Mark Reith

According to our database1, Mark Reith authored at least 8 papers between 2002 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Battlespace Next(TM).
Int. J. Serious Games, 2020

2017
Cyber terrain mission mapping: Tools and methodologies.
Proceedings of the 2017 International Conference on Cyber Conflict, 2017

2014
Formal verification of security properties in trust management policy.
J. Comput. Secur., 2014

2009
Toward practical analysis for trust management policy.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Role-based trust management security policy analysis and correction environment (RT-SPACE).
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

2007
Engineering Trust Management into Software Models.
Proceedings of the International Workshop on Modeling in Software Engineering, 2007

Apply Model Checking to Security Analysis in Trust Management.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

2002
An Examination of Digital Forensic Models.
Int. J. Digit. EVid., 2002


  Loading...