|
Search the dblp DataBase
D. J. Thomsen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- J. Thomas Haigh, Richard C. O'Brien, D. J. Thomsen
The LDV Secure Relational DBMS Model. [Citation Graph (4, 0)][DBLP] DBSec, 1990, pp:265-280 [Conf]
- C. Payne, D. J. Thomsen, J. Bogle, Richard C. O'Brien
Napoleon: A Recipe for Workflow. [Citation Graph (0, 0)][DBLP] ACSAC, 1999, pp:134-142 [Conf]
- D. J. Thomsen, D. O'Brien, J. Bogle
Role-Based Access Control Framework for Network Enterprises. [Citation Graph (0, 0)][DBLP] ACSAC, 1998, pp:50-58 [Conf]
- D. J. Thomsen
Role-Based Application Design and Enforcement. [Citation Graph (0, 0)][DBLP] DBSec, 1990, pp:151-168 [Conf]
- D. J. Thomsen, J. Thomas Haigh, Carl E. Landwehr
Discussion Notes and Research Question List. [Citation Graph (0, 0)][DBLP] DBSec, 1988, pp:263-280 [Conf]
- D. J. Thomsen, W. T. Tsai, Bhavani M. Thuraisingham
Prototyping as a Research Tool for MLS/DBMS. [Citation Graph (0, 0)][DBLP] DBSec, 1988, pp:63-84 [Conf]
- D. J. Thomsen, Richard C. O'Brien, C. Payne
Napoleon: Network Application Policy Environment. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1999, pp:145-152 [Conf]
Prototyping to explore MLS/DBMS design. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|