The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Glenn H. MacEwen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden
    A Logic for Reasoning About Security. [Citation Graph (3, 0)][DBLP]
    ACM Trans. Comput. Syst., 1992, v:10, n:3, pp:226-264 [Journal]
  2. C. C. Gotlieb, Glenn H. MacEwen
    Performance of Movable-Head Disk Storage Devices. [Citation Graph (2, 0)][DBLP]
    J. ACM, 1973, v:20, n:4, pp:604-623 [Journal]
  3. Glenn H. MacEwen
    Effects of Distributed System Technology on Database Security: A Survey. [Citation Graph (1, 0)][DBLP]
    DBSec, 1987, pp:253-261 [Conf]
  4. Ayaz Isazadeh, Glenn H. MacEwen, Andrew J. Malton
    Behavioral patterns for software requirement engineering. [Citation Graph (0, 0)][DBLP]
    CASCON, 1995, pp:33- [Conf]
  5. Janice I. Glasgow, Glenn H. MacEwen
    Obligation as the Basis of Integrity Specification. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:64-70 [Conf]
  6. Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden
    Reasoning about Knowledge and Permission in Secure Distributed Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:139-146 [Conf]
  7. Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden
    A Logic for Reasoning about Security. [Citation Graph (0, 0)][DBLP]
    CSFW, 1990, pp:2-13 [Conf]
  8. Glenn H. MacEwen, Janice I. Glasgow
    A Proof of Secrecy for a Network Security Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:176-181 [Conf]
  9. Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden
    Security by Permission in Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:197-205 [Conf]
  10. Ayaz Isazadeh, David Alex Lamb, Glenn H. MacEwen
    Behavioral Views for Software Requirements Engineering. [Citation Graph (0, 0)][DBLP]
    ECBS, 1996, pp:300-307 [Conf]
  11. Glenn H. MacEwen, David B. Skillicorn
    Using Higher-order Logic for Modular Specification of Real-time Distributed Systems. [Citation Graph (0, 0)][DBLP]
    FTRTFT, 1988, pp:36-66 [Conf]
  12. Glenn H. MacEwen
    On Instrumentation Facilities in Programming Languages. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1974, pp:198-203 [Conf]
  13. Janice I. Glasgow, Glenn H. MacEwen
    A Computational Model for Distributed Systems Using Operator Nets. [Citation Graph (0, 0)][DBLP]
    PARLE (2), 1987, pp:243-260 [Conf]
  14. Chantal Belzile, Michael F. Coulas, Glenn H. MacEwen, Genevieve Marquis
    RNet: A Hard Real-Time Distributed Programming System. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1986, pp:2-13 [Conf]
  15. Glenn H. MacEwen, V. W. W. Poon, Janice I. Glasgow
    A Model for Multilevel Security Based on Operator Nets. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:150-160 [Conf]
  16. Glenn H. MacEwen, B. Burwell, Z.-J. Lu
    Multi-Level Security Based on Physical Distribution. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:167-179 [Conf]
  17. Janice I. Glasgow, Glenn H. MacEwen
    An Operator Net Model for Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 1989, v:3, n:4, pp:196-209 [Journal]
  18. C. C. Gotlieb, Glenn H. MacEwen
    Errata: ``Performance of Movable-Head Disk Storage Devices''. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1975, v:22, n:1, pp:172- [Journal]
  19. Glenn H. MacEwen, T. Patrick Martin
    Abstraction hierarchies in top-down design. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1981, v:2, n:3, pp:213-224 [Journal]
  20. Sam K. Oh, Glenn H. MacEwen
    Task Behavior Monitoring for Adaptive Real-Time Communication. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 1996, v:11, n:2, pp:173-195 [Journal]
  21. Glenn H. MacEwen
    A Simulation Sequencing Algorithm. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1977, v:7, n:2, pp:165-172 [Journal]
  22. Michael F. Coulas, Glenn H. MacEwen, Genevieve Marquis
    RNet: A Hard Real-Time Distributed Programming System. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1987, v:36, n:8, pp:917-932 [Journal]
  23. Janice I. Glasgow, Glenn H. MacEwen
    The Development and Proof of a Formal Specification for a Multilevel Secure System. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1987, v:5, n:2, pp:151-184 [Journal]
  24. Glenn H. MacEwen
    Correction to "Information Flow Certification Using an Intermediate Code Programm Representation". [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1982, v:8, n:4, pp:446- [Journal]
  25. Glenn H. MacEwen
    The Design for a Secure System Based on Program Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1983, v:9, n:3, pp:289-299 [Journal]
  26. Allan L. Mennie, Glenn H. MacEwen
    Information Flow Certification Using an Intermediate Code Program Representation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1981, v:7, n:6, pp:594-607 [Journal]

Search in 0.003secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002