Search the dblp DataBase
D. Richard Kuhn :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dolores R. Wallace , D. Richard Kuhn Lessons from 342 Medical Device Failures. [Citation Graph (0, 0)][DBLP ] HASE, 1999, pp:123-131 [Conf ] D. Richard Kuhn On the Effective Use of Software Standards in Systems Integration. [Citation Graph (0, 0)][DBLP ] ICSI, 1990, pp:455-461 [Conf ] David F. Ferraiolo , D. Richard Kuhn Future directions in role-based access control. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf ] D. Richard Kuhn Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1997, pp:23-30 [Conf ] D. Richard Kuhn Role Based Access Control on MLS Systems without Kernel Changes. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1998, pp:25-32 [Conf ] Ravi S. Sandhu , David F. Ferraiolo , D. Richard Kuhn The NIST model for role-based access control: towards a unified standard. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 2000, pp:47-63 [Conf ] Ravi S. Sandhu , Elisa Bertino , Trent Jaeger , D. Richard Kuhn , Carl E. Landwehr Panel: The next generation of acess control models (panel session): do we need them and what should they be? [Citation Graph (0, 0)][DBLP ] SACMAT, 2001, pp:53- [Conf ] David F. Ferraiolo , Serban I. Gavrila , Vincent C. Hu , D. Richard Kuhn Composing and combining policies under the policy machine. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:11-20 [Conf ] Vincent C. Hu , D. Richard Kuhn , David F. Ferraiolo The Computational Complexity of Enforceability Validation for Generic Access Control Rules. [Citation Graph (0, 0)][DBLP ] SUTC (1), 2006, pp:260-267 [Conf ] D. Richard Kuhn , Vadim Okun Pseudo-Exhaustive Testing for Software. [Citation Graph (0, 0)][DBLP ] SEW, 2006, pp:153-158 [Conf ] Paul E. Black , D. Richard Kuhn , Carl J. Williams Quantum computing and communication. [Citation Graph (0, 0)][DBLP ] Advances in Computers, 2002, v:56, n:, pp:190-245 [Journal ] D. Richard Kuhn Sources of Failure in the Public Switched Telephone Network. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1997, v:30, n:4, pp:31-36 [Journal ] D. Richard Kuhn , Patricia Edfors , Victoria Howard , Chuck Caputo , Ted S. Phillips Improving Public Switched Network Security in an Open Environment. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1993, v:26, n:8, pp:32-35 [Journal ] Thomas J. Walsh , D. Richard Kuhn Challenges in Securing Voice over IP. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:3, pp:44-49 [Journal ] Shukri Wakid , D. Richard Kuhn , Dolores R. Wallace Toward Credible IT Testing and Certification. [Citation Graph (0, 0)][DBLP ] IEEE Software, 1999, v:16, n:4, pp:39-47 [Journal ] David F. Ferraiolo , John F. Barkley , D. Richard Kuhn A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:1, pp:34-64 [Journal ] David F. Ferraiolo , Ravi S. Sandhu , Serban I. Gavrila , D. Richard Kuhn , Ramaswamy Chandramouli Proposed NIST standard for role-based access control. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:3, pp:224-274 [Journal ] D. Richard Kuhn Fault classes and error detection capability of specification-based testing. [Citation Graph (0, 0)][DBLP ] ACM Trans. Softw. Eng. Methodol., 1999, v:8, n:4, pp:411-424 [Journal ] D. Richard Kuhn , Dolores R. Wallace , Albert M. Gallo Software Fault Interactions and Implications for Software Testing. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2004, v:30, n:6, pp:418-421 [Journal ] IPOG: A General Strategy for T-Way Software Testing. [Citation Graph (, )][DBLP ] Property Verification for Generic Access Control Models. [Citation Graph (, )][DBLP ] Adding Attributes to Role-Based Access Control. [Citation Graph (, )][DBLP ] Role-Based Access Controls [Citation Graph (, )][DBLP ] Search in 0.018secs, Finished in 0.019secs