dblp.uni-trier.dewww.uni-trier.de

Judith N. Froscher

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2003
17EEJ. McDermott, A. Kim, Judith N. Froscher: Merging paradigms of survivability and security: stochastic faults and designed faults. NSPW 2003: 19-25
2001
16EEMyong H. Kang, Joon S. Park, Judith N. Froscher: Access control mechanisms for inter-organizational workflow. SACMAT 2001: 66-74
15 Joon S. Park, Myong H. Kang, Judith N. Froscher: A Secure Workflow System for Dynamic Collaboration. SEC 2001: 167-182
14EEMyong H. Kang, Judith N. Froscher: A Tool for Secure Inter-Organizational Computing. WETICE 2001: 194-199
2000
13EEMyong H. Kang, Judith N. Froscher: A Framework for Secure Enterprise Computing. WETICE 2000: 219-220
1999
12EEMyong H. Kang, Brian J. Eppinger, Judith N. Froscher: Tools to Support Secure Enterprise Computing. ACSAC 1999: 143-
11EEMyong H. Kang, Judith N. Froscher, Amit P. Sheth, Krys Kochut, John A. Miller: A Multilevel Secure Workflow Management System. CAiSE 1999: 271-285
10 Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, Ira S. Moskowitz: A Strategy for an MLS Workflow Management System. DBSec 1999: 161-174
1998
9EEMyong H. Kang, Judith N. Froscher, Brian J. Eppinger: Towards an Infrastructure for MLS Distributed Computing. ACSAC 1998: 91-100
1997
8EEMyong H. Kang, Judith N. Froscher, Ira S. Moskowitz: An Architecture for Multilevel Secure Interoperability. ACSAC 1997: 194-204
1996
7EEMyong H. Kang, Judith N. Froscher, Ira S. Moskowitz: A framework for MLS interoperability. HASE 1996: 198-205
1994
6 Oliver Costich, Myong H. Kang, Judith N. Froscher: The SINTRA Data Model: Structure and Operations. DBSec 1994: 97-110
1993
5 Myong H. Kang, Oliver Costich, Judith N. Froscher: Using Object Modeling Techniques to Design MLS Data Models. Security for Object-Oriented Systems 1993: 203-211
1992
4 Myong H. Kang, Oliver Costich, Judith N. Froscher: A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System. DBSec 1992: 285-300
1990
3EERobert J. K. Jacob, Judith N. Froscher: A Software Engineering Methodology for Rule-Based Systems. IEEE Trans. Knowl. Data Eng. 2(2): 173-189 (1990)
1988
2 Judith N. Froscher, Catherine Meadows: Achieving a Trusted Database Management System Using Parallelism. DBSec 1988: 151-160
1986
1 Robert J. K. Jacob, Judith N. Froscher: Software Engineering for Rule-Based Software Systems. FJCC 1986: 185-188

Coauthor Index

1Oliver Costich [4] [5] [6]
2Brian J. Eppinger [9] [10] [12]
3Robert J. K. Jacob [1] [3]
4Myong H. Kang [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16]
5A. Kim [17]
6Krys Kochut [11]
7J. McDermott [17]
8Catherine Meadows [2]
9John A. Miller [11]
10Ira S. Moskowitz [7] [8] [10]
11Joon S. Park [15] [16]
12Amit P. Sheth [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)