John D. McLean

According to our database1, John D. McLean authored at least 11 papers between 1983 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Letter to the Editor.
IEEE Secur. Priv., 2018

2006
Information Assurance Technology Forecast 2005.
IEEE Secur. Priv., 2006

Formal specification and verification of data separation in a separation kernel for an embedded system.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2004
Trusting a trusted system.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2001
Non-Interference: Who Needs It?
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

A Security Model for Military Message Systems: Retrospective.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

1997
Is the Trusted Computing Base Concept Fundamentally Flawed?
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

1986
NRL invitational workshop on testing and proving: two approaches to assurance.
ACM SIGSOFT Softw. Eng. Notes, 1986

1984
A Security Model for Military Message Systems
ACM Trans. Comput. Syst., 1984

A Formal Statement of the MMS Security Model.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

1983
Abstract Requirements Specification: A New Approach and Its Application.
IEEE Trans. Software Eng., 1983


  Loading...