The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Judith N. Froscher: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Robert J. K. Jacob, Judith N. Froscher
    A Software Engineering Methodology for Rule-Based Systems. [Citation Graph (6, 5)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1990, v:2, n:2, pp:173-189 [Journal]
  2. Judith N. Froscher, Catherine Meadows
    Achieving a Trusted Database Management System Using Parallelism. [Citation Graph (2, 0)][DBLP]
    DBSec, 1988, pp:151-160 [Conf]
  3. Myong H. Kang, Brian J. Eppinger, Judith N. Froscher
    Tools to Support Secure Enterprise Computing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:143-0 [Conf]
  4. Myong H. Kang, Judith N. Froscher, Brian J. Eppinger
    Towards an Infrastructure for MLS Distributed Computing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:91-100 [Conf]
  5. Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz
    An Architecture for Multilevel Secure Interoperability. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:194-204 [Conf]
  6. Myong H. Kang, Judith N. Froscher, Amit P. Sheth, Krys Kochut, John A. Miller
    A Multilevel Secure Workflow Management System. [Citation Graph (0, 0)][DBLP]
    CAiSE, 1999, pp:271-285 [Conf]
  7. Oliver Costich, Myong H. Kang, Judith N. Froscher
    The SINTRA Data Model: Structure and Operations. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:97-110 [Conf]
  8. Myong H. Kang, Oliver Costich, Judith N. Froscher
    A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:285-300 [Conf]
  9. Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, Ira S. Moskowitz
    A Strategy for an MLS Workflow Management System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:161-174 [Conf]
  10. Robert J. K. Jacob, Judith N. Froscher
    Software Engineering for Rule-Based Software Systems. [Citation Graph (0, 0)][DBLP]
    FJCC, 1986, pp:185-188 [Conf]
  11. Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz
    A framework for MLS interoperability. [Citation Graph (0, 0)][DBLP]
    HASE, 1996, pp:198-205 [Conf]
  12. J. McDermott, A. Kim, Judith N. Froscher
    Merging paradigms of survivability and security: stochastic faults and designed faults. [Citation Graph (0, 0)][DBLP]
    NSPW, 2003, pp:19-25 [Conf]
  13. Myong H. Kang, Oliver Costich, Judith N. Froscher
    Using Object Modeling Techniques to Design MLS Data Models. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:203-211 [Conf]
  14. Myong H. Kang, Joon S. Park, Judith N. Froscher
    Access control mechanisms for inter-organizational workflow. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:66-74 [Conf]
  15. Joon S. Park, Myong H. Kang, Judith N. Froscher
    A Secure Workflow System for Dynamic Collaboration. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:167-182 [Conf]
  16. Myong H. Kang, Judith N. Froscher
    A Framework for Secure Enterprise Computing. [Citation Graph (0, 0)][DBLP]
    WETICE, 2000, pp:219-220 [Conf]
  17. Myong H. Kang, Judith N. Froscher
    A Tool for Secure Inter-Organizational Computing. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:194-199 [Conf]

Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002