The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

John A. McDermid: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John E. Dobson, John A. McDermid
    Security Models and Enterprise Models. [Citation Graph (1, 0)][DBLP]
    DBSec, 1988, pp:1-39 [Conf]
  2. Philip Morris, John A. McDermid
    The Structure of Permissions: A Normative Framework for Access Rights. [Citation Graph (1, 0)][DBLP]
    DBSec, 1991, pp:77-97 [Conf]
  3. A. D. Hutcheon, D. T. Jordan, John A. McDermid, R. H. Pierce, I. C. Wand, B. J. Jepson
    Tool Support for High Integrity Ada Software. [Citation Graph (0, 0)][DBLP]
    Ada-Europe, 1994, pp:63-75 [Conf]
  4. Tse-Min Lin, John A. McDermid
    (True) Polymorphism in SPARK2000. [Citation Graph (0, 0)][DBLP]
    Ada-Europe, 2000, pp:252-265 [Conf]
  5. Tse-Min Lin, John A. McDermid
    A Behavioural Notion of Subtyping for Object-Oriented Programming in SPARK95. [Citation Graph (0, 0)][DBLP]
    Ada-Europe, 2003, pp:309-321 [Conf]
  6. John A. McDermid, Shaoying Liu
    A Case Study Using SAM - Safety Analysis of PES. [Citation Graph (0, 0)][DBLP]
    APSEC, 1996, pp:217-0 [Conf]
  7. David A. Duffy, Craig MacNish, John A. McDermid, Philip Morris
    A Framework for Requirements Analysis Using Automated Reasoning [Citation Graph (0, 0)][DBLP]
    CAiSE, 1995, pp:68-81 [Conf]
  8. John A. McDermid, Qi Shi
    A Formal Model of Security Dependency for Analysis and Testing of Secure Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:188-200 [Conf]
  9. John A. McDermid, Ernest S. Hocking
    Security Policies for Integrated Project Support Environments. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:41-74 [Conf]
  10. Philip Morris, John A. McDermid
    Formalizing and Validating Complex Security Requirements. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:113-124 [Conf]
  11. Stephen P. Wilson, John A. McDermid, P. M. Kirkham, Peter Fenelon
    The Safety Argument Manager: An Integrated Approach to the Engineering and Safety Assessment of Computer Based Systems. [Citation Graph (0, 0)][DBLP]
    ECBS, 1996, pp:198-205 [Conf]
  12. Alexandre Marcos Lins de Vasconcelos, John A. McDermid
    Incremental processing of Z specifications. [Citation Graph (0, 0)][DBLP]
    FORTE, 1992, pp:53-69 [Conf]
  13. John A. McDermid
    Software Hazard and Safety Analysis. [Citation Graph (0, 0)][DBLP]
    FTRTFT, 2002, pp:23-36 [Conf]
  14. John A. McDermid, G. Morgan
    Low Level Synchronisation Problems in Digital Systems. [Citation Graph (0, 0)][DBLP]
    FTRTFT, 1988, pp:139-141 [Conf]
  15. John A. McDermid
    Complexity: Concept, Causes and Control. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2000, pp:2-0 [Conf]
  16. Stephen P. Wilson, John A. McDermid, C. H. Pygott, David J. Tombs
    Assessing Complex Computer Based Systems using the Goal Structuring Notation. [Citation Graph (0, 0)][DBLP]
    ICECCS, 1996, pp:498-505 [Conf]
  17. Shaoying Liu, Fumiko Nagoya, Yuting Chen, Masashi Goya, John A. McDermid
    An Automated Approach to Specification-Based Program Inspection. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2005, pp:421-434 [Conf]
  18. John A. McDermid, Andy Galloway
    Three Perspectives in Formal Engineering. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2006, pp:35-54 [Conf]
  19. John A. McDermid, Andy Galloway, Simon Burton, John A. Clark, Ian Toyn, Nigel Tracey, Samuel H. Valentine
    Towards Industrially Applicable Formal Methods: Three Small Steps and One Giant Leap. [Citation Graph (0, 0)][DBLP]
    ICFEM, 1998, pp:76-0 [Conf]
  20. Neil C. Audsley, Iain Bate, Steven Crook-Dawkins, John McDermid
    Improving certification capability through automatic code generation. [Citation Graph (0, 0)][DBLP]
    IFIP Congress Topical Sessions, 2004, pp:511-520 [Conf]
  21. Eman Nasr, John McDermid, Guillem Bernat
    A Technique for Managing Complexity of Use Cases for Large Complex Embedded Systems. [Citation Graph (0, 0)][DBLP]
    Symposium on Object-Oriented Real-Time Distributed Computing, 2002, pp:225-232 [Conf]
  22. Itana Maria de Souza Gimenes, John A. McDermid
    Investigating and Formalising the Development of HIS Within PSEEs. [Citation Graph (0, 0)][DBLP]
    ISPW, 1993, pp:90-94 [Conf]
  23. Alan Stephenson, Darren L. Buttle, John A. McDermid
    Extending Commonality Analysis for Embedded Control System Families. [Citation Graph (0, 0)][DBLP]
    IW-SAPF, 2000, pp:217-224 [Conf]
  24. Nigel Tracey, John A. Clark, Keith Mander, John A. McDermid
    An Automated Framework for Structural Test-Data Generation. [Citation Graph (0, 0)][DBLP]
    ASE, 1998, pp:285-288 [Conf]
  25. Karen Allenby, Simon Burton, Darren L. Buttle, John A. McDermid, John Murdoch, Alan Stephenson, Mike Bardill, Stuart Hutchesson
    A Family-Oriented Software Development Process for Engine Controllers. [Citation Graph (0, 0)][DBLP]
    PROFES, 2001, pp:210-226 [Conf]
  26. Joanne M. Atlee, John A. McDermid
    Integrating requirements analysis and safety analysis. [Citation Graph (0, 0)][DBLP]
    RE, 1995, pp:158-159 [Conf]
  27. W. Lam, John A. McDermid, Andrew Vickers
    Ten Steps Towards Systematic Requirements Reuse. [Citation Graph (0, 0)][DBLP]
    RE, 1997, pp:6-15 [Conf]
  28. Shaoying Liu, John A. McDermid
    Dynamic Sets and Their Application in VDM. [Citation Graph (0, 0)][DBLP]
    SAC, 1993, pp:187-192 [Conf]
  29. Richard F. Paige, Howard Chivers, John A. McDermid, Zoë R. Stephenson
    High-integrity extreme programming. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1518-1523 [Conf]
  30. Tim P. Kelly, John A. McDermid
    A Systematic Approach to Safety Case Maintenance. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 1999, pp:13-26 [Conf]
  31. Peter A. Lindsay, John A. McDermid, David J. Tombs
    Deriving Quantified Safety Requirements in Complex Systems. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2000, pp:117-130 [Conf]
  32. Yiannis Papadopoulos, John A. McDermid
    Hierarchically Performed Hazard Origin and Propagation Studies. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 1999, pp:139-152 [Conf]
  33. Iain Bate, Richard Hawkin, John A. McDermid
    A Contract-based Approach to Designing Safe Systems. [Citation Graph (0, 0)][DBLP]
    SCS, 2003, pp:25-36 [Conf]
  34. Philippa Conmy, John A. McDermid
    High Level Failure Analysis for Integrated Modular Avionics. [Citation Graph (0, 0)][DBLP]
    SCS, 2001, pp:13-22 [Conf]
  35. Philippa Conmy, Mark Nicholson, John A. McDermid
    Safety Assurance Contracts for Integrated Modular Avionics. [Citation Graph (0, 0)][DBLP]
    SCS, 2003, pp:69-78 [Conf]
  36. John A. McDermid
    Software Safety: Where's the Evidence? [Citation Graph (0, 0)][DBLP]
    SCS, 2001, pp:1-6 [Conf]
  37. John A. McDermid
    Trends in Systems Safety. [Citation Graph (0, 0)][DBLP]
    SCS, 2002, pp:3-8 [Conf]
  38. John E. Dobson, John A. McDermid
    A Framework for Expressing Models of Security Policy. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:229-241 [Conf]
  39. Qi Shi, John A. McDermid
    Constructing Secure Distributed Systems Using Components. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1993, pp:143-152 [Conf]
  40. W. Lam, John A. McDermid
    A Summary of Domain Analysis Experience by Way of Heuristics. [Citation Graph (0, 0)][DBLP]
    SSR, 1997, pp:54-64 [Conf]
  41. Eman Nasr, John McDermid, Guillem Bernat
    Eliciting and Specifying Requirements with Use Cases for Embedded Systems. [Citation Graph (0, 0)][DBLP]
    WORDS, 2002, pp:350-358 [Conf]
  42. Jon G. Hall, John A. McDermid
    Towards a Z Method: Axiomatic Specification in Z. [Citation Graph (0, 0)][DBLP]
    Z User Workshop, 1994, pp:213-229 [Conf]
  43. Andrew Coombes, John A. McDermid
    Using Diagrams to Give a Formal Specification of Timing Constraints in Z. [Citation Graph (0, 0)][DBLP]
    Z User Workshop, 1992, pp:119-130 [Conf]
  44. Andrew Coombes, John A. McDermid
    A Tool for Defining the Architecture of Z Specifications. [Citation Graph (0, 0)][DBLP]
    Z User Workshop, 1990, pp:77-92 [Conf]
  45. David Jordan, John A. McDermid, Ian Toyn
    CADIZ - Computer Aided Design in Z. [Citation Graph (0, 0)][DBLP]
    Z User Workshop, 1990, pp:93-104 [Conf]
  46. Peter J. Whysall, John A. McDermid
    An Approach to Object-Oriented Specification Using Z. [Citation Graph (0, 0)][DBLP]
    Z User Workshop, 1990, pp:193-215 [Conf]
  47. Zoë R. Stephenson, John A. McDermid, Jason Choy
    Using Simulation to Validate Style-Specific Architectural Refactoring Patterns. [Citation Graph (0, 0)][DBLP]
    SEW, 2006, pp:123-132 [Conf]
  48. L. M. Barroca, John A. McDermid
    Formal Methods: Use and Relevance for the Development of Safety-Critical Systems. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1992, v:35, n:6, pp:579-599 [Journal]
  49. Iain Bate, Philippa Conmy, Tim Kelly, John A. McDermid
    Use of Modern Processors in Safety-Critical Applications. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2001, v:44, n:6, pp:531-543 [Journal]
  50. Alan Burns, John A. McDermid, John E. Dobson
    On the Meaning of Safety and Security. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1992, v:35, n:1, pp:3-15 [Journal]
  51. Stephen P. Wilson, John A. McDermid
    Integrated Analysis of Complex Safety Critical Systems. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1995, v:38, n:10, pp:765-776 [Journal]
  52. Nancy Talbert, John A. McDermid
    The Cost of COTS (Interview). [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:6, pp:46-52 [Journal]
  53. Howard Chivers, John A. McDermid
    Refactoring service-based systems: how to avoid trusting a workflow service. [Citation Graph (0, 0)][DBLP]
    Concurrency and Computation: Practice and Experience, 2006, v:18, n:10, pp:1255-1275 [Journal]
  54. Darren L. Buttle, John A. Clark, John A. McDermid, Alan Stephenson, Nigel J. Tracey
    CONVERSE: A change-oriented process for engine controllers. [Citation Graph (0, 0)][DBLP]
    IEE Proceedings - Software, 1999, v:146, n:3, pp:130-136 [Journal]
  55. John A. McDermid, Keith H. Bennett
    Software engineering research: A critical appraisal. [Citation Graph (0, 0)][DBLP]
    IEE Proceedings - Software, 1999, v:146, n:4, pp:179-186 [Journal]
  56. Peter Fenelon, John A. McDermid
    An integrated tool set for software safety analysis. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1993, v:21, n:3, pp:279-290 [Journal]
  57. Shaoying Liu, John A. McDermid
    A Model-Oriented Approach to Safety Analysis Using Fault Trees and a Support System. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1996, v:35, n:2, pp:151-164 [Journal]
  58. Ian Toyn, David M. Cattrall, John A. McDermid, Jeremy L. Jacob
    A practical language and toolkit for high-integrity tools. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1998, v:41, n:3, pp:161-173 [Journal]
  59. W. Lam, John A. McDermid, Andrew Vickers
    Ten Steps Towards Systematic Requirements Reuse. [Citation Graph (0, 0)][DBLP]
    Requir. Eng., 1997, v:2, n:2, pp:102-113 [Journal]
  60. Jonathan D. Moffett, Jon G. Hall, Andrew Coombes, John A. McDermid
    A Model for a Causal Logic for Requirements Engineering. [Citation Graph (0, 0)][DBLP]
    Requir. Eng., 1996, v:1, n:1, pp:27-46 [Journal]
  61. Alan W. Brown, John A. McDermid
    Learning from IPSE's Mistakes. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1992, v:9, n:2, pp:23-28 [Journal]
  62. Ian Toyn, John A. McDermid
    CADiZ: An Architecture for Z Tools and its Implementation. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1995, v:25, n:3, pp:305-330 [Journal]
  63. Nigel Tracey, John A. Clark, Keith Mander, John A. McDermid
    Automated test-data generation for exception conditions. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2000, v:30, n:1, pp:61-79 [Journal]
  64. Sun-Woo Kim, John A. Clark, John A. McDermid
    Investigating the effectiveness of object-oriented testing strategies using the mutation method. [Citation Graph (0, 0)][DBLP]
    Softw. Test., Verif. Reliab., 2001, v:11, n:3, pp:207-225 [Journal]
  65. Alan W. Brown, John A. McDermid
    The Art and Science of Software Architecture. [Citation Graph (0, 0)][DBLP]
    ECSA, 2007, pp:237-256 [Conf]

  66. Towards an Object Oriented Development Environment for Secure Applications. [Citation Graph (, )][DBLP]


  67. Domain analysis on an electronic health records system. [Citation Graph (, )][DBLP]


  68. Probabilistic Failure Propagation and Transformation Analysis. [Citation Graph (, )][DBLP]


  69. Establishing a Framework for Dynamic Risk Management in 'Intelligent' Aero-Engine Control. [Citation Graph (, )][DBLP]


  70. Development of High-Integrity Software Product Lines Using Model Transformation. [Citation Graph (, )][DBLP]


  71. Using Model Checking to Validate Style-Specific Architectural Refactoring Patterns. [Citation Graph (, )][DBLP]


  72. On the Formal Development of Safety-Critical Software. [Citation Graph (, )][DBLP]


Search in 0.971secs, Finished in 0.974secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002