Author: Jim Alves-Foss

Publications

Publication period start: 2007
Number of co-authors: 7

Co-authors

Number of publications with favourite co-authors
Scott Harrison
2
Daniel Conte de Leon
3
Paul W. Oman
3

Productive Colleagues

Most productive colleagues in number of publications
Nadine Hanebutte
3
Ann E. Kelley Sobel
7
Paul W. Oman
14

Publications

Alves-Foss, Jim (1998): The Architecture of Secure Systems. In: HICSS 1998 , 1998, . pp. 307-316. https://csdl.computer.org/comp/proceedings/hicss/1998/8239/03/82390307abs.htm

Alves-Foss, Jim, Sobel, Ann E. Kelley (1999): Formal Methods and Industry - Introduction. In: HICSS 1999 , 1999, . https://csdl.computer.org/comp/proceedings/hicss/1999/0001/03/00013048abs.htm

Alves-Foss, Jim, Leon, Daniel Conte de, Oman, Paul W. (2002): Experiments in the Use of XML to Enhance Traceability between Object-Oriented Design Speci. In: HICSS 2002 , 2002, . pp. 276. https://csdl.computer.org/comp/proceedings/hicss/2002/1435/09/14350276abs.htm

Alves-Foss, Jim, Taylor, Carol, Oman, Paul W. (2004): A Multi-Layered Approach to Security in High Assurance Systems. In: HICSS 2004 , 2004, . https://csdl.computer.org/comp/proceedings/hicss/2004/2056/09/205690302babs.htm

Harrison, Scott, Hanebutte, Nadine, Alves-Foss, Jim (2006): Programming Education in the Era of the Internet: A Paradigm Shift. In: HICSS 2006 - 39th Hawaii International International Conference on Systems Science 4-7 January, 2006, Kauai, HI, USA. https://doi.ieeecomputersociety.org/10.1109/HICSS.2006.395

Lee, Hyungjick, Alves-Foss, Jim, Harrison, Scott (2004): The Use of Encrypted Functions for Mobile Agent Security. In: HICSS 2004 , 2004, . https://csdl.computer.org/comp/proceedings/hicss/2004/2056/09/205690297babs.htm

Leon, Daniel Conte de, Alves-Foss, Jim (2004): Experiments on Processing and Linking Semantically Augmented Requirement Specifications. In: HICSS 2004 , 2004, . https://csdl.computer.org/comp/proceedings/hicss/2004/2056/09/205690279babs.htm

Taylor, Carol, Alves-Foss, Jim (2003): Attack Recognition for System Survivability: A Low-level Approach. In: HICSS 2003 , 2003, . pp. 335. https://csdl.computer.org/comp/proceedings/hicss/2003/1874/09/187490335cabs.htm

Leon, Daniel Conte de, Alves-Foss, Jim, Oman, Paul W. (2007): Implementation-Oriented Secure Architectures. In: HICSS 2007 - 40th Hawaii International International Conference on Systems Science 3-6 January, 2007, Waikoloa, Big Island, HI, USA. pp. 278. https://doi.ieeecomputersociety.org/10.1109/HICSS.2007.264

New to UX Design? We’re giving you a free ebook!

The Basics of User Experience Design

Download our free ebook The Basics of User Experience Design to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,375 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We’re Giving You a Free ebook!

The Basics of User Experience Design

Download our free ebook The Basics of User Experience Design to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,375 designers enjoy our newsletter—sure you don’t want to receive it?