The SCEAS System
Navigation Menu

Search the dblp DataBase


Simon R. Wiseman: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Simon R. Wiseman
    The Control of Integrity in Databases. [Citation Graph (2, 0)][DBLP]
    DBSec, 1990, pp:191-204 [Conf]
  2. Simon R. Wiseman
    Abstract and Concrete Models for Secure Database Applications. [Citation Graph (1, 0)][DBLP]
    DBSec, 1991, pp:239-273 [Conf]
  3. C. Cant, Simon R. Wiseman
    Simple Assured Bastion Hosts. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:24-33 [Conf]
  4. S. Lewis, Simon R. Wiseman
    Securing an Object Relational Database. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:59-68 [Conf]
  5. Bryony Pomeroy, Simon R. Wiseman
    Private Desktops and Shared Store. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:190-0 [Conf]
  6. Tim Wilkinson, Dave Hearn, Simon R. Wiseman
    Trustworthy Access Control with Untrustworthy Web Servers. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:12-21 [Conf]
  7. Simon R. Wiseman, Bryony Pomeroy
    SPEAR: Extending ER for Dynamic Behaviour and Refinement. [Citation Graph (0, 0)][DBLP]
    BNCOD, 1996, pp:107-123 [Conf]
  8. Simon R. Wiseman
    The Conflict Between Confidentiality and Integrity. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:241-242 [Conf]
  9. Simon R. Wiseman
    On the Problem of Security in Data Bases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:301-310 [Conf]
  10. Simon R. Wiseman
    Using SWORD for the Military Aircraft Command Example Database. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:73-90 [Conf]
  11. Simon R. Wiseman
    Security Properties of the SWORD Secure DBMS design. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:181-196 [Conf]
  12. Simon R. Wiseman
    Field Level Classification and SQL. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:247-258 [Conf]
  13. Kay Hughes, Simon R. Wiseman
    Analysis of Information Security Risks: Policy for Protection Through to Implementation. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:129-140 [Conf]
  14. C. L. Robinson, Simon R. Wiseman
    A Consideration of the Modes of Operation for Secure Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:335-356 [Conf]
  15. P. Terry, Simon R. Wiseman
    A "New" Security Policy Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:215-228 [Conf]
  16. Simon R. Wiseman
    A Secure Capability Computer System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:86-94 [Conf]
  17. Simon R. Wiseman
    Classification services in the SWORD secure DBMS. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:4, pp:307-321 [Journal]

Search in 0.102secs, Finished in 0.103secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002