1997 |
5 | | James P. Anderson,
Sheila Brand,
Li Gong,
Thomas Haigh,
Steven B. Lipner,
Teresa F. Lunt,
Ruth Nelson,
William Neugent,
Hilarie K. Orman,
Marcus J. Ranum,
Roger R. Schell,
Eugene H. Spafford:
Firewalls: An Expert Roundtable.
IEEE Software 14(5): 60-66 (1997) |
1983 |
4 | | James P. Anderson:
An Approach to Indentification of Minimum TCB Requirements for Various Threat/Risk Environments.
IEEE Symposium on Security and Privacy 1983: 102-106 |
1972 |
3 | | James P. Anderson:
Information Security in a Multi-User Computer Environment.
Advances in Computers 12: 1-36 (1972) |
1965 |
2 | EE | James P. Anderson:
Program structures for parallel processing.
Commun. ACM 8(12): 786-788 (1965) |
1964 |
1 | EE | James P. Anderson:
A note on some compiling algorithms.
Commun. ACM 7(3): 149-150 (1964) |