1996 |
26 | EE | Ayaz Isazadeh,
David Alex Lamb,
Glenn H. MacEwen:
Behavioral Views for Software Requirements Engineering.
ECBS 1996: 300-307 |
25 | | Sam K. Oh,
Glenn H. MacEwen:
Task Behavior Monitoring for Adaptive Real-Time Communication.
Real-Time Systems 11(2): 173-195 (1996) |
1995 |
24 | EE | Ayaz Isazadeh,
Glenn H. MacEwen,
Andrew J. Malton:
Behavioral patterns for software requirement engineering.
CASCON 1995: 33 |
1992 |
23 | EE | Janice I. Glasgow,
Glenn H. MacEwen,
Prakash Panangaden:
A Logic for Reasoning About Security.
ACM Trans. Comput. Syst. 10(3): 226-264 (1992) |
1991 |
22 | | Glenn H. MacEwen,
Janice I. Glasgow:
A Proof of Secrecy for a Network Security Model.
CSFW 1991: 176-181 |
1990 |
21 | | Janice I. Glasgow,
Glenn H. MacEwen,
Prakash Panangaden:
A Logic for Reasoning about Security.
CSFW 1990: 2-13 |
1989 |
20 | | Janice I. Glasgow,
Glenn H. MacEwen:
Obligation as the Basis of Integrity Specification.
CSFW 1989: 64-70 |
19 | | Janice I. Glasgow,
Glenn H. MacEwen:
An Operator Net Model for Distributed Systems.
Distributed Computing 3(4): 196-209 (1989) |
1988 |
18 | | Janice I. Glasgow,
Glenn H. MacEwen,
Prakash Panangaden:
Reasoning about Knowledge and Permission in Secure Distributed Systems.
CSFW 1988: 139-146 |
17 | | Janice I. Glasgow,
Glenn H. MacEwen,
Prakash Panangaden:
Security by Permission in Databases.
DBSec 1988: 197-205 |
16 | | Glenn H. MacEwen,
David B. Skillicorn:
Using Higher-order Logic for Modular Specification of Real-time Distributed Systems.
FTRTFT 1988: 36-66 |
1987 |
15 | | Glenn H. MacEwen:
Effects of Distributed System Technology on Database Security: A Survey.
DBSec 1987: 253-261 |
14 | | Glenn H. MacEwen,
V. W. W. Poon,
Janice I. Glasgow:
A Model for Multilevel Security Based on Operator Nets.
IEEE Symposium on Security and Privacy 1987: 150-160 |
13 | | Janice I. Glasgow,
Glenn H. MacEwen:
A Computational Model for Distributed Systems Using Operator Nets.
PARLE (2) 1987: 243-260 |
12 | EE | Janice I. Glasgow,
Glenn H. MacEwen:
The Development and Proof of a Formal Specification for a Multilevel Secure System.
ACM Trans. Comput. Syst. 5(2): 151-184 (1987) |
11 | | Michael F. Coulas,
Glenn H. MacEwen,
Genevieve Marquis:
RNet: A Hard Real-Time Distributed Programming System.
IEEE Trans. Computers 36(8): 917-932 (1987) |
1986 |
10 | | Chantal Belzile,
Michael F. Coulas,
Glenn H. MacEwen,
Genevieve Marquis:
RNet: A Hard Real-Time Distributed Programming System.
IEEE Real-Time Systems Symposium 1986: 2-13 |
1984 |
9 | | Glenn H. MacEwen,
B. Burwell,
Z.-J. Lu:
Multi-Level Security Based on Physical Distribution.
IEEE Symposium on Security and Privacy 1984: 167-179 |
1983 |
8 | | Glenn H. MacEwen:
The Design for a Secure System Based on Program Analysis.
IEEE Trans. Software Eng. 9(3): 289-299 (1983) |
1982 |
7 | | Glenn H. MacEwen:
Correction to "Information Flow Certification Using an Intermediate Code Programm Representation".
IEEE Trans. Software Eng. 8(4): 446 (1982) |
1981 |
6 | | Allan L. Mennie,
Glenn H. MacEwen:
Information Flow Certification Using an Intermediate Code Program Representation.
IEEE Trans. Software Eng. 7(6): 594-607 (1981) |
5 | EE | Glenn H. MacEwen,
T. Patrick Martin:
Abstraction hierarchies in top-down design.
Journal of Systems and Software 2(3): 213-224 (1981) |
1977 |
4 | | Glenn H. MacEwen:
A Simulation Sequencing Algorithm.
Softw., Pract. Exper. 7(2): 165-172 (1977) |
1975 |
3 | EE | C. C. Gotlieb,
Glenn H. MacEwen:
Errata: ``Performance of Movable-Head Disk Storage Devices''.
J. ACM 22(1): 172 (1975) |
1974 |
2 | | Glenn H. MacEwen:
On Instrumentation Facilities in Programming Languages.
IFIP Congress 1974: 198-203 |
1973 |
1 | EE | C. C. Gotlieb,
Glenn H. MacEwen:
Performance of Movable-Head Disk Storage Devices.
J. ACM 20(4): 604-623 (1973) |