University of Idaho - I Banner
students walk on University of Idaho campus

Visit U of I

Learn about the many reasons the University of Idaho could be a perfect fit for you. Schedule Your Visit

Parents on campus during orientation

Homecoming Oct. 14 - 21

Join other Vandal families for a week of celebration and Vandal traditions. View Calendar

campus full of students

U of I Retirees Association

UIRA has a membership of nearly 500 from every part of the University. Learn about UIRA

Students participate in the TRX wellness class at the Student Recreation Center

Campus Recreation

Gym memberships and wellness class passes are available for faculty, staff and their spouses. Get Healthy

Location

Center for Secure and Dependable Systems

Mailing Address:
111 Perimeter Drive MS 1008
Moscow, ID 11111-1008

Phone: 111-111-4114

Fax: 111-111-9052

Email: [email protected]

Publications

  • J. Alves-Foss and J. Song. “The DARPA Cyber Grand Challenge: A Competitors Perspective, Part 2”. IEEE Security and Privacy, January/February 2016.
  • L. Kerr and J. Alves-Foss. “Combining Mandatory and Attribute-based Access Control”. 49th Hawaii International Conference on System Sciences 2016.
  • J. Guild. “An Assessment Methodology, Models for Cyber Systems”. 2016. In process.
  • A. Jillepalli and D. Conte de Leon. “An Architecture for a Policy-Oriented Web Browser Management System: HiFiPol: Browser”. Proceedings of STPSA Workshop, IEEE COMPSAC 2016. To be published April 7th.
  • A. Jillepalli and D. Conte de Leon. “HERMES: A High-Level Policy Language for High-Granularity Enterprise-wide Secure Browser Configuration Management”, Information Security, Privacy and Policy mini-track at HICSS 2017.
  • A. Jillepalli and D. Conte de Leon. “Detection and Prevention of PCO Threats Through Cross-Layer, Serial Module Architecture”. Cybersecurity Symposium: Your Security, Your Future 2016: Edited Proceedings Volume.
  • A. Jillepalli. “A Policy-Oriented Web Browser Management System: HiFiPol: Browser”. Masters’ Thesis, University of Idaho, Moscow.

  • L. Kerr. “UI Tags: Confidentiality in Office Open XML”. Cyber Security 2015.
  • J. Alves-Foss, J. Song, A. S. Amack, L. Kerr, and S. Steiner. “Evaluating the Use of Security Tags in Security Policy Enforcement Mechanisms”. 48th Hawaii International Conference on System Sciences 2015.
  • J. Song and J. Alves-Foss. “Expanding RTEMS to a Multiuser System by Using Security Tags”. Cyber Security 2015.
  • K. Haltinner, D. Sarathchandra, and N. Lichtenberg. “Can I Live? College Student Perceptions of Risks, Security, and Privacy in Online Spaces”. Cyber Security 2015.
  • K. Chang, K. Haltinner, and R. Scott. “How the Secure Use of Technology Could Influence Travel to and from School for Elementary School-Aged Children”. Cyber Security 2015.

  • J. Alves-Foss, J. Song, S. Steiner, and S. Zakeri. “A New Operating System for Security Tagged Architecture Hardware in Support of Multiple Independent Levels of Security”. Air Force Research Laboratory 2014.
  • L. D. VanGundy. “An Analysis of Network Interface Card Promiscuous Mode Detection Methods in a Virtual Network”. 2014.
  • D. Drobny. “Creating Highly Specialized Fragmented File System Data Sets for Forensic Research”. 2014.
  • X. Yang, N. Sang, and J. Alves-Foss. “Shortening the Boot Time of Android OS”. IEEE 2014.
  • S. Zakeri. “Modified SPARC Instruction Simulator (SIS) to Support Experimental Tagging”. 2014.
  • J. Son and J. Alves-Foss. “Security/Performance Tradeoffs in Hybrid Real-Time Scheduling Algorithms”. Pacific Journal of Business Research 2014.
  • T. R. Rice. “The Development of a Cross-Disciplinary Approach in Industrial Control System Cyber Forensics”. 2014.
  • M. Rounds. “Defining Attacker Behavior Patterns in the Context of an Information System”. May 2014.

  • J. Alves-Foss and P. Oman. “The Known Unknowns”. IEEE September/October 2013.
  • J. Song* and J. Alves-Foss. “Security Tagging for a Zero-Kernel Operating System”. HICSS 2013.
  • X. Yang* and J. Alves-Foss. “Security Policy Refinement: High Level Specification to Low-Level Implementation”. PASSAT 2013.
  • L. Kerr* and J. Alves-Foss. “Maintaining Confidentiality in the Multilevel XM”. Issues in Information Systems 14:1 (224-233) 2013.
  • J. Song* and J. Alves-Foss. “Hardware Security Tags for Enhanced Operating System Security”. Issues in Information Systems 14:1 (61-71) 2013.
  • K. Krause and J. Alves-Foss. “On Designing an ACL2-Based C Integer Type Safety Checking Tool”. NASA Formal Methods 2013.

  • M. Rounds, N. Pendegraft, and J. Alves-Foss. “An Experimental Study to Explore Attacker Response to Changes in Security and Reward”. IEEE 2012.
  • J. Song* and J. Alves-Foss. “Performance Review of Zero Copy Techniques”. IJCSS 6:4 2012. No website
  • B. Lundeen and J. Alves-Foss. “Practical Clickjacking with BeEF”. IEEE 2012.

  • D. Wnuk and J. Alves-Foss. “Securing Database as a Service Review and Summary”. 2011. No website
  • T. Vollmer*, M. Manic, and J. Alves-Foss. “Autonomous Rule Creation for Intrusion Detection”. IEEE Symposium on Computational Intelligence in Cyber Security 2011.
  • X. He and J. Alves-Foss. “A Lightweight Virtual Machine Monitor for Security Analysis on Intel64 Architecture”. Consortium for Computing Sciences in Colleges 2011.
  • R. Bradetich, P. Oman, J. Alves-Foss, and T. Rice. “Evaluating Multicore Architectures for Application in High Assurance Systems”. 2011. Web
  • J. Alves-Foss, X. He, and J. Song. “Layered Assurance Scheme for Multi-Core Architectures”. 2011.

  • J. Smith*, X. He*, and J. Alves-Foss. “A Security Review of the Cell Broadband Engine Processor”. HICCS 2010.
  • J. Conrad*, J. Alves-Foss, and S. Lee. “Analyzing uncertainty in TG protection graphs with TG/MC”. Journal of Computer Security 2010.
  • D. Manz*, J. Alves-Foss, and P. Oman “A Framework for Group Key Management Protocol Assessment Independent of View Synchrony”, Journal of Computer Sciences, 6(30):229-234, March 2010. No website
  • P. Oman, R. Bradetich, J. Alves-Foss, and J. Smith. “Towards Resilient Multicore Architectures for Real-time Controls”. IRCS August 2010.
  • J. Alves-Foss and W. Vanfleet. “Just in Time Assurance”. UI 2010. No website
  • M. Wilder, R. Rinker, J. Alves-Foss. “Automated Preemptive Hardware Isolation of High-Risk Computing Applications”. 2010.

  • C. Hinds* and J. Alves-Foss. “Efficient Detection of Compromised Nodes in a Wireless Sensor Network”. In International Conference on Sensor Networks and Applications, November 2009.
  • J. Son* and J. Alves-Foss. “A formal framework for real-time information flow analysis, Computers & Security”. 28(6):421-432, 2009.
  • J. Alves-Foss and P. Oman. “Network Authentication Protocol Studies”. Defense Advanced Research Projects Agency 2009. No website

  • P. Cravens and P. Oman. “Modeling the NAJPTC Network Using NS-2”. International Journal of Critical Infrastructure Protection, Vo. 1(4), 2008.
  • P. Cravens and P. Oman. “Modeling ATCS Networks Using NS-2”. Critical Infrastructure Protection II, (M. Papa & S. Shenoi, eds.) March 2008.
  • L. A. Wahsheh, D. Conte de Leon, and J. Alves-Foss. “Formal Verification and Visualization of Security Policies”. Journal of Computers, 3(6):22-31, 2008.
  • L. A. Wahsheh and J. Alves-Foss. “Security Policy Development: Towards a Life-Cycle and Logic-Based Verification Model”. American Journal of Applied Sciences, 5(9): 1117-1126, 2008.
  • H. Wei, J. Alves-Foss. T. Soule, H. Pforsich, D. Zhang, and D. Frincke. “A Layered Decision Model for the Design of Cost-Effective Network Defense”. International Journal of Information and Computer Security, 2(3):297-324, 2008.
  • J. Zhou and J. Alves-Foss. “Security Policy Refinement and Enforcement in Secure Computer Systems Design”. Journal of Computer Security, 16(2):107-131, 2008.
  • C. Masuck, J. Alves-Foss, and P. Oman. “Analysis of Fault Models for Student Use”. SIGCSE Bulletin, 40(2):79-83, 2008.
  • R. Bradetich and P. Oman. “Connecting SCADA Systems to Corporate IT Networks Using Security-Enhanced Linux”. Western Power Delivery Automation Conference 2008.
  • D. Manz*, J. Alves-Foss, and S. Zheng*. “Network Simulation of Group Key Management Protocols”. Journal of Information Assurance and Security 1 (67-79) 2008.

  • J. Robinson and J. Alves-Foss. “A High Assurance MLS File Server”. 2007.
  • D. Conte de Leon*, J. Alves-Foss, and P. Oman. “Implementation-Oriented Secure Architectures”. HICCS 2007.
  • J. Robinson*, W. Harrison*, N. Hanebutte*, P. Oman, and J. Alves-Foss. “Implementing Middleware for Content Filtering and Information Flow Control”. 2007.  
  • L. Wahsheh* and J. Alves-Foss. “Policy-Based Security for Wireless Components in High Assurance Computer Systems”. Journal of Computer Science 3:9 (726-735) 2007.
  • H. Wei*, J. Alves-Foss, D. Zhang, and D. Frincke. “Rationality Validation of a Layered Decision Model for Network Defense”. 2007.
  • L. Wahsheh and J. Alves-Foss. “Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture”. IEEE International Conference (182-187) 2006.

  • D. Yu. “A Novel Alert Correlation and Confidence Fusion Framework in Intrusion Detection Systems”. 2006.
  • S. Zheng*, J. Alves-Foss, and S. Lee. “The Effect of Rebalancing on the Performance of a Group Key Agreement Protocol”. IEEE LCN Workshop on Network Security, November 2006.
  • D. Conte de Leon* and J. Alves-Foss. “Hidden Implementation Dependencies in High Assurance and Critical Computing Systems”. IEEE Transactions on Software Engineering, 32(10):790-811, October 2006.
  • J. Zhou* and J. Alves-Foss. “Architecture-Based Refinements for Secure Computer Systems Design”. Proc. Policy, Security and Trust, November 2006.
  • B. Wang* and J. Alves-Foss. “An MSLS-EMM for Enforcing Confidentiality in Malicious Environments”. IASTED International Conf. on Communication, Network and Information Security (CNIS 2006), October 2006.
  • J. Son* and J. Alves-Foss. “Covert Timing Channel Capacity of Rate Monotonic Real-Time Scheduling Algorithm in MLS Systems”. IASTED International Conf. on Communication, Network and Information Security (CNIS 2006), October 2006.
  • H. Wei* and J. Alves-Foss. “Applying a Layered Decision Model to the Design of Language-Based Security Systems”. To appear in Proc. IEEE International Conference on Information Reuse and Integration, September 2006.
  • L. Wahsheh and J. Alves-Foss. “Specifying and Enforcing a Multi-Policy Paradigm for High Assurance Embedded Systems”. Journal of High Speed Networks, October 2006.
  • J. Son* and J. Alves-Foss. “Covert Timing Channel Analysis of Rate Monotonic Real-Time Scheduling Algorithm in MLS Systems”. In Proc. IEEE Information Assurance Workshop, June 2006.
  • C. Taylor, J. Alves-Foss and V. Freeman. “An Academic Perspective on the CNSS Standards: A Survey”. In Proc. 10th Colloquium for Information Systems Security Education, June 2006. No website
  • S. Zheng*, D. Manz* and J. Alves-Foss. “A Communication-Computation Efficient Group Key Algorithm for Large and Dynamic Groups”. Journal of Computer Networks, 51(1):69-93, 2007.
  • S. Zheng*, D. Manz*, J. Alves-Foss, and Y. Chen. “Security and Performance of Group Key Agreement Protocols”. In Proc. IASTED Networks and Communication Systems, March 2006.
  • B. Rossebo*, P. Oman, J. Alves-Foss, R. Blue*, and P. Jaszkowiak*. “Using Spark-Ada to Model and Verify a MILS Message Router”. In Proc. International Symposium on Secure Software Engineering, March 2006. No website
  • W. S. Harrison, N. Hanebutte, and J. Alves-Foss. “Programming Education in the Era of the Internet: A Paradigm Shift”. 2006.

  • J. Graham* and J. Alves-Foss. “Efficient Allocations in Distributed Object Oriented Databases with Capacity and Security Restraints”. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2007.
  • J. Alves-Foss, W. S. Harrison, P. Oman, and C. Taylor. “The MILS Architecture for High Assurance Embedded Systems”. International Journal of Embedded Systems, 2005.
  • S. Zheng*, J. Alves-Foss, and S. Lee. “Performance of Group Key Agreement Protocols over Multiple Operations”. In Proc. IASTED Parallel and Distributed Computing and Systems (PDCS 2005), November 2005.
  • S. Zheng*, J. Alves-Foss, and S. Lee. “Exploring Average Performance of Group Key Management Algorithms over Multiple Operations” In Proc. IASTED International Conference on Communications, Internet and Information Technology (CIIT 2005), October 2005.
  • W. S. Harrison, N. Hanebutte, P. Oman and J. Alves-Foss. “The MILS Architecture for a Secure Global Information Grid”. Crosstalk: The Journal of Defense Software Engineering, 18(10):20-24, October 2005.
  • N. Hanebutte, O. Oman, P. M. Loosbrock*, A. Holland*, W. S. Harrison, and J. Alves-Foss. “Software Mediators for Transparent Channel Control in Unbounded Environments”. In Proc. IEEE Information Assurance Workshop, June 2005, pp. 201-206.
  • C. Taylor and J. Alves-Foss. “The Need for Information Assurance Curriculum Standards”. In Proc. Ninth Colloquium for Information Systems Security Education, June 2005, pp. 67-74.
  • J. Alves-Foss. “Implementing Secure Applications Using the MILS High Assurance Architecture”. In Proc. Software Technology Conference, April 2005.
  • H. Wei, D. Frincke, J. Alves-Foss, T. Soule, and H. Pforsich. “A Layered Decision Model for Cost-Effective Network Defense”. IEEE 2005.
  • C. Taylor* and J. Alves-Foss. “Diversity as a Computer Defense Mechanism: A Panel”. NSPW 2005.

  • J. Alves-Foss and C. Taylor. “An Analysis of the GWV Security Policy”. In Proc. ACL2 Workshop, November 2004.
  • T. Song*, C. Ko, J. Alves-Foss, and K. Levitt. “Formal Reasoning about Intrusion Detection Systems”. In Proc. RAID, September 2004, pp. 278-295.
  • P. Oman, A. Krings, D. Conte de Leon*, and J. Alves-Foss. “Analyzing the Security and Survivability of Real-Time Control Systems”. In IEEE Systems, Man and Cybernetics Information Assurance Workshop, June 2004, pp. 342-349.
  • J. Alves-Foss, C. Taylor*, and P. Oman. “A Multi-layered Approach to Security in High Assurance Systems”. In Proc. Hawaii International Conference on System Sciences, January 2004.
  • D. Conte de Leon* and J. Alves-Foss. “Experiments on Processing and Linking Semantically Augmented Requirement Specifications”. In Proc. Hawai'i International Conference on System Sciences, January 2004.
  • H. Lee*, J. Alves-Foss, and W. S. Harrison. “The Use of Encrypted Functions for Mobile Agent Security”. In Proc. Hawai'i International Conference on System Sciences, January 2004.
  • H. Lee*, J. Alves-Foss, and W. S. Harrison. “Securing Mobile Agents Through Evaluation of Encrypted Functions”. Web Intelligence and Agent Systems, Vol. 2(1):1-19, 2004.
  • S. Malladi. “Formal Analysis and Verification of Password Protocols”. 2004.
  • C. Taylor. “Techniques for the Survivability of Critical Computer Systems”. 2004.
  • H. Lee, J. Alves-Foss, and S. Harrison. “The Construction of Secure Mobile Agents Via Evaluating Encrypted Functions”. 2004.

  • J. Graham* and J. Alves-Foss. “Efficient Allocation in a Distributed Object Oriented Databases”. Proc. International Conference on Parallel and Distributed Computing Systems (PDCS 2003), Las Vegas, August 2003.
  • T. Song*, J. Alves-Foss, C. Ko, C. Zhang, and K. Levitt. “Using ACL2 to Verify Security Properties of Specification-based Intrusion”. In Proc. ACL2 Workshop 2003, Boulder, July 2003.
  • Sreekanth Malladi* and J. Alves-Foss. “How to Prevent Type-Flaw Guessing Attacks on Password Protocols”. Proc. Foundations of Computer Security, Ottawa, June 2003.
  • J. Dai* and J. Alves-Foss. “A Formal Authorization Policy Model”. Proc. Software Engineering Research & Applications (SERA '03), June 2003.
  • R. Corin*, S. Malladi*, J. Alves-Foss and S. Etalle. “Guess What? Here Is a New Tool that Finds Some New Guessing Attacks”. In Proc. Workshop on Issues in the Theory of Security (WITS '03), Warsaw, March 2003.
  • C. Taylor* and J. Alves-Foss. “Attack Recognition for System Survivability: A Low-Level Approach”. Proc. of the Thirty Sixth Annual Hawaii International Conference on System Sciences (CD/ROM), Computer Society Press, 2003.

  • C. Taylor*, A. Krings, and J. Alves-Foss. “Risk Analysis and Probabilistic Survivability Assessment (RAPSA): An Assessment Approach for Power Substation Hardening”. Proc. of SACT, November 2002. No website
  • D. Conte de Leon, J. Alves-Foss, A. Krings, and P. Oman. “Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack”. Proc. of SACT, November 2002.
  • C. Taylor and J. Alves-Foss. “An Empirical Analysis of NATE: Network Analysis of Anomalous Traffic Events”. New Security Paradigms Workshop, September 2002.
  • J. Dai and J. Alves-Foss. “Logic Based Authorization Policy Engineering”. Proc. 6th World Multi-conference on Systemics, Cybernetics, and Informatics, July 2002, pp. 230-238.
  • S. Malladi, J. Alves-Foss, and Sreenivas Malladi. “What Are Guessing Attacks and How to Prevent Them?” Proc. Seventh International Workshop on Enterprise Security, June 2002. (Best Paper Award)
  • S. Malladi, J. Alves-Foss, and R. Heckendorn. “On Preventing Replay Attacks on Security Protocols”. Proc. International Conference on Security and Management, June 2002, pp. 77-83. Website
  • S. Malladi and J. Alves-Foss. “Preventing Guessing Attacks Using Fingerprint Biometrics”. Proc. International Conference on Security and Management, June 2002, pp. 215-221.
  • C. Taylor, J. Alves-Foss, and B. Rinker. “Merging Safety and Assurance: The Process of Dual Certification for Software”. Proc. Software Technology Conference, April 2002. Website
  • J. Alves-Foss, Bob Rinker, and C. Taylor. “Towards Common Criteria Certification for DO-178B Compliant Airborne Software Systems”. January 2002.
  • J. Alves-Foss, D. Conte de Leon, and P. Oman. “Experiments in the Use of XML to Enhance Traceability Between Object-Oriented Design Specifications and Source Code”. Proc. 35th Annual Hawaii International Conference on System Sciences, January 2002, pp. 3592-3599.
  • J. Alves-Foss, B. Rinker, M. Benke*, J. Marshall*, P. O’Connell*, and C. Taylor*. “Formal Modelling of Security Policies for Multi-Partition Systems”. 2002.
  • J. Alves-Foss, B. Rinker, M. Benke*, J. Marshall*, P. O’Connell*, and C. Taylor*. “The Idaho Partitioning Machine: An ACL2 Model”. November 2002.
  • A. Al-Muhaitheef. “The Firewall Mobile Custom Agent - A Distributed Firewall Architecture”. 2002.

  • J. Dai and J. Alves-Foss. “Certificate Based Authorization Simulation System”. Proc. Computer Software and Applications Conference 2001. October 2001, pp. 190-195.
  • C. Taylor and J. Alves-Foss. “NATE - Network Analysis of Anomalous Traffic Events, A Low-Cost Approach”. Proc. New Security Paradigms Workshop. September 2001, pp 89-96.
  • M. R. Holmes and J. Alves-Foss. “The Watson Theorem Prover”. Journal of Automated Reasoning, Vol 26(4), May 2001, pp. 357-408.
  • B. Rylander, T. Soule, J. Foster, J. Alves-Foss. “Quantum Evolutionary Programming”. 2001.

  • J. Alves-Foss. “An Efficient Secure Group Key Exchange Algorithm for Large and Dynamic Groups”. Proc. 23rd National Information Systems Security Conference, October 2000.
  • J. Alves-Foss. “Cryptographic Protocol Engineering: Building Security from the Group Up”. In Proc. International Conference on Internet Computing 2000, June 2000, pp. 371-377.
  • C. Taylor* and J. Alves-Foss. “Low-Cost Network Intrusion Detection”. 2000. No website
  • B. Rylander, T. Soule, J. Foster, and J. Alves-Foss. “Quantum Genetic Algorithms”. 2000.

  • J. Alves-Foss. “Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case”. Proc. 22nd National Information Systems Security Conference, October 1999.
  • A. E. K. Sobel and J. Alves-Foss. “A Trace-Based Model of the Chinese Wall Security Policy”. Proc. 22nd National Information Systems Security Conference, October 1999.
  • J. Alves-Foss and D. Frincke. “Formal Grammar for Java”. In J. Alves-Foss (ed) Formal Syntax and Semantics of Java, LNCS #1523 pp. 1-40, June 1999.
  • J. Alves-Foss and F.S. Lam. “Dynamic Denotational Semantics of Java”. In J. Alves-Foss (ed) Formal Syntax and Semantics of Java. LNCS #1523 pp. 201-240, June 1999.
  • J. Alves-Foss, G. Goos, J. Hartmanis, and J. van Leeuwen. “Formal Syntax and Semantics of Java – Lecture Notes in Computer Science 1523- 1999”. 1999.

  • J. Alves-Foss. “Multi-Protocol Attacks and the Public-Key Infrastructure”. Proc. 21st National Information Systems Security Conference, October 1998, pp. 566-576.
  • J. Alves-Foss. “Security Implications of Quantum Technologies”. Proc. 21st National Information Systems Security Conference, October 1998, pp. 196-202.
  • J. Alves-Foss. “The Architecture of Secure Systems”. Proc. 31st Annual Hawaii International Conference on System Sciences, January 1998, pp 307-316.

  • J. Alves-Foss, D. Frincke, and G. Saghi. “Applying the TCSEC Guidelines to a Real-Time Embedded System Environment”. 1997.
  • J Alves-Foss. “The Use of Belief Logics in the Presence of Causal Consistency and Attacks”. 1997.
  • Munna and J. Alves-Foss. “A Methodology for Mechanically Verifying Protocols Using an Authentication Logic”. 1997.
  • J. Alves-Foss and T. Soule. “A Weakest Precondition Calculus for Analysis of Cryptographic Protocols”. 1997.

  • J. Alves-Foss. “Specifying Trusted Distributed System Components”. 1996.

  • J. Alves-Foss. “An Overview of SNIF: A Tool for Surveying Network Information Flow”. 1995.
  • J Alves-Foss and S. Barbosa. “Assessing Computer Security Vulnerability”. 1995.

  • J. Alves-Foss. “Modelling Non-Deterministic Systems in HOL”. 1992.
  • M. Archer, G. Fisher, K. Levitt, R. Olsson, J. Alves-Foss, J. Buffenbarger, G. Fink, D. Frincke, D. Huang, and P. Windley. “Specification and Verification of Secure Concurrent and Distributed Software Systems”. 1992.

  • J. Alves-Foss and K. Levitt. “Mechanical Verification of Secure Distributed Systems in Higher Order Logic”. 1991.
  • J. Alves-Foss and K. Levitt. “The Verification of Secure Distributed Systems”. 1991.
  • J. Alves-Foss and K. Levitt. “Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components”. 1991.
  • J. Alves-Foss. “Verifying System Components with Memory”. November 1991.

Location

Center for Secure and Dependable Systems

Mailing Address:
111 Perimeter Drive MS 1008
Moscow, ID 11111-1008

Phone: 111-111-4114

Fax: 111-111-9052

Email: [email protected]

http://gefest-sv.kiev.ua

www.topobzor.info

У нашей фирмы классный блог , он рассказывает про Супер камагра http://pharmacy24.com.ua