|
Search the dblp DataBase
Richard C. O'Brien:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- J. Thomas Haigh, Richard C. O'Brien, D. J. Thomsen
The LDV Secure Relational DBMS Model. [Citation Graph (4, 0)][DBLP] DBSec, 1990, pp:265-280 [Conf]
- C. Payne, D. J. Thomsen, J. Bogle, Richard C. O'Brien
Napoleon: A Recipe for Workflow. [Citation Graph (0, 0)][DBLP] ACSAC, 1999, pp:134-142 [Conf]
- Todd Fine, J. Thomas Haigh, Richard C. O'Brien, Dana L. Toups
Noninterference and the Unwinding for LOCK. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:22-28 [Conf]
- J. Thomas Haigh, Richard C. O'Brien, P. D. Stachour, Dana L. Toups
The LDV Approach to Database Security. [Citation Graph (0, 0)][DBLP] DBSec, 1989, pp:323-339 [Conf]
- D. J. Thomsen, Richard C. O'Brien, C. Payne
Napoleon: Network Application Policy Environment. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1999, pp:145-152 [Conf]
- Richard C. O'Brien
An upper bound on the path number of a digraph. [Citation Graph (0, 0)][DBLP] J. Comb. Theory, Ser. B, 1977, v:22, n:2, pp:168-174 [Journal]
Trapping Malicious Insiders in the SPDR Web. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|