Simon R. Wiseman

According to our database1, Simon R. Wiseman authored at least 28 papers between 1986 and 2005.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2005
Analysis of Information Security Risks: Policy for Protection Through to Implementation.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

2001
Database Security: Retrospective and Way Forward.
Inf. Secur. Tech. Rep., 2001

1999
Trustworthy Access Control with Untrustworthy Web Servers.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Adding security labelling to Windows NT.
Inf. Secur. Tech. Rep., 1998

Private Desktops and Shared Store.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
Securing an Object Relational Database.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

Simple Assured Bastion Hosts.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1996
SPEAR: Extending ER for Dynamic Behaviour and Refinement.
Proceedings of the Advances in Databases, 14th British National Conferenc on Databases, 1996

1995
Holistic computing.
Microprocess. Microsystems, 1995

Classification services in the SWORD secure DBMS.
Comput. Secur., 1995

1994
A Consideration of the Modes of Operation for Secure Systems.
Proceedings of the Computer Security, 1994

Field Level Classification and SQL.
Proceedings of the Database Security, 1994

Using security models to investigate CMW design and implementation.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
Security Properties of the SWORD Secure DBMS design.
Proceedings of the Database Security, 1993

Database design and MLS DBMSs: an unhappy alliance?
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1992
Using SWORD for the Military Aircraft Command Example Database.
Proceedings of the Database Security, 1992

Providing security in a phone book database using triggers.
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992

1991
Abstract and Concrete Models for Secure Database Applications.
Proceedings of the Database Security, 1991

The Conflict Between Confidentiality and Integrity.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
Control of confidentiality in databases.
Comput. Secur., 1990

The Control of Integrity in Databases.
Proceedings of the Database Security, 1990

1989
Preventing viruses in computer systems.
Comput. Secur., 1989

A "New" Security Policy Model.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

On the Problem of Security in Data Bases.
Proceedings of the Database Security, 1989

1988
Garbage collection in distributed systems.
PhD thesis, 1988

The trusted path between SMITE and the user.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988

1986
Variety of papers introduces specialized computers: L Snyder, L H Jamieson, D B Gannon and H J Siegel (Eds)'Algorithmically specialized parallel computers' Academic Press, Orlando, FL, USA (1985) £24.00 pp xiii + 252.
Microprocess. Microsystems, 1986

A Secure Capability Computer System.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986


  Loading...