|
Search the dblp DataBase
Mark Heckman:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark Heckman, William R. Shockley
The SeaView Security Model. [Citation Graph (14, 0)][DBLP] IEEE Trans. Software Eng., 1990, v:16, n:6, pp:593-607 [Journal]
- Dorothy E. Denning, Selim G. Akl, Mark Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell
Views for Multilevel Database Security. [Citation Graph (6, 0)][DBLP] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:129-140 [Journal]
- Mark Heckman, Karl N. Levitt
Applying the Composition Principle to Verify a Hierarchy of Security Servers. [Citation Graph (0, 0)][DBLP] HICSS (3), 1998, pp:338-347 [Conf]
- Cui Zhang, Brian R. Becker, Dave Peticolas, Mark Heckman, Karl N. Levitt, Ronald A. Olsson
Verification of a Distributed Computing. [Citation Graph (0, 0)][DBLP] HICSS (5), 1997, pp:252-261 [Conf]
- Richard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark Heckman, Dave Peticolas, Rick Crawford, Lee Benzinger, Sue Rho, Stephen Wu
Intrusion Detection Inter-component Adaptive Negotiation. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
- Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark Heckman
Views for Multilevel Database Security. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:156-172 [Conf]
- Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark Heckman, William R. Shockley
A Multilevel Relational Data Model. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1987, pp:220-234 [Conf]
- Mark Heckman, Cui Zhang, Brian R. Becker, Dave Peticolas, Karl N. Levitt, Ronald A. Olsson
Towards Applying the Composition Principle to Verify a Microkernel Operating System. [Citation Graph (0, 0)][DBLP] TPHOLs, 1996, pp:235-250 [Conf]
- Cui Zhang, Brian R. Becker, Mark Heckman, Karl N. Levitt, Ronald A. Olsson
A Hierarchical Method for Reasoning about Distributed Programming Languages. [Citation Graph (0, 0)][DBLP] TPHOLs, 1995, pp:385-400 [Conf]
- Cui Zhang, Robert J. Shaw, Ronald A. Olsson, Karl N. Levitt, Myla Archer, Mark Heckman, Gregory D. Benson
Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL. [Citation Graph (0, 0)][DBLP] HUG, 1993, pp:29-42 [Conf]
- Richard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark Heckman, Dave Peticolas, Rick Crawford, Lee Benzinger, Sue Rho, Stephen Wu
Intrusion detection inter-component adaptive negotiation. [Citation Graph (0, 0)][DBLP] Computer Networks, 2000, v:34, n:4, pp:605-621 [Journal]
- Jingmin Zhou, Mark Heckman, Brennen Reynolds, Adam Carlson, Matt Bishop
Modeling network intrusion detection alerts for correlation. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:1, pp:- [Journal]
Search in 0.003secs, Finished in 0.004secs
|