John McLean
John McLean
Superintendent of Information Technology Division, Naval Research Lab
Verified email at nrl.navy.mil - Homepage
Title
Cited by
Cited by
Year
Security models and information flow
J McLean
IEEE Symposium on Research in Security and Privacy, 180-187, 1990
4071990
A general theory of composition for trace sets closed under selective interleaving functions
J McLean
Proceedings of 1994 IEEE Computer Society Symposium on Research in Security …, 1994
3971994
A security model for military message systems
CE Landwehr, CL Heitmeyer, J McLean
ACM Transactions on Computer Systems (TOCS) 2 (3), 198-222, 1984
2431984
A Security Model for Military Message Systems
C Landwehr, C Heitmeyer, J McLean
Naval Research Laboratory, 1984
2431984
Security Models
J McLean
Encyclopedia of Software Engineering 2, 1136-1145, 1994
2331994
The specification and modeling of computer security
J McLean
Computer 23 (1), 9-16, 1990
2271990
A general theory of composition for a class of" possibilistic" properties
J McLean
IEEE Transactions on Software Engineering 22 (1), 53-67, 1996
1881996
A comment on the ‘basic security theorem’of Bell and LaPadula
J McLean
Information Processing Letters 20 (2), 67-70, 1985
1771985
Reasoning about security models
J McLean
Research in Security and Privacy, 1987. Proceedings., 1987 IEEE Computer …, 1987
1371987
Proving noninterference and functional correctness using traces
J McLean
Journal of Computer security 1 (1), 37-57, 1992
1241992
Applying formal methods to a certifiably secure software system
C Heitmeyer, M Archer, E Leonard, J McLean
IEEE Transactions on Software Engineering 34 (1), 82-98, 2008
1142008
The Algebra of Security
J McLean
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 2-7, 1988
108*1988
Formal specification and verification of data separation in a separation kernel for an embedded system
CL Heitmeyer, M Archer, EI Leonard, J McLean
Proceedings of the 13th ACM conference on Computer and communications …, 2006
952006
Non-interference: Who needs it?
P Ryan, JD McLean, JK Millen, VD Gligor
Proceedings of the 14th IEEE workshop on Computer Security Foundations 1, 237, 2001
90*2001
A formal method for the abstract specification of software
J McLean
Journal of the ACM (JACM) 31 (3), 600-627, 1984
801984
Using temporal logic to specify and verify cryptographic protocols
JW Gray, J McLean
Proceedings The Eighth IEEE Computer Security Foundations Workshop, 108-116, 1995
631995
Abstract requirements specification: A new approach and its application
CL Heitmeyer, JD McLean
Software Engineering, IEEE Transactions on, 580-589, 1983
571983
A security model for military message systems: Retrospective
CE Landwehr, CL Heitmeyer, JD McLean
Seventeenth Annual Computer Security Applications Conference, 174-190, 2001
272001
Security and dependability: then and now
C Meadows, J McLean
Proceedings Computer Security, Dependability, and Assurance: From Needs to …, 1998
251998
High assurance computer systems: A research agenda
J McLean, C Heitmeyer
NAVAL RESEARCH LAB WASHINGTON DC CENTER FOR HIGH ASSURANCE COMPUTING SYSTEMS …, 1995
251995
The system can't perform the operation now. Try again later.
Articles 1–20