The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

John McLean: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John McLean
    Trustworthy Software: Why we need it, Why we don't have it, How we can get it. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:32-33 [Conf]
  2. Ann Miller, John McLean, O. Sami Saydjari, Jeffrey M. Voas
    COMPSAC Panel Session on Trustworthy Computing. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:31- [Conf]
  3. Oliver Costich, John McLean, John P. McDermott
    Confidentiality in a Replicated Architecture Trusted Database System: A Formal Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1994, pp:60-65 [Conf]
  4. James W. Gray III, John McLean
    Using temporal logic to specify and verify cryptographic protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:108-0 [Conf]
  5. John McLean
    A Complete System of Temporal Logic for Specification Schemata. [Citation Graph (0, 0)][DBLP]
    Logic of Programs, 1983, pp:360-370 [Conf]
  6. John McLean
    Reasoning About Security Models. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:123-133 [Conf]
  7. John McLean
    Security Models and Information Flow. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:180-189 [Conf]
  8. John McLean
    Twenty Years of Formal Methods. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:115-116 [Conf]
  9. John McLean
    The Specification and Modeling of Computer Security. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1990, v:23, n:1, pp:9-16 [Journal]
  10. Clay Williams, Harm Sluiman, David Pitcher, Marius Slavescu, Jim Spratley, Mark Brodhun, John McLean, Charles Rankin, Karen Rosengren
    The STCL test tools architecture. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 2002, v:41, n:1, pp:74-88 [Journal]
  11. John McLean
    A Comment on the `Basic Security Theorem' of Bell and LaPadula. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1985, v:20, n:2, pp:67-70 [Journal]
  12. John McLean
    A Formal Method for the Abstract Specification of Software. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1984, v:31, n:3, pp:600-627 [Journal]
  13. John McLean
    Proving Noninterference and Functional Correctness Using Traces. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1992, v:1, n:1, pp:37-58 [Journal]
  14. John McLean
    A General Theory of Composition for a Class of ``Possibilistic'' Properties. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1996, v:22, n:1, pp:53-67 [Journal]

  15. Formal methods in security engineering: where we've been, where we are, where we need to go. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002