The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Marc Donner: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Marc Donner, David Nochin, Dennis Shasha, Wendy Walasek
    Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:195-316 [Conf]
  2. David Notkin, Marc Donner, Michael D. Ernst, Michael M. Gorlick, E. James Whitehead Jr.
    Panel: Perspectives on Software Engineering. [Citation Graph (0, 0)][DBLP]
    ICSE, 2001, pp:699-702 [Conf]
  3. Marc Donner
    AI Bites Man? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:63-66 [Journal]
  4. Marc Donner
    Post-Apocalypse Now. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:53-55 [Journal]
  5. Marc Donner
    Toward a Security Ontology. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:6-7 [Journal]
  6. Marc Donner
    Hey, Robot! [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:51-55 [Journal]
  7. Marc Donner
    The Girl with No Eyes. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:60-64 [Journal]
  8. Marc Donner
    Die Gedanken Sind Frei. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:53-55 [Journal]
  9. Marc Donner
    Hacking the Best-Seller List. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:51-53 [Journal]
  10. Marc Donner
    From the Editors: Whose Data Are These, Anyway? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:5-6 [Journal]
  11. Marc Donner
    Cult Classics. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:66-68 [Journal]
  12. Marc Donner
    From the Editors: A Witty Lesson. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:5- [Journal]
  13. Marc Donner
    Deus Est Machina. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:51-53 [Journal]
  14. Marc Donner
    Jennifer Government. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:57-59 [Journal]
  15. Marc Donner
    Use the Force, Luke! [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:6, pp:53-55 [Journal]
  16. Marc Donner
    What's in a Name? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:4-5 [Journal]
  17. Marc Donner
    A Young Geek's Fancy Turns to...Science Fiction? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:58-60 [Journal]
  18. Marc Donner
    There Ain't No Inside, There Ain't No Outside... [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:5, pp:4-5 [Journal]
  19. Marc Donner
    The Impending Debate. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:4-5 [Journal]

Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002