John P. McDermott

According to our database1, John P. McDermott authored at least 82 papers between 1977 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
The Xenon separation VMM: Secure virtualization infrastructure for military clouds.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Separation virtual machine monitors.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Formal methods for security in the Xenon hypervisor.
Int. J. Softw. Tools Technol. Transf., 2011

2010
Security and Architectural Issues for National Security Cloud Computing.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Fine-Grained Inspection for Higher-Assurance Software Security in Open Source.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Using formal methods for security in the Xenon project.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2008
Re-engineering Xen internals for higher-assurance security.
Inf. Secur. Tech. Rep., 2008

A formal security policy for xenon.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008

2005
Visual security protocol modeling.
Proceedings of the New Security Paradigms Workshop 2005, 2005

Highlights from the 2005 New Security Paradigms Workshop.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2003
Merging paradigms of survivability and security: stochastic faults and designed faults.
Proceedings of the New Security Paradigms Workshop 2003, 2003

2001
Abuse-Case-Based Assurance Arguments.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

1999
Using Abuse Case Models for Security Requirements Analysis.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks.
Proceedings of the 1998 Workshop on New Security Paradigms, 1998

1997
Replication Does Survive Information Warfare Attacks.
Proceedings of the Database Securty XI: Status and Prospects, 1997

Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1996
A Performance Comparison of Five Transaction Processing Algorithms for the SINTRA Replicated-Architecture Database system.
J. Comput. Secur., 1996

Towards a model of storage jamming.
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996

Computer Support for Clinical Practice: Embedding and Evolving Protocols of Care.
Proceedings of the CSCW '96, 1996

1995
Storage Jamming.
Proceedings of the Database Security IX: Status and Prospects, 1995

1994
Exploiting problem descriptions to provide assistance with the Sisyphus task.
Int. J. Hum. Comput. Stud., 1994

A Taxonomy of Computer Program Security Flaws.
ACM Comput. Surv., 1994

Experience with a Learning Personal Assistant.
Commun. ACM, 1994

The SBF Framework, 1989-1994: From Applications to Workplaces.
Proceedings of the A Future for Knowledge Acquisition, 1994

The b²/c³ Problem: How Big Buffers Overcome Convert Channel Cynicism in Trusted Database Systems.
Proceedings of the Database Security, 1994

Confidentiality in a Replicated Architecture Trusted Database System: A Formal Model.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

Meaning-Making in the Creation of Useful Summary Reports.
Proceedings of the CSCW '94, 1994

A practical approach to high assurance multilevel secure computing service.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
R1 ("XCON") at Age 12: Lessons from an Elementary School Achiever.
Artif. Intell., 1993

Performance Analysis of Transaction Management Algorithms for the SINTRA Replicated-Architecture Database System.
Proceedings of the Database Security, 1993

1992
Easy Programming: Empowering People to Build Their Own Applications.
IEEE Expert, 1992

A multilevel transaction problem for multilevel secure database systems and its solution for the replicated architecture.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

Orange Locking: Channel-Free Database Concurrency Control Via Locking.
Proceedings of the Database Security, 1992

A Personal Learning Apprentice.
Proceedings of the 10th National Conference on Artificial Intelligence, 1992

1991
Making Application Programming More Worthwile.
Proceedings of the Contemporary Knowledge Engineering and Cognition, 1991

A single-level scheduler for the replicated architecture for multilevel-secure databases.
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991

Justification-Based Refinement of Expert Knowledge.
Proceedings of the Knowledge Discovery in Databases, 1991

1990
On models for a trusted application system.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

Informal top-level specifications for trusted application systems.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

Successful acquisition of certifiable application systems (or: How not to shake hands with the tar baby).
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

Developing Software is like Talking to Eskimos about Snow.
Proceedings of the 8th National Conference on Artificial Intelligence. Boston, Massachusetts, USA, July 29, 1990

1989
The World Would Be a Better Place if Non-Programmers Could Program.
Mach. Learn., 1989

SALT: A Knowledge Acquisition Language for Propose-and-Revise Systems.
Artif. Intell., 1989

1988
Toward Automating Recognition of Differing Problem-Solving Demands.
Int. J. Man Mach. Stud., 1988

Knowledge Acquisition for Evaluation Systems.
Int. J. Man Mach. Stud., 1988

VT: An Expert Elevator Designer That Uses Knowledge-Based Backtracking.
AI Mag., 1988

1987
KNACK - Report-Driven Knowledge Acquisition.
Int. J. Man Mach. Stud., 1987

MOLE: A Tenacious Knowledge-Acquisition Tool.
Int. J. Man Mach. Stud., 1987

A KNACK for Knowledge Acquisition.
Proceedings of the 6th National Conference on Artificial Intelligence. Seattle, 1987

1986
Computer Aids for IC Design.
IEEE Softw., 1986

The Mud System.
IEEE Expert, 1986

The Taming of R1.
IEEE Expert, 1986

Making Expert Systems Explicit (Invited Paper).
Proceedings of the Information Processing 86, 1986

Panel: Knowledge Representation Meets Knowledge Acquisition: What Are the Needs and Where Is the Leverage?
Proceedings of the 5th National Conference on Artificial Intelligence. Philadelphia, 1986

MOLE: A Knowledge Acquisition Tool that Uses its Head.
Proceedings of the 5th National Conference on Artificial Intelligence. Philadelphia, 1986

Panel: Directions for Expert Systems.
Proceedings of the 5th National Conference on Artificial Intelligence. Philadelphia, 1986

1985
R1-Soar: An Experiment in Knowledge-Intensive Programming in a Problem-Solving Architecture.
IEEE Trans. Pattern Anal. Mach. Intell., 1985

Rule-Based Interpretation of Aerial Imagery.
IEEE Trans. Pattern Anal. Mach. Intell., 1985

Strategies for Knowledge Acquisition.
IEEE Trans. Pattern Anal. Mach. Intell., 1985

The Dark Ages of AI: A Panel Discussion at AAAI-84.
AI Mag., 1985

Knowledge Acquisition for Constructive Systems.
Proceedings of the 9th International Joint Conference on Artificial Intelligence. Los Angeles, 1985

MORE: An Intelligent Knowledge Acquisition Tool.
Proceedings of the 9th International Joint Conference on Artificial Intelligence. Los Angeles, 1985

The Role of Databases in Knowledge-Based Systems.
Proceedings of the On Knowledge Base Management Systems: Integrating Artificial Intelligence and Database Technologies, 1985

Where Knowledge Acquisition Tools Fit in the Scheme of Things.
Proceedings of the Artificial Intelligence Applications, 1985

Doing R1 with Style.
Proceedings of the Artificial Intelligence Applications, 1985

1984
R1 Revisited: Four Years in the Trenches.
AI Mag., 1984

1983
The Knowledge Engineering Process.
IEEE Database Eng. Bull., 1983

Extracting Knowledge From Expert Systems.
Proceedings of the 8th International Joint Conference on Artificial Intelligence. Karlsruhe, 1983

Decision-Making in Time-Critical Situations.
Proceedings of the 8th International Joint Conference on Artificial Intelligence. Karlsruhe, 1983

TALIB: An IC Layout Design Assistant.
Proceedings of the National Conference on Artificial Intelligence, 1983

1982
R1: A Rule-Based Configurer of Computer Systems.
Artif. Intell., 1982

1981
Extending a Knowledge-Based System to Deal with Ad Hoc Constraints.
Proceedings of the 7th International Joint Conference on Artificial Intelligence, 1981

1980
R1: The Formative Years.
AI Mag., 1980

Nils J. Nilsson, Principles of Artificial lntelligence.
Artif. Intell., 1980

RI: an Expert in the Computer Systems Domain.
Proceedings of the 1st Annual National Conference on Artificial Intelligence, 1980

1978
An Interference Matching Technique for Inducing Abstractions.
Commun. ACM, 1978

1977
The efficiency of certain production system implementations.
SIGART Newsl., 1977

Production system conflict resolution strategies.
SIGART Newsl., 1977

Problems in Building an Instructable Production System.
Proceedings of the 5th International Joint Conference on Artificial Intelligence. Cambridge, 1977

Less Than General Production System Architectures.
Proceedings of the 5th International Joint Conference on Artificial Intelligence. Cambridge, 1977

Knowledge Acquisition from Structural Descriptions.
Proceedings of the 5th International Joint Conference on Artificial Intelligence. Cambridge, 1977

OPS, A Domain-Independent Production System Language.
Proceedings of the 5th International Joint Conference on Artificial Intelligence. Cambridge, 1977


  Loading...