John McLean Trustworthy Software: Why we need it, Why we don't have it, How we can get it. [Citation Graph (0, 0)][DBLP] COMPSAC (1), 2006, pp:32-33 [Conf]
John McLean A Comment on the `Basic Security Theorem' of Bell and LaPadula. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1985, v:20, n:2, pp:67-70 [Journal]
John McLean A Formal Method for the Abstract Specification of Software. [Citation Graph (0, 0)][DBLP] J. ACM, 1984, v:31, n:3, pp:600-627 [Journal]
John McLean Proving Noninterference and Functional Correctness Using Traces. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1992, v:1, n:1, pp:37-58 [Journal]
John McLean A General Theory of Composition for a Class of ``Possibilistic'' Properties. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1996, v:22, n:1, pp:53-67 [Journal]
Formal methods in security engineering: where we've been, where we are, where we need to go. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP