dblp.uni-trier.dewww.uni-trier.de

Ronda R. Henning

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2005
8 Ronda R. Henning: Metapolicies and Context-Based Access Control. ICEIS (3) 2005: 355-359
2003
7EERayford B. Vaughn, Ronda R. Henning, Ambareen Siraj: Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy. HICSS 2003: 331
6EERonda R. Henning: Vulnerability Assessment in Wireless Network. SAINT Workshops 2003: 358-362
2002
5EERayford B. Vaughn, Ronda R. Henning, Kevin L. Fox: An empirical study of industrial security-engineering practices. Journal of Systems and Software 61(3): 225-232 (2002)
1995
4 Marvin Schaefer, Ronda R. Henning, Roger L. Miller, Thomas J. Parenty, Jesse C. Worthington: Customer Requirements for Security in Relational Database Management. DBSec 1995: 351-361
1988
3 Ronda R. Henning, Richard P. Simonian: Security Analysis of database Schema Information. DBSec 1988: 233-245
1987
2 Ronda R. Henning: The Allocation of Database Management System Security Responsibilities. DBSec 1987: 131-148
1EERonda R. Henning, Brian S. Hubbard, Swen A. Walker: Computer Architectures, Database Security, and An Evaluation Metric. ICDE 1987: 518-525

Coauthor Index

1Kevin L. Fox [5]
2Brian S. Hubbard [1]
3Roger L. Miller [4]
4Thomas J. Parenty [4]
5Marvin Schaefer [4]
6Richard P. Simonian [3]
7Ambareen Siraj [7]
8Rayford B. Vaughn [5] [7]
9Swen A. Walker [1]
10Jesse C. Worthington [4]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)