The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jonathon Tidswell: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jonathon Tidswell, John Potter
    An Approach to Dynamic Domain and Type Enforcement. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:26-37 [Conf]
  2. Jonathon Tidswell, John Potter
    A Dynamically Typed Access Control Model. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:308-319 [Conf]
  3. Jonathon Tidswell, Trent Jaeger
    An access control model for simplifying constraint expression. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:154-163 [Conf]
  4. Jonathon Tidswell, Trent Jaeger
    Integrated constraints and inheritance in DTAC. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:93-102 [Conf]
  5. Jonathon Tidswell, Geoffrey H. Outhred, John Potter
    Dynamic Rights: Safe Extensible Access Control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:113-120 [Conf]
  6. Trent Jaeger, Jonathon Tidswell
    Rebuttal to the NIST RBAC model proposal. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:65-66 [Conf]
  7. Jonathon Tidswell, John Potter
    A graphical definition of authorization schema in the DTAC model. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:109-120 [Conf]
  8. Alain Gefflaut, Trent Jaeger, Yoonho Park, Jochen Liedtke, Kevin Elphinstone, Volkmar Uhlig, Jonathon Tidswell, Luke Deller, Lars Reuther
    The SawMill multiserver approach. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 2000, pp:109-114 [Conf]
  9. Trent Jaeger, Jonathon Tidswell, Alain Gefflaut, Yoonho Park, Kevin Elphinstone, Jochen Liedtke
    Synchronous IPC over transparent monitors. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 2000, pp:189-194 [Conf]
  10. Antonios Symvonis, Jonathon Tidswell
    An Empirical Study of Off-Line Permutation Packet Routing on Two-Dimensional Meshes Based on the Multistage Routing Method. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1996, v:45, n:5, pp:619-625 [Journal]
  11. Trent Jaeger, Jonathon Tidswell
    Practical safety in flexible access control models. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:2, pp:158-190 [Journal]

Search in 0.179secs, Finished in 0.180secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002