The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jonathan D. Moffett: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dirk Jonscher, Jonathan D. Moffett, Klaus R. Dittrich
    Complex Subjects, or: The Striving for Complexity is Ruling our World. [Citation Graph (1, 0)][DBLP]
    DBSec, 1993, pp:19-37 [Conf]
  2. Jonathan D. Moffett, Morris Sloman
    The Source of Authority for Commercial Access Control. [Citation Graph (1, 0)][DBLP]
    IEEE Computer, 1988, v:21, n:2, pp:59-69 [Journal]
  3. Andreas Schaad, Jonathan D. Moffett
    A Framework for Organisational Control Principles. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:229-238 [Conf]
  4. Jonathan D. Moffett, Morris Sloman
    The representation of policies as system objects. [Citation Graph (0, 0)][DBLP]
    COOCS, 1991, pp:171-184 [Conf]
  5. Morris Sloman, Barry J. Varley, Jonathan D. Moffett, Kevin P. Twidle
    Domain Management and Accounting in an International Cellular Network. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 1993, pp:193-206 [Conf]
  6. Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh
    Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements. [Citation Graph (0, 0)][DBLP]
    iTrust, 2004, pp:347-354 [Conf]
  7. Arosha K. Bandara, Emil Lupu, Jonathan D. Moffett, Alessandra Russo
    A Goal-based Approach to Policy Refinement. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:229-239 [Conf]
  8. Andreas Schaad, Jonathan D. Moffett
    Delegation of Obligations. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:25-35 [Conf]
  9. Jonathan D. Moffett
    Control Principles and Role Hierarchies. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:63-69 [Conf]
  10. Jonathan D. Moffett, Emil Lupu
    The Uses of Role Hierarchies in Access Control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:153-160 [Conf]
  11. Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh
    The Effect of Trust Assumptions on the Elaboration of Security Requirements. [Citation Graph (0, 0)][DBLP]
    RE, 2004, pp:102-111 [Conf]
  12. Luncheng Lin, Bashar Nuseibeh, Darrel C. Ince, Michael Jackson, Jonathan D. Moffett
    Introducing Abuse Frames for Analysing Security Requirements. [Citation Graph (0, 0)][DBLP]
    RE, 2003, pp:371-372 [Conf]
  13. Andreas Schaad, Jonathan D. Moffett
    Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:1380-1384 [Conf]
  14. Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi Ravi
    Making access control more usable. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:141- [Conf]
  15. Andreas Schaad, Jonathan D. Moffett
    A lightweight approach to specification and analysis of role-based access control extensions. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:13-22 [Conf]
  16. Andreas Schaad, Jonathan D. Moffett, Jeremy Jacob
    The role-based access control system of a European bank: a case study and discussion. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:3-9 [Conf]
  17. Axel Kern, Martin Kuhlmann, Andreas Schaad, Jonathan D. Moffett
    Observations on the role life-cycle in the context of enterprise security management. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:43-51 [Conf]
  18. Axel Kern, Andreas Schaad, Jonathan D. Moffett
    An administration concept for the enterprise role-based access control model. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:3-11 [Conf]
  19. David Peter Eames, Jonathan D. Moffett
    The Integration of Safety and Security Requirements. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 1999, pp:468-480 [Conf]
  20. Richard Evans, Jonathan D. Moffett
    Derivation of Safety Targets for the Random Failure of Programmable Vehicle Based Systems. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2000, pp:240-249 [Conf]
  21. Morris Sloman, Jonathan D. Moffett
    Domain model of autonomy. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1988, pp:- [Conf]
  22. Jonathan D. Moffett, Morris Sloman
    A Case Study in Representing a Model: to Z or not to Z? [Citation Graph (0, 0)][DBLP]
    Z User Workshop, 1990, pp:254-268 [Conf]
  23. Jonathan D. Moffett, Andrew Vickers
    Behavioural Conflicts in a Causal Specification. [Citation Graph (0, 0)][DBLP]
    Autom. Softw. Eng., 2000, v:7, n:3, pp:215-238 [Journal]
  24. Susan Barry, Patricia McQuillan, Michael Purser, Jonathan D. Moffett
    Implementing and Proving Security Services for the RARE/COSINE Community. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1993, v:26, n:3, pp:263-267 [Journal]
  25. Jonathan D. Moffett, Morris Sloman, Kevin P. Twidle
    Specifying discretionary access control policy for distributed systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1990, v:13, n:9, pp:571-580 [Journal]
  26. Marshall D. Abrams, Jonathan D. Moffett
    A higher level of computer security through active policies. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:2, pp:147-157 [Journal]
  27. Jonathan D. Moffett, Morris Sloman
    User and mechanism views of distributed systems management. [Citation Graph (0, 0)][DBLP]
    Distributed Systems Engineering, 1993, v:1, n:1, pp:37-47 [Journal]
  28. Hanan Lutfiyya, Francisco Garcia, Jonathan D. Moffett
    Policy 2003: Workshop on Policies for Distributed Systems and Networks. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2003, v:11, n:3, pp:- [Journal]
  29. Jonathan D. Moffett, Morris Sloman
    Policies Hierarchies for Distributed Systems Management. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:9, pp:1404-1414 [Journal]
  30. Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh
    Using trust assumptions with security requirements. [Citation Graph (0, 0)][DBLP]
    Requir. Eng., 2006, v:11, n:2, pp:138-151 [Journal]
  31. Jonathan D. Moffett, Jon G. Hall, Andrew Coombes, John A. McDermid
    A Model for a Causal Logic for Requirements Engineering. [Citation Graph (0, 0)][DBLP]
    Requir. Eng., 1996, v:1, n:1, pp:27-46 [Journal]
  32. Jonathan D. Moffett, Morris Sloman
    Content-Dependent Access Control. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1991, v:25, n:2, pp:63-70 [Journal]

Search in 0.122secs, Finished in 0.123secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002