Search the dblp DataBase
John E. Dobson :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
John E. Dobson , John A. McDermid Security Models and Enterprise Models. [Citation Graph (1, 0)][DBLP ] DBSec, 1988, pp:1-39 [Conf ] Brian Randell , John E. Dobson Reliability and Security Issues in Distributed Computing Systems. [Citation Graph (1, 0)][DBLP ] Symposium on Reliability in Distributed Software and Database Systems, 1986, pp:113-118 [Conf ] John E. Dobson , Brian Randell Building Reliable Secure Computing Systems out of Unreliable Insecure Components. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:162-173 [Conf ] John E. Dobson Security and Databases: A Personal View. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:11-21 [Conf ] John E. Dobson Conversation Structures as a Means of Specifying Security Policy. [Citation Graph (0, 0)][DBLP ] DBSec, 1989, pp:25-39 [Conf ] John E. Dobson Information and Denial of Service. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:21-46 [Conf ] John E. Dobson Report of Discussion Sessions Following Presentations. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:382-387 [Conf ] John E. Dobson , Mike Martin Messages, Communication, Information Security: Protecting the User from the Data. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:8-23 [Conf ] Mike Martin , John E. Dobson Enterprise Modeling and Security Policies. [Citation Graph (0, 0)][DBLP ] DBSec, 1990, pp:117-150 [Conf ] Bhavani M. Thuraisingham , Sushil Jajodia , Pierangela Samarati , John E. Dobson , Martin S. Olivier Security and Privacy Issues for the World Wide Web: Panel Discussion. [Citation Graph (0, 0)][DBLP ] DBSec, 1998, pp:269-284 [Conf ] Andrew Blyth , J. Chudge , John E. Dobson , Ros Strens ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements. [Citation Graph (0, 0)][DBLP ] COOCS, 1993, pp:216-227 [Conf ] Ros Strens , Mike Martin , John E. Dobson , Stephen Plagemann Business and Market Models of Brokerage in Network-Based Commerce. [Citation Graph (0, 0)][DBLP ] IS&N, 1998, pp:315-326 [Conf ] Bridgette Wessels , John E. Dobson What Happens before Requirements Engineering? [Citation Graph (0, 0)][DBLP ] RE, 2001, pp:298-299 [Conf ] John E. Dobson , Cliff B. Jones , Rob Procter , Mark Rouncefield , Robin Williams Editorial message: special track on inter-disciplinary approaches to the design of dependable computer systems. [Citation Graph (0, 0)][DBLP ] SAC, 2002, pp:704-705 [Conf ] John E. Dobson , John A. McDermid A Framework for Expressing Models of Security Policy. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1989, pp:229-241 [Conf ] John E. Dobson , Brian Randell Building Reliable Secure Computing Systems out of Unreliable Insecure Components. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:187-193 [Conf ] Panayiotis Periorellis , John E. Dobson Modeling Dynamic Networks: Advantages and Limitations of the O-O Approach. [Citation Graph (0, 0)][DBLP ] TOOLS (31), 1999, pp:448-457 [Conf ] Alan Burns , John A. McDermid , John E. Dobson On the Meaning of Safety and Security. [Citation Graph (0, 0)][DBLP ] Comput. J., 1992, v:35, n:1, pp:3-15 [Journal ] Panayiotis Periorellis , John E. Dobson Organisational Failures in Dependable Collaborative Enterprise Systems. [Citation Graph (0, 0)][DBLP ] Journal of Object Technology, 2002, v:1, n:3, pp:107-117 [Journal ] Huey-Der Chu , John E. Dobson , I-Chiang Liu FAST: a framework for automating statistics-based testing. [Citation Graph (0, 0)][DBLP ] Software Quality Journal, 1997, v:6, n:1, pp:13-36 [Journal ] Search in 0.002secs, Finished in 0.002secs