Search the dblp DataBase
Glenn H. MacEwen :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Janice I. Glasgow , Glenn H. MacEwen , Prakash Panangaden A Logic for Reasoning About Security. [Citation Graph (3, 0)][DBLP ] ACM Trans. Comput. Syst., 1992, v:10, n:3, pp:226-264 [Journal ] C. C. Gotlieb , Glenn H. MacEwen Performance of Movable-Head Disk Storage Devices. [Citation Graph (2, 0)][DBLP ] J. ACM, 1973, v:20, n:4, pp:604-623 [Journal ] Glenn H. MacEwen Effects of Distributed System Technology on Database Security: A Survey. [Citation Graph (1, 0)][DBLP ] DBSec, 1987, pp:253-261 [Conf ] Ayaz Isazadeh , Glenn H. MacEwen , Andrew J. Malton Behavioral patterns for software requirement engineering. [Citation Graph (0, 0)][DBLP ] CASCON, 1995, pp:33- [Conf ] Janice I. Glasgow , Glenn H. MacEwen Obligation as the Basis of Integrity Specification. [Citation Graph (0, 0)][DBLP ] CSFW, 1989, pp:64-70 [Conf ] Janice I. Glasgow , Glenn H. MacEwen , Prakash Panangaden Reasoning about Knowledge and Permission in Secure Distributed Systems. [Citation Graph (0, 0)][DBLP ] CSFW, 1988, pp:139-146 [Conf ] Janice I. Glasgow , Glenn H. MacEwen , Prakash Panangaden A Logic for Reasoning about Security. [Citation Graph (0, 0)][DBLP ] CSFW, 1990, pp:2-13 [Conf ] Glenn H. MacEwen , Janice I. Glasgow A Proof of Secrecy for a Network Security Model. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:176-181 [Conf ] Janice I. Glasgow , Glenn H. MacEwen , Prakash Panangaden Security by Permission in Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:197-205 [Conf ] Ayaz Isazadeh , David Alex Lamb , Glenn H. MacEwen Behavioral Views for Software Requirements Engineering. [Citation Graph (0, 0)][DBLP ] ECBS, 1996, pp:300-307 [Conf ] Glenn H. MacEwen , David B. Skillicorn Using Higher-order Logic for Modular Specification of Real-time Distributed Systems. [Citation Graph (0, 0)][DBLP ] FTRTFT, 1988, pp:36-66 [Conf ] Glenn H. MacEwen On Instrumentation Facilities in Programming Languages. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1974, pp:198-203 [Conf ] Janice I. Glasgow , Glenn H. MacEwen A Computational Model for Distributed Systems Using Operator Nets. [Citation Graph (0, 0)][DBLP ] PARLE (2), 1987, pp:243-260 [Conf ] Chantal Belzile , Michael F. Coulas , Glenn H. MacEwen , Genevieve Marquis RNet: A Hard Real-Time Distributed Programming System. [Citation Graph (0, 0)][DBLP ] IEEE Real-Time Systems Symposium, 1986, pp:2-13 [Conf ] Glenn H. MacEwen , V. W. W. Poon , Janice I. Glasgow A Model for Multilevel Security Based on Operator Nets. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1987, pp:150-160 [Conf ] Glenn H. MacEwen , B. Burwell , Z.-J. Lu Multi-Level Security Based on Physical Distribution. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1984, pp:167-179 [Conf ] Janice I. Glasgow , Glenn H. MacEwen An Operator Net Model for Distributed Systems. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 1989, v:3, n:4, pp:196-209 [Journal ] C. C. Gotlieb , Glenn H. MacEwen Errata: ``Performance of Movable-Head Disk Storage Devices''. [Citation Graph (0, 0)][DBLP ] J. ACM, 1975, v:22, n:1, pp:172- [Journal ] Glenn H. MacEwen , T. Patrick Martin Abstraction hierarchies in top-down design. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1981, v:2, n:3, pp:213-224 [Journal ] Sam K. Oh , Glenn H. MacEwen Task Behavior Monitoring for Adaptive Real-Time Communication. [Citation Graph (0, 0)][DBLP ] Real-Time Systems, 1996, v:11, n:2, pp:173-195 [Journal ] Glenn H. MacEwen A Simulation Sequencing Algorithm. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1977, v:7, n:2, pp:165-172 [Journal ] Michael F. Coulas , Glenn H. MacEwen , Genevieve Marquis RNet: A Hard Real-Time Distributed Programming System. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1987, v:36, n:8, pp:917-932 [Journal ] Janice I. Glasgow , Glenn H. MacEwen The Development and Proof of a Formal Specification for a Multilevel Secure System. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 1987, v:5, n:2, pp:151-184 [Journal ] Glenn H. MacEwen Correction to "Information Flow Certification Using an Intermediate Code Programm Representation". [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1982, v:8, n:4, pp:446- [Journal ] Glenn H. MacEwen The Design for a Secure System Based on Program Analysis. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1983, v:9, n:3, pp:289-299 [Journal ] Allan L. Mennie , Glenn H. MacEwen Information Flow Certification Using an Intermediate Code Program Representation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1981, v:7, n:6, pp:594-607 [Journal ] Search in 0.003secs, Finished in 0.006secs