![]() | ![]() |
2007 | ||
---|---|---|
5 | EE | Glenn S. Benson: Portable security transaction protocol. Computer Networks 51(3): 751-766 (2007) |
1994 | ||
4 | Daniel F. Sterne, Glenn S. Benson, Homayoon Tajalli: Redrawing the Security Perimeter of a Trusted System. CSFW 1994: 162-174 | |
1990 | ||
3 | Ian F. Akyildiz, Glenn S. Benson: A Security Reclassifier for a Local Area Network. ESORICS 1990: 85-95 | |
2 | EE | Glenn S. Benson, Ian F. Akyildiz, William F. Appelbe: A Formal Protection Model of Security in Centralized, Parallel, and Distributed Systems. ACM Trans. Comput. Syst. 8(3): 183-213 (1990) |
1989 | ||
1 | Glenn S. Benson, William F. Appelbe, Ian F. Akyildiz: The Hierarchical Model of Distributed System Security. IEEE Symposium on Security and Privacy 1989: 194-205 |
1 | Ian F. Akyildiz | [1] [2] [3] |
2 | William F. Appelbe | [1] [2] |
3 | Daniel F. Sterne | [4] |
4 | Homayoon Tajalli | [4] |