|
Search the dblp DataBase
Glenn S. Benson:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Daniel F. Sterne, Glenn S. Benson, Homayoon Tajalli
Redrawing the Security Perimeter of a Trusted System. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:162-174 [Conf]
- Glenn S. Benson, William F. Appelbe, Ian F. Akyildiz
The Hierarchical Model of Distributed System Security. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1989, pp:194-205 [Conf]
- Glenn S. Benson, Ian F. Akyildiz, William F. Appelbe
A Formal Protection Model of Security in Centralized, Parallel, and Distributed Systems. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Syst., 1990, v:8, n:3, pp:183-213 [Journal]
- Glenn S. Benson
Portable security transaction protocol. [Citation Graph (0, 0)][DBLP] Computer Networks, 2007, v:51, n:3, pp:751-766 [Journal]
A Security Reclassifier for a Local Area Network. [Citation Graph (, )][DBLP]
Credentials Management for High-Value Transactions. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|