2003 |
17 | EE | J. McDermott,
A. Kim,
Judith N. Froscher:
Merging paradigms of survivability and security: stochastic faults and designed faults.
NSPW 2003: 19-25 |
2001 |
16 | EE | Myong H. Kang,
Joon S. Park,
Judith N. Froscher:
Access control mechanisms for inter-organizational workflow.
SACMAT 2001: 66-74 |
15 | | Joon S. Park,
Myong H. Kang,
Judith N. Froscher:
A Secure Workflow System for Dynamic Collaboration.
SEC 2001: 167-182 |
14 | EE | Myong H. Kang,
Judith N. Froscher:
A Tool for Secure Inter-Organizational Computing.
WETICE 2001: 194-199 |
2000 |
13 | EE | Myong H. Kang,
Judith N. Froscher:
A Framework for Secure Enterprise Computing.
WETICE 2000: 219-220 |
1999 |
12 | EE | Myong H. Kang,
Brian J. Eppinger,
Judith N. Froscher:
Tools to Support Secure Enterprise Computing.
ACSAC 1999: 143- |
11 | EE | Myong H. Kang,
Judith N. Froscher,
Amit P. Sheth,
Krys Kochut,
John A. Miller:
A Multilevel Secure Workflow Management System.
CAiSE 1999: 271-285 |
10 | | Myong H. Kang,
Judith N. Froscher,
Brian J. Eppinger,
Ira S. Moskowitz:
A Strategy for an MLS Workflow Management System.
DBSec 1999: 161-174 |
1998 |
9 | EE | Myong H. Kang,
Judith N. Froscher,
Brian J. Eppinger:
Towards an Infrastructure for MLS Distributed Computing.
ACSAC 1998: 91-100 |
1997 |
8 | EE | Myong H. Kang,
Judith N. Froscher,
Ira S. Moskowitz:
An Architecture for Multilevel Secure Interoperability.
ACSAC 1997: 194-204 |
1996 |
7 | EE | Myong H. Kang,
Judith N. Froscher,
Ira S. Moskowitz:
A framework for MLS interoperability.
HASE 1996: 198-205 |
1994 |
6 | | Oliver Costich,
Myong H. Kang,
Judith N. Froscher:
The SINTRA Data Model: Structure and Operations.
DBSec 1994: 97-110 |
1993 |
5 | | Myong H. Kang,
Oliver Costich,
Judith N. Froscher:
Using Object Modeling Techniques to Design MLS Data Models.
Security for Object-Oriented Systems 1993: 203-211 |
1992 |
4 | | Myong H. Kang,
Oliver Costich,
Judith N. Froscher:
A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System.
DBSec 1992: 285-300 |
1990 |
3 | EE | Robert J. K. Jacob,
Judith N. Froscher:
A Software Engineering Methodology for Rule-Based Systems.
IEEE Trans. Knowl. Data Eng. 2(2): 173-189 (1990) |
1988 |
2 | | Judith N. Froscher,
Catherine Meadows:
Achieving a Trusted Database Management System Using Parallelism.
DBSec 1988: 151-160 |
1986 |
1 | | Robert J. K. Jacob,
Judith N. Froscher:
Software Engineering for Rule-Based Software Systems.
FJCC 1986: 185-188 |