John McLean
John McLean
Superintendent of Information Technology Division, Naval Research Lab
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
A general theory of composition for trace sets closed under selective interleaving functions
J McLean
Proceedings of 1994 IEEE Computer Society Symposium on Research in Security …, 1994
Security models and information flow
J McLean
IEEE Symposium on Research in Security and Privacy, 180-187, 1990
A Security Model for Military Message Systems
C Landwehr, C Heitmeyer, J McLean
Naval Research Laboratory, 1984
Security Models
J McLean
Encyclopedia of Software Engineering 2, 1136-1145, 1994
The specification and modeling of computer security
J McLean
Computer 23 (1), 9-16, 1990
A general theory of composition for a class of" possibilistic" properties
J McLean
IEEE Transactions on Software Engineering 22 (1), 53-67, 1996
A comment on the ‘basic security theorem’of Bell and LaPadula
J McLean
Information Processing Letters 20 (2), 67-70, 1985
Proving noninterference and functional correctness using traces
J McLean
Journal of Computer security 1 (1), 37-57, 1992
Reasoning about security models
J McLean
Research in Security and Privacy, 1987. Proceedings., 1987 IEEE Computer …, 1987
Applying formal methods to a certifiably secure software system
C Heitmeyer, M Archer, E Leonard, J McLean
IEEE Transactions on Software Engineering 34 (1), 82-98, 2008
The Algebra of Security
J McLean
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 2-7, 1988
Formal specification and verification of data separation in a separation kernel for an embedded system
CL Heitmeyer, M Archer, EI Leonard, J McLean
Proceedings of the 13th ACM conference on Computer and communications …, 2006
Non-interference: Who needs it?
P Ryan, JD McLean, JK Millen, VD Gligor
Proceedings of the 14th IEEE workshop on Computer Security Foundations 1, 237, 2001
Unusual side effects of clomipramine associated with yawning
JD McLean, RG Forsythe, IA Kapkin
The Canadian Journal of Psychiatry 28 (7), 569-570, 1983
A formal method for the abstract specification of software
J McLean
Journal of the ACM (JACM) 31 (3), 600-627, 1984
Abstract requirements specification: A new approach and its application
CL Heitmeyer, JD McLean
Software Engineering, IEEE Transactions on, 580-589, 1983
Using temporal logic to specify and verify cryptographic protocols
JW Gray, J McLean
Proceedings The Eighth IEEE Computer Security Foundations Workshop, 108-116, 1995
What Happened to Formal Methods for Security
K Schaffer, Voas, Jeff, P Black, C Heitmeyer, J Kiniry, K Levitt, J McLean, ...
IEEE Computer, 70-99, 2016
High assurance computer systems: A research agenda
J McLean, C Heitmeyer
America in the Age of Information, National Science and Technology Council …, 1995
Security and dependability: then and now
C Meadows, J McLean
Proceedings Computer Security, Dependability, and Assurance: From Needs to …, 1998
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20