John McLean

According to our database1, John McLean authored at least 23 papers between 1982 and 2008.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Applying Formal Methods to a Certifiably Secure Software System.
IEEE Trans. Software Eng., 2008

2007
Formal methods in security engineering: where we've been, where we are, where we need to go.
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007

2006
Baker & McKenzie's annual review of developments in EU law relating to IP, IT and telecommunications.
Comput. Law Secur. Rev., 2006

COMPSAC Panel Session on Trustworthy Computing.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

Trustworthy Software: Why we need it, Why we don't have it, How we can get it.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

2005
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications.
Comput. Law Secur. Rev., 2005

2002
The STCL test tools architecture.
IBM Syst. J., 2002

1999
Twenty Years of Formal Methods.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

1996
A General Theory of Composition for a Class of "Possibilistic'' Properties.
IEEE Trans. Software Eng., 1996

1995
Using temporal logic to specify and verify cryptographic protocols.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

1994
A general theory of composition for trace sets closed under selective interleaving functions.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

Confidentiality in a Replicated Architecture Trusted Database System: A Formal Model.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

1993
New paradigms for high assurance software.
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993

1992
Proving Noninterference and Functional Correctness Using Traces.
J. Comput. Secur., 1992

1990
The Specification and Modeling of Computer Security.
Computer, 1990

Security Models and Information Flow.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990

1988
The algebra of security.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988

1987
Reasoning About Security Models.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

1985
Two dogmas of program specification.
ACM SIGSOFT Softw. Eng. Notes, 1985

A Comment on the 'Basic Security Theorem' of Bell and LaPadula.
Inf. Process. Lett., 1985

1984
A Formal Method for the Abstract Specification of Software.
J. ACM, 1984

1983
A Complete System of Temporal Logic for Specification Schemata.
Proceedings of the Logics of Programs, 1983

1982
Rapid prototyping by means of abstract module specifications written as trace axioms.
Proceedings of the workshop on Rapid Prototyping, 1982


  Loading...