|
Search the dblp DataBase
Timothy Redmond:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Leo Marcus, Timothy Redmond
Two Automated Methods in Implementation Proofs. [Citation Graph (0, 0)][DBLP] CADE, 1988, pp:622-642 [Conf]
- Sandra Rawlings Murphy, Stephen Crocker, Timothy Redmond
Unwinding and the LOCK Proof Referees Study. [Citation Graph (0, 0)][DBLP] CSFW, 1992, pp:9-21 [Conf]
- Jaisook Landauer, Timothy Redmond
A Framework for Composition of Security Models. [Citation Graph (0, 0)][DBLP] CSFW, 1992, pp:157-166 [Conf]
- Jaisook Landauer, Timothy Redmond
A Lattice of Information. [Citation Graph (0, 0)][DBLP] CSFW, 1993, pp:65-70 [Conf]
- Jaisook Landauer, Timothy Redmond, T. Benzel
Formal Policies for Trusted Processes. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:31-40 [Conf]
- Leo Marcus, Timothy Redmond
A Model-Theoretic Approach to Specifying, Verifying and Hooking Up Security Policies. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:127-138 [Conf]
- Calvin Ko, Timothy Redmond
Noninterference and Intrusion Detection. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2002, pp:177-187 [Conf]
- Ömer Egecioglu, Timothy Redmond, Charles Ryavec
From a Polynomial Riemann Hypothesis to Alternating Sign Matrices. [Citation Graph (0, 0)][DBLP] Electr. J. Comb., 2001, v:8, n:1, pp:- [Journal]
Managing Change: An Ontology Version Control System. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|