2005 |
8 | | Ronda R. Henning:
Metapolicies and Context-Based Access Control.
ICEIS (3) 2005: 355-359 |
2003 |
7 | EE | Rayford B. Vaughn,
Ronda R. Henning,
Ambareen Siraj:
Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy.
HICSS 2003: 331 |
6 | EE | Ronda R. Henning:
Vulnerability Assessment in Wireless Network.
SAINT Workshops 2003: 358-362 |
2002 |
5 | EE | Rayford B. Vaughn,
Ronda R. Henning,
Kevin L. Fox:
An empirical study of industrial security-engineering practices.
Journal of Systems and Software 61(3): 225-232 (2002) |
1995 |
4 | | Marvin Schaefer,
Ronda R. Henning,
Roger L. Miller,
Thomas J. Parenty,
Jesse C. Worthington:
Customer Requirements for Security in Relational Database Management.
DBSec 1995: 351-361 |
1988 |
3 | | Ronda R. Henning,
Richard P. Simonian:
Security Analysis of database Schema Information.
DBSec 1988: 233-245 |
1987 |
2 | | Ronda R. Henning:
The Allocation of Database Management System Security Responsibilities.
DBSec 1987: 131-148 |
1 | EE | Ronda R. Henning,
Brian S. Hubbard,
Swen A. Walker:
Computer Architectures, Database Security, and An Evaluation Metric.
ICDE 1987: 518-525 |