|
Search the dblp DataBase
Ronda R. Henning:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ronda R. Henning
The Allocation of Database Management System Security Responsibilities. [Citation Graph (0, 0)][DBLP] DBSec, 1987, pp:131-148 [Conf]
- Ronda R. Henning, Richard P. Simonian
Security Analysis of database Schema Information. [Citation Graph (0, 0)][DBLP] DBSec, 1988, pp:233-245 [Conf]
- Marvin Schaefer, Ronda R. Henning, Roger L. Miller, Thomas J. Parenty, Jesse C. Worthington
Customer Requirements for Security in Relational Database Management. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:351-361 [Conf]
- Rayford B. Vaughn, Ronda R. Henning, Ambareen Siraj
Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy. [Citation Graph (0, 0)][DBLP] HICSS, 2003, pp:331- [Conf]
- Ronda R. Henning, Brian S. Hubbard, Swen A. Walker
Computer Architectures, Database Security, and An Evaluation Metric. [Citation Graph (0, 1)][DBLP] ICDE, 1987, pp:518-525 [Conf]
- Ronda R. Henning
Metapolicies and Context-Based Access Control. [Citation Graph (0, 0)][DBLP] ICEIS (3), 2005, pp:355-359 [Conf]
- Ronda R. Henning
Vulnerability Assessment in Wireless Network. [Citation Graph (0, 0)][DBLP] SAINT Workshops, 2003, pp:358-362 [Conf]
- Rayford B. Vaughn, Ronda R. Henning, Kevin L. Fox
An empirical study of industrial security-engineering practices. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2002, v:61, n:3, pp:225-232 [Journal]
Search in 0.001secs, Finished in 0.002secs
|