Seguir
John McLean
John McLean
Superintendent of Information Technology Division, Naval Research Lab
Dirección de correo verificada de nrl.navy.mil - Página principal
Título
Citado por
Citado por
Año
A general theory of composition for trace sets closed under selective interleaving functions
J McLean
Proceedings of 1994 IEEE Computer Society Symposium on Research in Security …, 1994
4221994
Security models and information flow
J McLean
IEEE Symposium on Research in Security and Privacy, 180-187, 1990
4191990
A security model for military message systems
CE Landwehr, CL Heitmeyer, J McLean
ACM Transactions on Computer Systems (TOCS) 2 (3), 198-222, 1984
2611984
A Security Model for Military Message Systems
C Landwehr, C Heitmeyer, J McLean
Naval Research Laboratory, 1984
2611984
Security Models
J McLean
Encyclopedia of Software Engineering 2, 1136-1145, 1994
2501994
The specification and modeling of computer security
J McLean
Computer 23 (1), 9-16, 1990
2501990
A general theory of composition for a class of" possibilistic" properties
J McLean
IEEE Transactions on Software Engineering 22 (1), 53-67, 1996
2051996
A comment on the ‘basic security theorem’of Bell and LaPadula
J McLean
Information Processing Letters 20 (2), 67-70, 1985
1891985
Proving noninterference and functional correctness using traces
J McLean
Journal of Computer security 1 (1), 37-57, 1992
1501992
Reasoning about security models
J McLean
Research in Security and Privacy, 1987. Proceedings., 1987 IEEE Computer …, 1987
1501987
Applying formal methods to a certifiably secure software system
C Heitmeyer, M Archer, E Leonard, J McLean
IEEE Transactions on Software Engineering 34 (1), 82-98, 2008
1302008
The Algebra of Security
J McLean
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 2-7, 1988
118*1988
Formal specification and verification of data separation in a separation kernel for an embedded system
CL Heitmeyer, M Archer, EI Leonard, J McLean
Proceedings of the 13th ACM conference on Computer and communications …, 2006
1062006
Non-interference: Who needs it?
P Ryan, JD McLean, JK Millen, VD Gligor
Proceedings of the 14th IEEE workshop on Computer Security Foundations 1, 237, 2001
101*2001
Unusual side effects of clomipramine associated with yawning
JD McLean, RG Forsythe, IA Kapkin
The Canadian Journal of Psychiatry 28 (7), 569-570, 1983
971983
A formal method for the abstract specification of software
J McLean
Journal of the ACM (JACM) 31 (3), 600-627, 1984
861984
Abstract requirements specification: A new approach and its application
CL Heitmeyer, JD McLean
Software Engineering, IEEE Transactions on, 580-589, 1983
681983
Using temporal logic to specify and verify cryptographic protocols
JW Gray, J McLean
Proceedings The Eighth IEEE Computer Security Foundations Workshop, 108-116, 1995
661995
What Happened to Formal Methods for Security
K Schaffer, Voas, Jeff, P Black, C Heitmeyer, J Kiniry, K Levitt, J McLean, ...
IEEE Computer, 70-99, 2016
30*2016
High assurance computer systems: A research agenda
J McLean, C Heitmeyer
America in the Age of Information, National Science and Technology Council …, 1995
271995
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20