Jeremy L. Jacob
Affiliations:- University of York, UK
According to our database1,
Jeremy L. Jacob
authored at least 48 papers
between 1988 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2021
Proceedings of the Formal Methods: Foundations and Applications - 24th Brazilian Symposium, 2021
2016
Providing Extensibility to Threat Modelling in Cloud-COVER's Underlying Analysis Model.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
2015
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015
2014
Formal Aspects Comput., 2014
Extending Hypervisor Architecture to Allow One Way Data Transfers from VMs to Hypervisors.
Proceedings of the CLOSER 2014, 2014
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2014
2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
2011
Proceedings of the FM 2011: Formal Methods, 2011
2010
Defending the weakest link: phishing websites detection by analysing user behaviours.
Telecommun. Syst., 2010
Proceedings of the Unifying Theories of Programming - Third International Symposium, 2010
Proceedings of the Unifying Theories of Programming - Third International Symposium, 2010
2008
Formal Aspects Comput., 2008
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
2007
2006
Proceedings of the Genetic and Evolutionary Computation Conference, 2006
2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
2004
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004
Comput. Intell., 2004
Proceedings of the IEEE Congress on Evolutionary Computation, 2004
2003
Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It.
Proceedings of the Genetic and Evolutionary Computation, 2003
2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
2001
Inf. Softw. Technol., 2001
The role-based access control system of a European bank: a case study and discussion.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Proceedings of the Advances in Network and Distributed Systems Security, 2001
2000
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the Coordination Languages and Models, 4th International Conference, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1998
1995
J. Comput. Secur., 1995
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
1992
A Model of Reconfiguration in Communicating Sequential Processes with a Notion of Transactions.
Inf. Process. Lett., 1992
1991
IEEE Trans. Software Eng., 1991
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
1990
Inf. Process. Lett., 1990
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990
1989
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989
1988
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988
A Security Framework.
Proceedings of the First IEEE Computer Security Foundations Workshop, 1988