2006 |
9 | EE | Constance L. Heitmeyer,
Myla Archer,
Elizabeth I. Leonard,
John D. McLean:
Formal specification and verification of data separation in a separation kernel for an embedded system.
ACM Conference on Computer and Communications Security 2006: 346-355 |
8 | EE | Virgil D. Gligor,
Thomas Haigh,
Dick Kemmerer,
Carl E. Landwehr,
Steven B. Lipner,
John D. McLean:
Information Assurance Technology Forecast 2005.
IEEE Security & Privacy 4(1): 62-69 (2006) |
2004 |
7 | EE | John D. McLean:
Trusting a trusted system.
ACM Conference on Computer and Communications Security 2004: 1 |
2001 |
6 | EE | Carl E. Landwehr,
Constance L. Heitmeyer,
John D. McLean:
A Security Model for Military Message Systems: Retrospective.
ACSAC 2001: 174-190 |
5 | EE | Peter Ryan,
John D. McLean,
Jonathan K. Millen,
Virgil D. Gligor:
Non-Interference: Who Needs It?
CSFW 2001: 237- |
1997 |
4 | EE | John D. McLean:
Is the Trusted Computing Base Concept Fundamentally Flawed?
IEEE Symposium on Security and Privacy 1997: 2 |
1984 |
3 | | John D. McLean,
Carl E. Landwehr,
Constance L. Heitmeyer:
A Formal Statement of the MMS Security Model.
IEEE Symposium on Security and Privacy 1984: 188-194 |
2 | EE | Carl E. Landwehr,
Constance L. Heitmeyer,
John D. McLean:
A Security Model for Military Message Systems
ACM Trans. Comput. Syst. 2(3): 198-222 (1984) |
1983 |
1 | | Constance L. Heitmeyer,
John D. McLean:
Abstract Requirements Specification: A New Approach and Its Application.
IEEE Trans. Software Eng. 9(5): 580-589 (1983) |