|
Search the dblp DataBase
María M. Larrondo-Petrie:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández
Security Policies in Object-Oriented Databases. [Citation Graph (3, 0)][DBLP] DBSec, 1989, pp:257-268 [Conf]
- Riva Wenig Bickel, María M. Larrondo-Petrie
Relating Psychology's Moral Development Levels to the Ethical Use of Computers (Abstract). [Citation Graph (0, 0)][DBLP] ACM Conference on Computer Science, 1990, pp:440- [Conf]
- Eduardo B. Fernández, Krishnakumar R. Nair, María M. Larrondo-Petrie, Yan Xu
High-Level Security Issues in Multimedia/Hypertext Systems. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1996, pp:13-24 [Conf]
- Eduardo B. Fernández, Michael VanHilst, María M. Larrondo-Petrie, Shihong Huang
Defining Security Requirements Through Misuse Actions. [Citation Graph (0, 0)][DBLP] IFIP Workshop on Advanced Software Engineering, 2006, pp:123-137 [Conf]
- Eduardo B. Fernández, Saeed Rajput, Michael VanHilst, María M. Larrondo-Petrie
Some Security Issues of Wireless Systems. [Citation Graph (0, 0)][DBLP] ISSADS, 2005, pp:388-396 [Conf]
- Eduardo B. Fernández, María M. Larrondo-Petrie, Ehud Gudes
A Method-Based Authorization Model for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP] Security for Object-Oriented Systems, 1993, pp:135-150 [Conf]
- Eduardo B. Fernández, Tami Sorgente, María M. Larrondo-Petrie
A UML-Based Methodology for Secure Systems: The Design Stage . [Citation Graph (0, 0)][DBLP] WOSIS, 2005, pp:207-216 [Conf]
- Peter T. Breuer, Simon Pickin, María M. Larrondo-Petrie
Detecting Deadlock, Double-Free and Other Abuses in a Million Lines of Linux Kernel Source. [Citation Graph (0, 0)][DBLP] SEW, 2006, pp:223-233 [Conf]
- Riva Wenig Bickel, María M. Larrondo-Petrie, David F. Bush
EDICT for computer ethics education. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 1992, v:17, n:1, pp:81-89 [Journal]
Designing Secure SCADA Systems Using Security Patterns. [Citation Graph (, )][DBLP]
Attack Patterns: A New Forensic and Design Tool. [Citation Graph (, )][DBLP]
Patterns and Pattern Diagrams for Access Control. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|