The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

María M. Larrondo-Petrie: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández
    Security Policies in Object-Oriented Databases. [Citation Graph (3, 0)][DBLP]
    DBSec, 1989, pp:257-268 [Conf]
  2. Riva Wenig Bickel, María M. Larrondo-Petrie
    Relating Psychology's Moral Development Levels to the Ethical Use of Computers (Abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1990, pp:440- [Conf]
  3. Eduardo B. Fernández, Krishnakumar R. Nair, María M. Larrondo-Petrie, Yan Xu
    High-Level Security Issues in Multimedia/Hypertext Systems. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:13-24 [Conf]
  4. Eduardo B. Fernández, Michael VanHilst, María M. Larrondo-Petrie, Shihong Huang
    Defining Security Requirements Through Misuse Actions. [Citation Graph (0, 0)][DBLP]
    IFIP Workshop on Advanced Software Engineering, 2006, pp:123-137 [Conf]
  5. Eduardo B. Fernández, Saeed Rajput, Michael VanHilst, María M. Larrondo-Petrie
    Some Security Issues of Wireless Systems. [Citation Graph (0, 0)][DBLP]
    ISSADS, 2005, pp:388-396 [Conf]
  6. Eduardo B. Fernández, María M. Larrondo-Petrie, Ehud Gudes
    A Method-Based Authorization Model for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:135-150 [Conf]
  7. Eduardo B. Fernández, Tami Sorgente, María M. Larrondo-Petrie
    A UML-Based Methodology for Secure Systems: The Design Stage . [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:207-216 [Conf]
  8. Peter T. Breuer, Simon Pickin, María M. Larrondo-Petrie
    Detecting Deadlock, Double-Free and Other Abuses in a Million Lines of Linux Kernel Source. [Citation Graph (0, 0)][DBLP]
    SEW, 2006, pp:223-233 [Conf]
  9. Riva Wenig Bickel, María M. Larrondo-Petrie, David F. Bush
    EDICT for computer ethics education. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1992, v:17, n:1, pp:81-89 [Journal]

  10. Designing Secure SCADA Systems Using Security Patterns. [Citation Graph (, )][DBLP]


  11. Attack Patterns: A New Forensic and Design Tool. [Citation Graph (, )][DBLP]


  12. Patterns and Pattern Diagrams for Access Control. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002