Search the dblp DataBase
Jonathan D. Moffett :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dirk Jonscher , Jonathan D. Moffett , Klaus R. Dittrich Complex Subjects, or: The Striving for Complexity is Ruling our World. [Citation Graph (1, 0)][DBLP ] DBSec, 1993, pp:19-37 [Conf ] Jonathan D. Moffett , Morris Sloman The Source of Authority for Commercial Access Control. [Citation Graph (1, 0)][DBLP ] IEEE Computer, 1988, v:21, n:2, pp:59-69 [Journal ] Andreas Schaad , Jonathan D. Moffett A Framework for Organisational Control Principles. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:229-238 [Conf ] Jonathan D. Moffett , Morris Sloman The representation of policies as system objects. [Citation Graph (0, 0)][DBLP ] COOCS, 1991, pp:171-184 [Conf ] Morris Sloman , Barry J. Varley , Jonathan D. Moffett , Kevin P. Twidle Domain Management and Accounting in an International Cellular Network. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 1993, pp:193-206 [Conf ] Charles B. Haley , Robin C. Laney , Jonathan D. Moffett , Bashar Nuseibeh Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements. [Citation Graph (0, 0)][DBLP ] iTrust, 2004, pp:347-354 [Conf ] Arosha K. Bandara , Emil Lupu , Jonathan D. Moffett , Alessandra Russo A Goal-based Approach to Policy Refinement. [Citation Graph (0, 0)][DBLP ] POLICY, 2004, pp:229-239 [Conf ] Andreas Schaad , Jonathan D. Moffett Delegation of Obligations. [Citation Graph (0, 0)][DBLP ] POLICY, 2002, pp:25-35 [Conf ] Jonathan D. Moffett Control Principles and Role Hierarchies. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1998, pp:63-69 [Conf ] Jonathan D. Moffett , Emil Lupu The Uses of Role Hierarchies in Access Control. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1999, pp:153-160 [Conf ] Charles B. Haley , Robin C. Laney , Jonathan D. Moffett , Bashar Nuseibeh The Effect of Trust Assumptions on the Elaboration of Security Requirements. [Citation Graph (0, 0)][DBLP ] RE, 2004, pp:102-111 [Conf ] Luncheng Lin , Bashar Nuseibeh , Darrel C. Ince , Michael Jackson , Jonathan D. Moffett Introducing Abuse Frames for Analysing Security Requirements. [Citation Graph (0, 0)][DBLP ] RE, 2003, pp:371-372 [Conf ] Andreas Schaad , Jonathan D. Moffett Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles. [Citation Graph (0, 0)][DBLP ] SAC, 2004, pp:1380-1384 [Conf ] Elisa Bertino , Trent Jaeger , Jonathan D. Moffett , Sylvia L. Osborn , Ravi Ravi Making access control more usable. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:141- [Conf ] Andreas Schaad , Jonathan D. Moffett A lightweight approach to specification and analysis of role-based access control extensions. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:13-22 [Conf ] Andreas Schaad , Jonathan D. Moffett , Jeremy Jacob The role-based access control system of a European bank: a case study and discussion. [Citation Graph (0, 0)][DBLP ] SACMAT, 2001, pp:3-9 [Conf ] Axel Kern , Martin Kuhlmann , Andreas Schaad , Jonathan D. Moffett Observations on the role life-cycle in the context of enterprise security management. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:43-51 [Conf ] Axel Kern , Andreas Schaad , Jonathan D. Moffett An administration concept for the enterprise role-based access control model. [Citation Graph (0, 0)][DBLP ] SACMAT, 2003, pp:3-11 [Conf ] David Peter Eames , Jonathan D. Moffett The Integration of Safety and Security Requirements. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 1999, pp:468-480 [Conf ] Richard Evans , Jonathan D. Moffett Derivation of Safety Targets for the Random Failure of Programmable Vehicle Based Systems. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2000, pp:240-249 [Conf ] Morris Sloman , Jonathan D. Moffett Domain model of autonomy. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1988, pp:- [Conf ] Jonathan D. Moffett , Morris Sloman A Case Study in Representing a Model: to Z or not to Z? [Citation Graph (0, 0)][DBLP ] Z User Workshop, 1990, pp:254-268 [Conf ] Jonathan D. Moffett , Andrew Vickers Behavioural Conflicts in a Causal Specification. [Citation Graph (0, 0)][DBLP ] Autom. Softw. Eng., 2000, v:7, n:3, pp:215-238 [Journal ] Susan Barry , Patricia McQuillan , Michael Purser , Jonathan D. Moffett Implementing and Proving Security Services for the RARE/COSINE Community. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1993, v:26, n:3, pp:263-267 [Journal ] Jonathan D. Moffett , Morris Sloman , Kevin P. Twidle Specifying discretionary access control policy for distributed systems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1990, v:13, n:9, pp:571-580 [Journal ] Marshall D. Abrams , Jonathan D. Moffett A higher level of computer security through active policies. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1995, v:14, n:2, pp:147-157 [Journal ] Jonathan D. Moffett , Morris Sloman User and mechanism views of distributed systems management. [Citation Graph (0, 0)][DBLP ] Distributed Systems Engineering, 1993, v:1, n:1, pp:37-47 [Journal ] Hanan Lutfiyya , Francisco Garcia , Jonathan D. Moffett Policy 2003: Workshop on Policies for Distributed Systems and Networks. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2003, v:11, n:3, pp:- [Journal ] Jonathan D. Moffett , Morris Sloman Policies Hierarchies for Distributed Systems Management. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:9, pp:1404-1414 [Journal ] Charles B. Haley , Robin C. Laney , Jonathan D. Moffett , Bashar Nuseibeh Using trust assumptions with security requirements. [Citation Graph (0, 0)][DBLP ] Requir. Eng., 2006, v:11, n:2, pp:138-151 [Journal ] Jonathan D. Moffett , Jon G. Hall , Andrew Coombes , John A. McDermid A Model for a Causal Logic for Requirements Engineering. [Citation Graph (0, 0)][DBLP ] Requir. Eng., 1996, v:1, n:1, pp:27-46 [Journal ] Jonathan D. Moffett , Morris Sloman Content-Dependent Access Control. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1991, v:25, n:2, pp:63-70 [Journal ] Search in 0.003secs, Finished in 0.005secs