dblp.uni-trier.dewww.uni-trier.de

John D. McLean

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
9EEConstance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John D. McLean: Formal specification and verification of data separation in a separation kernel for an embedded system. ACM Conference on Computer and Communications Security 2006: 346-355
8EEVirgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean: Information Assurance Technology Forecast 2005. IEEE Security & Privacy 4(1): 62-69 (2006)
2004
7EEJohn D. McLean: Trusting a trusted system. ACM Conference on Computer and Communications Security 2004: 1
2001
6EECarl E. Landwehr, Constance L. Heitmeyer, John D. McLean: A Security Model for Military Message Systems: Retrospective. ACSAC 2001: 174-190
5EEPeter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor: Non-Interference: Who Needs It? CSFW 2001: 237-
1997
4EEJohn D. McLean: Is the Trusted Computing Base Concept Fundamentally Flawed? IEEE Symposium on Security and Privacy 1997: 2
1984
3 John D. McLean, Carl E. Landwehr, Constance L. Heitmeyer: A Formal Statement of the MMS Security Model. IEEE Symposium on Security and Privacy 1984: 188-194
2EECarl E. Landwehr, Constance L. Heitmeyer, John D. McLean: A Security Model for Military Message Systems ACM Trans. Comput. Syst. 2(3): 198-222 (1984)
1983
1 Constance L. Heitmeyer, John D. McLean: Abstract Requirements Specification: A New Approach and Its Application. IEEE Trans. Software Eng. 9(5): 580-589 (1983)

Coauthor Index

1Myla Archer [9]
2Virgil D. Gligor [5] [8]
3Thomas Haigh [8]
4Constance L. Heitmeyer (Connie Heitmeyer) [1] [2] [3] [6] [9]
5Dick Kemmerer [8]
6Carl E. Landwehr [2] [3] [6] [8]
7Elizabeth I. Leonard [9]
8Steven B. Lipner [8]
9Jonathan K. Millen [5]
10Peter Y. A. Ryan (Peter Ryan) [5]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)