| 2009 |
| 7 | EE | J. Thomas Haigh,
Steven A. Harp,
Richard C. O'Brien,
Charles N. Payne,
Johnathan Gohde,
John Maraist:
Trapping Malicious Insiders in the SPDR Web.
HICSS 2009: 1-10 |
| 1999 |
| 6 | EE | D. J. Thomsen,
Richard C. O'Brien,
Charles N. Payne:
Napoleon: Network Application Policy Environment.
ACM Workshop on Role-Based Access Control 1999: 145-152 |
| 5 | EE | Charles N. Payne,
D. J. Thomsen,
J. Bogle,
Richard C. O'Brien:
Napoleon: A Recipe for Workflow.
ACSAC 1999: 134-142 |
| 1990 |
| 4 | | J. Thomas Haigh,
Richard C. O'Brien,
D. J. Thomsen:
The LDV Secure Relational DBMS Model.
DBSec 1990: 265-280 |
| 1989 |
| 3 | | Todd Fine,
J. Thomas Haigh,
Richard C. O'Brien,
Dana L. Toups:
Noninterference and the Unwinding for LOCK.
CSFW 1989: 22-28 |
| 2 | | J. Thomas Haigh,
Richard C. O'Brien,
P. D. Stachour,
Dana L. Toups:
The LDV Approach to Database Security.
DBSec 1989: 323-339 |
| 1977 |
| 1 | EE | Richard C. O'Brien:
An upper bound on the path number of a digraph.
J. Comb. Theory, Ser. B 22(2): 168-174 (1977) |