The SCEAS System
Navigation Menu

Search the dblp DataBase


D. Richard Kuhn: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dolores R. Wallace, D. Richard Kuhn
    Lessons from 342 Medical Device Failures. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:123-131 [Conf]
  2. D. Richard Kuhn
    On the Effective Use of Software Standards in Systems Integration. [Citation Graph (0, 0)][DBLP]
    ICSI, 1990, pp:455-461 [Conf]
  3. David F. Ferraiolo, D. Richard Kuhn
    Future directions in role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  4. D. Richard Kuhn
    Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:23-30 [Conf]
  5. D. Richard Kuhn
    Role Based Access Control on MLS Systems without Kernel Changes. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:25-32 [Conf]
  6. Ravi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn
    The NIST model for role-based access control: towards a unified standard. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:47-63 [Conf]
  7. Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr
    Panel: The next generation of acess control models (panel session): do we need them and what should they be? [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:53- [Conf]
  8. David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn
    Composing and combining policies under the policy machine. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:11-20 [Conf]
  9. Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
    The Computational Complexity of Enforceability Validation for Generic Access Control Rules. [Citation Graph (0, 0)][DBLP]
    SUTC (1), 2006, pp:260-267 [Conf]
  10. D. Richard Kuhn, Vadim Okun
    Pseudo-Exhaustive Testing for Software. [Citation Graph (0, 0)][DBLP]
    SEW, 2006, pp:153-158 [Conf]
  11. Paul E. Black, D. Richard Kuhn, Carl J. Williams
    Quantum computing and communication. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 2002, v:56, n:, pp:190-245 [Journal]
  12. D. Richard Kuhn
    Sources of Failure in the Public Switched Telephone Network. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1997, v:30, n:4, pp:31-36 [Journal]
  13. D. Richard Kuhn, Patricia Edfors, Victoria Howard, Chuck Caputo, Ted S. Phillips
    Improving Public Switched Network Security in an Open Environment. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1993, v:26, n:8, pp:32-35 [Journal]
  14. Thomas J. Walsh, D. Richard Kuhn
    Challenges in Securing Voice over IP. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:44-49 [Journal]
  15. Shukri Wakid, D. Richard Kuhn, Dolores R. Wallace
    Toward Credible IT Testing and Certification. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1999, v:16, n:4, pp:39-47 [Journal]
  16. David F. Ferraiolo, John F. Barkley, D. Richard Kuhn
    A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:1, pp:34-64 [Journal]
  17. David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli
    Proposed NIST standard for role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:3, pp:224-274 [Journal]
  18. D. Richard Kuhn
    Fault classes and error detection capability of specification-based testing. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 1999, v:8, n:4, pp:411-424 [Journal]
  19. D. Richard Kuhn, Dolores R. Wallace, Albert M. Gallo
    Software Fault Interactions and Implications for Software Testing. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2004, v:30, n:6, pp:418-421 [Journal]

  20. IPOG: A General Strategy for T-Way Software Testing. [Citation Graph (, )][DBLP]

  21. Property Verification for Generic Access Control Models. [Citation Graph (, )][DBLP]

  22. Adding Attributes to Role-Based Access Control. [Citation Graph (, )][DBLP]

  23. Role-Based Access Controls [Citation Graph (, )][DBLP]

Search in 0.007secs, Finished in 0.009secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002