dblp.uni-trier.dewww.uni-trier.de

E. Stewart Lee

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2004
20EESijing Zhang, Alan Burns, Jing Chen, E. Stewart Lee: Hard Real-Time Communication with the Timed Token Protocol: Current State and Challenging Problems. Real-Time Systems 27(3): 271-295 (2004)
2002
19 Sijing Zhang, Alan Burns, Ahmed Mehaoua, E. Stewart Lee, Hongji Yang: Testing the Schedulability of Synchronous Traffic for the Timed Token Medium Access Control Protocol. Real-Time Systems 22(3): 251-280 (2002)
2001
18EESijing Zhang, E. Stewart Lee, Alan Burns: Determining the Worst-case Synchronous Message Response Time in FDDI Networks. Comput. J. 44(1): 31-41 (2001)
1999
17EESijing Zhang, E. Stewart Lee, Alan Burns, Hongji Yang: Finding the minimum available transmission time for the timed token medium access control protocol. ECRTS 1999: 185-194
16EEHajime Morito, Michael Roe, E. Stewart Lee: Digital Copy Protection Scheme Using Recording Medium Identifier. ICPP Workshops 1999: 174-178
15 Zhong Fan, E. Stewart Lee: Pricing for Differentiated Internet Services. IDMS 1999: 365-370
14EESijing Zhang, E. Stewart Lee: The Worst-Case Scenario for Transmission of Synchronous Traffic in an FDDI Network. LCN 1999: 192-
13EESijing Zhang, E. Stewart Lee: Efficient Global Allocation of Synchronous Bandwidths for Hard Real-Time Communication with the Timed Token MAC Protocol. RTCSA 1999: 120-127
12 E. Stewart Lee: Composing Security Properties. Security Protocols Workshop 1999: 6-14
1998
11EEAris Zakinthinos, E. Stewart Lee: Composing Secure Systems that have Emergent Properties. CSFW 1998: 117-122
10EERoger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson: Panel Session - Future Directions. Security Protocols Workshop 1998: 227-239
1997
9EEAris Zakinthinos, E. Stewart Lee: A General Theory of Security Properties. IEEE Symposium on Security and Privacy 1997: 94-102
1996
8EEAris Zakinthinos, E. Stewart Lee: How and why feedback composition fails [secure systems]. CSFW 1996: 95-101
1995
7EEAris Zakinthinos, E. Stewart Lee: The composability of non-interference [system security]. CSFW 1995: 2-8
6 Aris Zakinthinos, E. Stewart Lee: The Composability of Non-Interference. Journal of Computer Security 3(4): 269-282 (1995)
1994
5EEHeather M. Hinton, E. Stewart Lee: The Compatibility of Policies. ACM Conference on Computer and Communications Security 1994: 258-269
1992
4EERalf C. Hauser, E. Stewart Lee: Verification and Modelling of Authentication Protocols. ESORICS 1992: 141-154
3 Ralf C. Hauser, E. Stewart Lee: Reducing the Proliferation of Passwords in Distributed Systems. IFIP Congress (2) 1992: 525-531
1990
2 E. Stewart Lee, Brian W. Thomson, Peter I. P. Boulton, Michael Stumm: An Architecture for a Trusted Network. ESORICS 1990: 105-113
1 Brian W. Thomson, E. Stewart Lee, Peter I. P. Boulton, Michael Stumm, David M. Lewis: Using Deducibility in Secure Network Modelling. ESORICS 1990: 117-123

Coauthor Index

1Peter I. P. Boulton [1] [2]
2Alan Burns [17] [18] [19] [20]
3Jing Chen [20]
4Bruce Christianson [10]
5Zhong Fan [15]
6Joan Feigenbaum [10]
7Virgil D. Gligor [10]
8Ralf C. Hauser [3] [4]
9Heather M. Hinton [5]
10David M. Lewis [1]
11Ahmed Mehaoua [19]
12Hajime Morito [16]
13Roger M. Needham [10]
14Michael Roe [16]
15Michael Stumm [1] [2]
16Brian W. Thomson [1] [2]
17Hongji Yang [17] [19]
18Aris Zakinthinos [6] [7] [8] [9] [11]
19Sijing Zhang [13] [14] [17] [18] [19] [20]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)