2009 |
7 | EE | J. Thomas Haigh,
Steven A. Harp,
Richard C. O'Brien,
Charles N. Payne,
Johnathan Gohde,
John Maraist:
Trapping Malicious Insiders in the SPDR Web.
HICSS 2009: 1-10 |
1999 |
6 | EE | D. J. Thomsen,
Richard C. O'Brien,
Charles N. Payne:
Napoleon: Network Application Policy Environment.
ACM Workshop on Role-Based Access Control 1999: 145-152 |
5 | EE | Charles N. Payne,
D. J. Thomsen,
J. Bogle,
Richard C. O'Brien:
Napoleon: A Recipe for Workflow.
ACSAC 1999: 134-142 |
1990 |
4 | | J. Thomas Haigh,
Richard C. O'Brien,
D. J. Thomsen:
The LDV Secure Relational DBMS Model.
DBSec 1990: 265-280 |
1989 |
3 | | Todd Fine,
J. Thomas Haigh,
Richard C. O'Brien,
Dana L. Toups:
Noninterference and the Unwinding for LOCK.
CSFW 1989: 22-28 |
2 | | J. Thomas Haigh,
Richard C. O'Brien,
P. D. Stachour,
Dana L. Toups:
The LDV Approach to Database Security.
DBSec 1989: 323-339 |
1977 |
1 | EE | Richard C. O'Brien:
An upper bound on the path number of a digraph.
J. Comb. Theory, Ser. B 22(2): 168-174 (1977) |