Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Surviving Insider Attacks: A Call for System Experiments., and . Insider Attack and Cyber Security, volume 39 of Advances in Information Security, Springer, (2008)A New Security Testing Method and Its Application to the Secure Xenix Kernel., , , , , , and . S&P, page 40-59. IEEE Computer Society, (1986)Generic Support for PKIX Certificate Management in CDSA., and . ACSAC, page 269-275. IEEE Computer Society, (1999)Design and Implementation of Secure Xenix., , , , , , , , and . IEEE Trans. Software Eng., 13 (2): 208-221 (1987)Integration of DCE and Local Registries: Design Approaches., and . ACM Conference on Computer and Communications Security, page 165-170. ACM, (1993)On the Identification of Covert Storage Channels in Secure Systems., , and . IEEE Trans. Software Eng., 16 (6): 569-580 (1990)Dat Flow, Abstraction Levels and Specifications for Communications Switching Systems., and . ICSE, page 585-591. IEEE Computer Society, (1976)A New Security Testing Method and Its Application to the Secure Xenix Kernel., , , , , and . IEEE Trans. Software Eng., 13 (2): 169-183 (1987)Software specification using the SPECIAL language., and . J. Syst. Softw., 2 (1): 31-38 (1981)A Formal Method for the Identification of Covert Storage Channels in Source Code., , and . S&P, page 74-87. IEEE Computer Society, (1987)