J. Thomas Haigh

According to our database1, J. Thomas Haigh authored at least 11 papers between 1986 and 2009.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2009
Trapping Malicious Insiders in the SPDR Web.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

The case for prevention-based, host-resident defenses in the modern PCS network.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

1990
The LDV Secure Relational DBMS Model.
Proceedings of the Database Security, 1990

A comparison of type enforcement and Unix setuid implementation of well-formed transactions.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1989
The LDV Approach to Database Security.
Proceedings of the Database Security, 1989

Noninterference and the Unwinding for LOCK.
Proceedings of the Second IEEE Computer Security Foundations Workshop, 1989

1988
Discussion Notes and Research Question List.
Proceedings of the Database Security, 1988

1987
Extending the Noninterference Version of MLS for SAT.
IEEE Trans. Software Eng., 1987

An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Trans. Software Eng., 1987

Modeling Datbase Security Requirements.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987

1986
Extending the Non-Interference Version of MLS for SAT.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986


  Loading...