The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jody Threet: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi
    An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:385-388 [Conf]
  2. John Hale, Jody Threet, Sujeet Shenoi
    A Practical Formalism for Imprecise Inference Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:139-156 [Conf]
  3. John Hale, Jody Threet, Sujeet Shenoi
    Capability-Based Primitives for Access Control in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:134-148 [Conf]
  4. J. Halle, Jody Threet, Sujeet Shenoi
    A Framework for High Assurance Security of Distributed Objects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:101-119 [Conf]
  5. Jay Veezhinathan, Frank Kemp, Jody Threet
    A Hybrid of Neural Net and Branch and Bound Techniques for Seismic Horizon Tracking. [Citation Graph (0, 0)][DBLP]
    SAC, 1993, pp:173-178 [Conf]
  6. John Hale, Jody Threet, Sujeet Shenoi
    A Ticket-Based Access Control Architecture for Object Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:1, pp:- [Journal]

Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002