|
Search the dblp DataBase
Judith N. Froscher:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Robert J. K. Jacob, Judith N. Froscher
A Software Engineering Methodology for Rule-Based Systems. [Citation Graph (6, 5)][DBLP] IEEE Trans. Knowl. Data Eng., 1990, v:2, n:2, pp:173-189 [Journal]
- Judith N. Froscher, Catherine Meadows
Achieving a Trusted Database Management System Using Parallelism. [Citation Graph (2, 0)][DBLP] DBSec, 1988, pp:151-160 [Conf]
- Myong H. Kang, Brian J. Eppinger, Judith N. Froscher
Tools to Support Secure Enterprise Computing. [Citation Graph (0, 0)][DBLP] ACSAC, 1999, pp:143-0 [Conf]
- Myong H. Kang, Judith N. Froscher, Brian J. Eppinger
Towards an Infrastructure for MLS Distributed Computing. [Citation Graph (0, 0)][DBLP] ACSAC, 1998, pp:91-100 [Conf]
- Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz
An Architecture for Multilevel Secure Interoperability. [Citation Graph (0, 0)][DBLP] ACSAC, 1997, pp:194-204 [Conf]
- Myong H. Kang, Judith N. Froscher, Amit P. Sheth, Krys Kochut, John A. Miller
A Multilevel Secure Workflow Management System. [Citation Graph (0, 0)][DBLP] CAiSE, 1999, pp:271-285 [Conf]
- Oliver Costich, Myong H. Kang, Judith N. Froscher
The SINTRA Data Model: Structure and Operations. [Citation Graph (0, 0)][DBLP] DBSec, 1994, pp:97-110 [Conf]
- Myong H. Kang, Oliver Costich, Judith N. Froscher
A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:285-300 [Conf]
- Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, Ira S. Moskowitz
A Strategy for an MLS Workflow Management System. [Citation Graph (0, 0)][DBLP] DBSec, 1999, pp:161-174 [Conf]
- Robert J. K. Jacob, Judith N. Froscher
Software Engineering for Rule-Based Software Systems. [Citation Graph (0, 0)][DBLP] FJCC, 1986, pp:185-188 [Conf]
- Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz
A framework for MLS interoperability. [Citation Graph (0, 0)][DBLP] HASE, 1996, pp:198-205 [Conf]
- J. McDermott, A. Kim, Judith N. Froscher
Merging paradigms of survivability and security: stochastic faults and designed faults. [Citation Graph (0, 0)][DBLP] NSPW, 2003, pp:19-25 [Conf]
- Myong H. Kang, Oliver Costich, Judith N. Froscher
Using Object Modeling Techniques to Design MLS Data Models. [Citation Graph (0, 0)][DBLP] Security for Object-Oriented Systems, 1993, pp:203-211 [Conf]
- Myong H. Kang, Joon S. Park, Judith N. Froscher
Access control mechanisms for inter-organizational workflow. [Citation Graph (0, 0)][DBLP] SACMAT, 2001, pp:66-74 [Conf]
- Joon S. Park, Myong H. Kang, Judith N. Froscher
A Secure Workflow System for Dynamic Collaboration. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:167-182 [Conf]
- Myong H. Kang, Judith N. Froscher
A Framework for Secure Enterprise Computing. [Citation Graph (0, 0)][DBLP] WETICE, 2000, pp:219-220 [Conf]
- Myong H. Kang, Judith N. Froscher
A Tool for Secure Inter-Organizational Computing. [Citation Graph (0, 0)][DBLP] WETICE, 2001, pp:194-199 [Conf]
Search in 0.002secs, Finished in 0.002secs
|