|
Dorothy E. Denning:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Keishi Tajima:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Which papers of Keishi Tajima cite Dorothy E. DenningOrdered by cited publication[Change the order to 'ordered by citing']
-
Dorothy E. Denning
A Lattice Model of Secure Information Flow. [Citation Graph (13, 0)][DBLP] Commun. ACM, 1976, v:19, n:5, pp:236-243 [Journal] Is cited by:
-
Dorothy E. Denning, Peter J. Denning
Certification of Programs for Secure Information Flow. [Citation Graph (1, 0)][DBLP] Commun. ACM, 1977, v:20, n:7, pp:504-513 [Journal] Is cited by:
-
Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz
The Tracker: A Threat to Statistical Database Security. [Citation Graph (29, 10)][DBLP] ACM Trans. Database Syst., 1979, v:4, n:1, pp:76-96 [Journal] Is cited by:
-
Dorothy E. Denning, Selim G. Akl, Mark Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell
Views for Multilevel Database Security. [Citation Graph (6, 0)][DBLP] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:129-140 [Journal] Is cited by:
-
Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark Heckman, William R. Shockley
The SeaView Security Model. [Citation Graph (14, 0)][DBLP] IEEE Trans. Software Eng., 1990, v:16, n:6, pp:593-607 [Journal] Is cited by:
|