2002 | ||
---|---|---|
6 | EE | Dale M. Johnson: Wireless Security: Vulnerabilities and Countermeasures. ACSAC 2002: 91-95 |
1994 | ||
5 | Joshua D. Guttman, Dale M. Johnson: Three Applications of Formal Methods at MITRE. FME 1994: 55-65 | |
1990 | ||
4 | J. Todd Wittbold, Dale M. Johnson: Information Flow in Nondeterministic Systems. IEEE Symposium on Security and Privacy 1990: 144-161 | |
1989 | ||
3 | Dale M. Johnson, F. Javier Thayer: Security Properties Consistent with the Testing Semantics for Communicating Processes. CSFW 1989: 9-21 | |
1988 | ||
2 | Dale M. Johnson, F. Javier Thayer: Security and the Composition of Machines. CSFW 1988: 72-89 | |
1 | EE | Dale M. Johnson, F. Javier Thayer: Stating Security Requirements with Tolerable Sets. ACM Trans. Comput. Syst. 6(3): 284-295 (1988) |
1 | Joshua D. Guttman | [5] |
2 | F. Javier Thayer | [1] [2] [3] |
3 | J. Todd Wittbold | [4] |