”. 1997. Website

  • J. Alves-Foss. “Specifying Trusted Distributed System Components”. 1996. Website

  • J. Alves-Foss. “An Overview of SNIF: A Tool for Surveying Network Information Flow”. 1995. 10.1109/NDSS.1995.390642
  • J Alves-Foss and S. Barbosa. “Assessing Computer Security Vulnerability”. 1995. 10.1145/206826.206829

  • J. Alves-Foss. “Modelling Non-Deterministic Systems in HOL”. 1992. Website
  • M. Archer, G. Fisher, K. Levitt, R. Olsson, J. Alves-Foss, J. Buffenbarger, G. Fink, D. Frincke, D. Huang, and P. Windley. “Specification and Verification of Secure Concurrent and Distributed Software Systems”. 1992. Website

  • J. Alves-Foss and K. Levitt. “Mechanical Verification of Secure Distributed Systems in Higher Order Logic”. 1991. Website
  • J. Alves-Foss and K. Levitt. “The Verification of Secure Distributed Systems”. 1991. 10.1109/CMPCON.1991.128803
  • J. Alves-Foss and K. Levitt. “Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components”. 1991. 10.1109/RISP.1991.130781
  • J. Alves-Foss. “Verifying System Components with Memory”. November 1991. Website

Location

Center for Secure and Dependable Systems

Mailing Address:
875 Perimeter Drive MS 1008
Moscow, ID 83844-1008

Phone: 208-885-4114

Fax: 208-885-9052

Email: csds@uidaho.edu