Dan Thomsen

According to our database1, Dan Thomsen authored at least 26 papers between 1988 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

2020
Provenance-Based Interpretation of Multi-Agent Information Analysis.
Proceedings of the 12th International Workshop on Theory and Practice of Provenance, 2020

2019
Secure Desktop Computing in the Cloud.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

2018
Network Policy Enforcement Using Transactions: The NEUTRON Approach.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

2013
Applying Security Lessons Learned to Human Computation Solving Systems.
Proceedings of the Handbook of Human Computation, 2013

Introduction to Security and Policy Section.
Proceedings of the Handbook of Human Computation, 2013

Solving Wicked Problems.
Proceedings of the Handbook of Human Computation, 2013

2012
Massively collaborative problem solving: new security solutions and new security risks.
Secur. Informatics, 2012

Lost Treasures.
IEEE Secur. Priv., 2012

2011
Exploration in Massively Collaborative Problem Solving.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

FUZZBUSTER: Towards Adaptive Immunity from Cyber Threats.
Proceedings of the Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems, 2011

Practical policy patterns.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2007
Patterns in Security Enforcement Policy Development.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

2001
Introduction to Classic Papers.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

1999
Napoleon: Network Application Policy Environment.
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999

Napoleon: A Recipe for Workflow.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Role-Based Access Control Framework for Network Enterprises.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1990
Role-Based Application Design and Enforcement.
Proceedings of the Database Security, 1990

The LDV Secure Relational DBMS Model.
Proceedings of the Database Security, 1990

A comparison of type enforcement and Unix setuid implementation of well-formed transactions.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1989
Prototyping to explore MLS/DBMS design.
Comput. Secur., 1989

A summary of the LDV solution to the homework problem.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989

Multi-party conflict: the problem and its solutions.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989

1988
Prototyping as a Research Tool for MLS/DBMS.
Proceedings of the Database Security, 1988

Discussion Notes and Research Question List.
Proceedings of the Database Security, 1988


  Loading...