John E. Dobson

According to our database1, John E. Dobson authored at least 25 papers between 1986 and 2002.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2002
Organisational Failures in Dependable Collaborative Enterprise Systems.
Journal of Object Technology, 2002

Editorial message: special track on inter-disciplinary approaches to the design of dependable computer systems.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

2001
What Happens before Requirements Engineering?
Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE 2001), 2001

Building Reliable Secure Computing Systems out of Unreliable Insecure Components.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

1999
Modeling Dynamic Networks: Advantages and Limitations of the O-O Approach.
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999

1998
Business and Market Models of Brokerage in Network-Based Commerce.
Proceedings of the Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, 1998

Security and Privacy Issues for the World Wide Web: Panel Discussion.
Proceedings of the Database Security XII: Status and Prospects, 1998

1997
FAST: a framework for automating statistics-based testing.
Software Quality Journal, 1997

1995
Messages, Communication, Information Security: Protecting the User from the Data.
Proceedings of the Database Security IX: Status and Prospects, 1995

Report of Discussion Sessions Following Presentations.
Proceedings of the Database Security IX: Status and Prospects, 1995

1994
Organisational requirements definition for information technology systems.
Proceedings of the First IEEE International Conference on Requirements Engineering, 1994

1993
The change and evolution of requirements as a challenge to the practice of software engineering.
Proceedings of IEEE International Symposium on Requirements Engineering, 1993

How responsibility modelling leads to security requirements.
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993

ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements.
Proceedings of the Conference on Organizational Computing Systems, 1993

A framework for modelling evolving requirements.
Proceedings of the Seventeenth Annual International Computer Software and Applications Conference, 1993

1992
On the Meaning of Safety and Security.
Comput. J., 1992

The ORDIT approach to requirements identification.
Proceedings of the Sixteenth Annual International Computer Software and Applications Conference, 1992

1991
Information and Denial of Service.
Proceedings of the Database Security, 1991

1990
Enterprise Modeling and Security Policies.
Proceedings of the Database Security, 1990

1989
A Framework for Expressing Models of Security Policy.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

Conversation Structures as a Means of Specifying Security Policy.
Proceedings of the Database Security, 1989

1988
Security Models and Enterprise Models.
Proceedings of the Database Security, 1988

1987
Security and Databases: A Personal View.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987

1986
Reliability and Security Issues in Distributed Computing Systems.
Proceedings of the Fifth Symposium on Reliability in Distributed Software and Database Systems, 1986

Building Reliable Secure Computing Systems out of Unreliable Insecure Components.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986


  Loading...