|
Search the dblp DataBase
J. Thomas Haigh:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- J. Thomas Haigh, Richard C. O'Brien, D. J. Thomsen
The LDV Secure Relational DBMS Model. [Citation Graph (4, 0)][DBLP] DBSec, 1990, pp:265-280 [Conf]
- J. Thomas Haigh, William D. Young
Extending the Noninterference Version of MLS for SAT. [Citation Graph (2, 0)][DBLP] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:141-150 [Journal]
- J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (1, 0)][DBLP] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:157-168 [Journal]
- Todd Fine, J. Thomas Haigh, Richard C. O'Brien, Dana L. Toups
Noninterference and the Unwinding for LOCK. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:22-28 [Conf]
- J. Thomas Haigh
Modeling Datbase Security Requirements. [Citation Graph (0, 0)][DBLP] DBSec, 1987, pp:45-56 [Conf]
- J. Thomas Haigh, Richard C. O'Brien, P. D. Stachour, Dana L. Toups
The LDV Approach to Database Security. [Citation Graph (0, 0)][DBLP] DBSec, 1989, pp:323-339 [Conf]
- D. J. Thomsen, J. Thomas Haigh, Carl E. Landwehr
Discussion Notes and Research Question List. [Citation Graph (0, 0)][DBLP] DBSec, 1988, pp:263-280 [Conf]
- J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:14-24 [Conf]
- J. Thomas Haigh, William D. Young
Extending the Non-Interference Version of MLS for SAT. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:60-60 [Conf]
Trapping Malicious Insiders in the SPDR Web. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|