Judith N. Froscher

According to our database1, Judith N. Froscher authored at least 22 papers between 1986 and 2003.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2003
Merging paradigms of survivability and security: stochastic faults and designed faults.
Proceedings of the New Security Paradigms Workshop 2003, 2003

2001
A Tool for Secure Inter-Organizational Computing.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

A Secure Workflow System for Dynamic Collaboration.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Access control mechanisms for inter-organizational workflow.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

2000
A Framework for Secure Enterprise Computing.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

1999
A Strategy for an MLS Workflow Management System.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

A Multilevel Secure Workflow Management System.
Proceedings of the Advanced Information Systems Engineering, 1999

Tools to Support Secure Enterprise Computing.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Towards an Infrastructure for MLS Distributed Computing.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
An Architecture for Multilevel Secure Interoperability.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1996
A framework for MLS interoperability.
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996

1994
The SINTRA Data Model: Structure and Operations.
Proceedings of the Database Security, 1994

Architectural impact on performance of a multilevel database system.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

A practical approach to high assurance multilevel secure computing service.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
Using Object Modeling Techniques to Design MLS Data Models.
Proceedings of the Security for Object-Oriented Systems, 1993

1992
A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System.
Proceedings of the Database Security, 1992

1990
A Software Engineering Methodology for Rule-Based Systems.
IEEE Trans. Knowl. Data Eng., 1990

On models for a trusted application system.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

Informal top-level specifications for trusted application systems.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

Successful acquisition of certifiable application systems (or: How not to shake hands with the tar baby).
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1988
Achieving a Trusted Database Management System Using Parallelism.
Proceedings of the Database Security, 1988

1986
Software Engineering for Rule-Based Software Systems.
Proceedings of the Fall Joint Computer Conference, November 2-6, 1986, Dallas, Texas, USA, 1986


  Loading...