dblp.uni-trier.dewww.uni-trier.de

Mark Heckman

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
12EEJingmin Zhou, Mark Heckman, Brennen Reynolds, Adam Carlson, Matt Bishop: Modeling network intrusion detection alerts for correlation. ACM Trans. Inf. Syst. Secur. 10(1): (2007)
2000
11EERichard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark Heckman, Dave Peticolas, Rick Crawford, Lee Benzinger, Sue Rho, Stephen Wu: Intrusion detection inter-component adaptive negotiation. Computer Networks 34(4): 605-621 (2000)
1999
10EERichard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark Heckman, Dave Peticolas, Rick Crawford, Lee Benzinger, Sue Rho, Stephen Wu: Intrusion Detection Inter-component Adaptive Negotiation. Recent Advances in Intrusion Detection 1999
1998
9EEMark Heckman, Karl N. Levitt: Applying the Composition Principle to Verify a Hierarchy of Security Servers. HICSS (3) 1998: 338-347
1997
8EECui Zhang, Brian R. Becker, Dave Peticolas, Mark Heckman, Karl N. Levitt, Ronald A. Olsson: Verification of a Distributed Computing. HICSS (5) 1997: 252-261
1996
7 Mark Heckman, Cui Zhang, Brian R. Becker, Dave Peticolas, Karl N. Levitt, Ronald A. Olsson: Towards Applying the Composition Principle to Verify a Microkernel Operating System. TPHOLs 1996: 235-250
1995
6 Cui Zhang, Brian R. Becker, Mark Heckman, Karl N. Levitt, Ronald A. Olsson: A Hierarchical Method for Reasoning about Distributed Programming Languages. TPHOLs 1995: 385-400
1993
5 Cui Zhang, Robert J. Shaw, Ronald A. Olsson, Karl N. Levitt, Myla Archer, Mark Heckman, Gregory D. Benson: Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL. HUG 1993: 29-42
1990
4EETeresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark Heckman, William R. Shockley: The SeaView Security Model. IEEE Trans. Software Eng. 16(6): 593-607 (1990)
1987
3 Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark Heckman, William R. Shockley: A Multilevel Relational Data Model. IEEE Symposium on Security and Privacy 1987: 220-234
2 Dorothy E. Denning, Selim G. Akl, Mark Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell: Views for Multilevel Database Security. IEEE Trans. Software Eng. 13(2): 129-140 (1987)
1986
1 Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark Heckman: Views for Multilevel Database Security. IEEE Symposium on Security and Privacy 1986: 156-172

Coauthor Index

1Selim G. Akl [1] [2]
2Myla Archer [5]
3Brian R. Becker [6] [7] [8]
4Gregory D. Benson [5]
5Lee Benzinger [10] [11]
6Matt Bishop [12]
7Adam Carlson [12]
8Rick Crawford [10] [11]
9Dorothy E. Denning [1] [2] [3] [4]
10Richard J. Feiertag [10] [11]
11Karl N. Levitt [5] [6] [7] [8] [9] [10] [11]
12Teresa F. Lunt [2] [3] [4]
13Matthew Morgenstern [1] [2]
14Peter G. Neumann [1] [2]
15Ronald A. Olsson [5] [6] [7] [8]
16Dave Peticolas [7] [8] [10] [11]
17Brennen Reynolds [12]
18Sue Rho [10] [11]
19Roger R. Schell [1] [2] [3] [4]
20Robert J. Shaw [5]
21William R. Shockley [3] [4]
22Stuart Staniford-Chen (Stuart Staniford) [10] [11]
23Stephen Wu [10] [11]
24Cui Zhang [5] [6] [7] [8]
25Jingmin Zhou [12]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)