Folgen
John McLean
John McLean
Superintendent of Information Technology Division, Naval Research Lab
Bestätigte E-Mail-Adresse bei nrl.navy.mil - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A general theory of composition for trace sets closed under selective interleaving functions
J McLean
Proceedings of 1994 IEEE Computer Society Symposium on Research in Security …, 1994
4261994
Security models and information flow
J McLean
IEEE Symposium on Research in Security and Privacy, 180-187, 1990
4201990
A Security Model for Military Message Systems
C Landwehr, C Heitmeyer, J McLean
Naval Research Laboratory, 1984
2651984
Security Models
J McLean
Encyclopedia of Software Engineering 2, 1136-1145, 1994
2481994
The specification and modeling of computer security
J McLean
Computer 23 (1), 9-16, 1990
2481990
A general theory of composition for a class of" possibilistic" properties
J McLean
IEEE Transactions on Software Engineering 22 (1), 53-67, 1996
2061996
A comment on the ‘basic security theorem’of Bell and LaPadula
J McLean
Information Processing Letters 20 (2), 67-70, 1985
1871985
Proving noninterference and functional correctness using traces
J McLean
Journal of Computer security 1 (1), 37-57, 1992
1561992
Reasoning about security models
J McLean
Research in Security and Privacy, 1987. Proceedings., 1987 IEEE Computer …, 1987
1501987
Applying formal methods to a certifiably secure software system
C Heitmeyer, M Archer, E Leonard, J McLean
IEEE Transactions on Software Engineering 34 (1), 82-98, 2008
1342008
The Algebra of Security
J McLean
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 2-7, 1988
118*1988
Formal specification and verification of data separation in a separation kernel for an embedded system
CL Heitmeyer, M Archer, EI Leonard, J McLean
Proceedings of the 13th ACM conference on Computer and communications …, 2006
1052006
Unusual side effects of clomipramine associated with yawning
JD McLean, RG Forsythe, IA Kapkin
The Canadian Journal of Psychiatry 28 (7), 569-570, 1983
1031983
Non-interference: Who needs it?
P Ryan, JD McLean, JK Millen, VD Gligor
Proceedings of the 14th IEEE workshop on Computer Security Foundations 1, 237, 2001
102*2001
A formal method for the abstract specification of software
J McLean
Journal of the ACM (JACM) 31 (3), 600-627, 1984
861984
Abstract requirements specification: A new approach and its application
CL Heitmeyer, JD McLean
Software Engineering, IEEE Transactions on, 580-589, 1983
671983
Using temporal logic to specify and verify cryptographic protocols
JW Gray, J McLean
Proceedings The Eighth IEEE Computer Security Foundations Workshop, 108-116, 1995
661995
What Happened to Formal Methods for Security
K Schaffer, Voas, Jeff, P Black, C Heitmeyer, J Kiniry, K Levitt, J McLean, ...
IEEE Computer, 70-99, 2016
30*2016
High assurance computer systems: A research agenda
J McLean, C Heitmeyer
America in the Age of Information, National Science and Technology Council …, 1995
271995
Security and dependability: then and now
C Meadows, J McLean
Proceedings Computer Security, Dependability, and Assurance: From Needs to …, 1998
251998
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20