Jeremy L. Jacob

Affiliations:
  • University of York, UK


According to our database1, Jeremy L. Jacob authored at least 48 papers between 1988 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Temporal Reasoning Through Automatic Translation of tock-CSP into Timed Automata.
Proceedings of the Formal Methods: Foundations and Applications - 24th Brazilian Symposium, 2021

2016
Providing Extensibility to Threat Modelling in Cloud-COVER's Underlying Analysis Model.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

2015
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

2014
On integrating confidentiality and functionality in a formal method.
Formal Aspects Comput., 2014

Extending Hypervisor Architecture to Allow One Way Data Transfers from VMs to Hypervisors.
Proceedings of the CLOSER 2014, 2014

Sealed Containers in Z.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2014

2013
A comparison of major issues for the development of forensics in cloud computing.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2011
Specifying Confidentiality in Circus.
Proceedings of the FM 2011: Formal Methods, 2011

2010
Defending the weakest link: phishing websites detection by analysing user behaviours.
Telecommun. Syst., 2010

Unifying Theories of Confidentiality.
Proceedings of the Unifying Theories of Programming - Third International Symposium, 2010

On Modelling User Observations in the UTP.
Proceedings of the Unifying Theories of Programming - Third International Symposium, 2010

Trace Specifications in Alloy.
Proceedings of the Abstract State Machines, 2010

2008
The certification of the Mondex electronic purse to ITSEC Level E6.
Formal Aspects Comput., 2008

User behaviour based phishing websites detection.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

Threat Modelling in User Performed Authentication.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Searching for resource-efficient programs: low-power pseudorandom number generators.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

2007
Coordination with multicapabilities.
Sci. Comput. Program., 2007

A CSP model of Eiffel's SCOOP.
Formal Aspects Comput., 2007

2006
Human competitive security protocols synthesis.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

2005
The Design of S-Boxes by Simulated Annealing.
New Gener. Comput., 2005

Specifying Information-Flow Controls.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

2004
Synthesising Efficient and Effective Security Protocols.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004

Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion.
Comput. Intell., 2004

Automated Design of Security Protocols.
Comput. Intell., 2004

Searching for cost functions.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

2003
Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It.
Proceedings of the Genetic and Evolutionary Computation, 2003

2002
Evolving Boolean Functions Satisfying Multiple Criteria.
Proceedings of the Progress in Cryptology, 2002

Fault Injection and a Timing Channel on an Analysis Technique.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

2001
Protocols are programs too: the meta-heuristic search for security protocols.
Inf. Softw. Technol., 2001

The role-based access control system of a European bank: a case study and discussion.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

Hazard Analysis for Security Protocol Requirements.
Proceedings of the Advances in Network and Distributed Systems Security, 2001

2000
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

A Principled Semantics for inp.
Proceedings of the Coordination Languages and Models, 4th International Conference, 2000

Two-Stage Optimisation in the Design of Boolean Functions.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1998
A practical language and toolkit for high-integrity tools.
J. Syst. Softw., 1998

1995
Specifying Security for Computer Supported Collaborative Working.
J. Comput. Secur., 1995

On the Security of Recent Protocols.
Inf. Process. Lett., 1995

Specifying security for CSCW systems.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

1992
Basic Theorems About Security.
J. Comput. Secur., 1992

A Model of Reconfiguration in Communicating Sequential Processes with a Notion of Transactions.
Inf. Process. Lett., 1992

1991
A Uniform Presentation of Confidentiality Properties.
IEEE Trans. Software Eng., 1991

The Basic Integrity Theorem.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
A Model of Reconfiguration in Communicating Sequential Processes.
Inf. Process. Lett., 1990

Separability and the Detection of Hidden Channels.
Inf. Process. Lett., 1990

Categorizing non-interference.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990

1989
On the Derivation of Secure Components.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

1988
Security specifications.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988

A Security Framework.
Proceedings of the First IEEE Computer Security Foundations Workshop, 1988


  Loading...