Locally adaptable central security management in a heterogeneous network environment DJ Thomsen, R O'brien, J Bogle, C Payne US Patent 7,308,702, 2007 | 112 | 2007 |
Role based access control framework for network enterprises D Thomsen, RC O'Brien, J Bogle Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998 | 91 | 1998 |
Role Based Application Design and Enforcement D Thomsen Proc. of the Fourth IFIP Workshop on Database Security, Halifax, England, 1991 | 86 | 1991 |
The LDV Secure Relational DBMS Model. JT Haigh, RC O'Brien, DJ Thomsen DBSec, 265-280, 1990 | 70 | 1990 |
Locally adaptable central security management in a heterogeneous network environment DJ Thomsen, R O'brien, J Bogle, C Payne US Patent 8,181,222, 2012 | 49 | 2012 |
Napoleon: network application policy environment D Thomsen, RC O'Brien, C Payne Proceedings of the fourth ACM workshop on Role-based access control, 145-152, 1999 | 33 | 1999 |
A comparison of type enforcement and Unix setuid implementation of well-formed transactions DJ Thomsen, JT Haigh [1990] Proceedings of the Sixth Annual Computer Security Applications …, 1990 | 26 | 1990 |
FUZZBUSTER: Towards adaptive immunity from cyber threats DJ Musliner, JM Rye, D Thomsen, DD McDonald, MH Burstein, ... 2011 Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems …, 2011 | 23 | 2011 |
Type enforcement: the new security model D Thomsen Multimedia: Full-Service Impact on Business, Education, and the Home 2617 …, 1996 | 20 | 1996 |
Napoleon: a recipe for workflow C Payne, D Thomsen, J Bogle, R O'Brien Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99 …, 1999 | 18 | 1999 |
Fuzzbuster: A system for self-adaptive immunity from cyber threats DJ Musliner, JM Rye, D Thomsen, DD McDonald, MH Burstein, ... Eighth International Conference on Autonomic and Autonomous Systems (ICAS-12 …, 2012 | 17 | 2012 |
The LDV Secure Relational DBMS Model." Database Security IV: Status and Prospects, S. Jajodia and CE Landwehr JT Haigh, RC O'Brien, DJ Thomsen North-Holland, 1991 | 14 | 1991 |
Incremental assurance for multilevel applications D Thomsen, M Denz Proceedings 13th Annual Computer Security Applications Conference, 81-88, 1997 | 11 | 1997 |
Multi-party conflict: the problem and its solutions TF Keefe, DJ Thomsen, WT Tsai, MR Hansch 1989 Fifth Annual Computer Security Applications Conference, 222,223,224,225 …, 1989 | 11 | 1989 |
Can i reach you? do i need to? new semantics in security policy specification and testing C Katsis, F Cicala, D Thomsen, N Ringo, E Bertino Proceedings of the 26th ACM Symposium on Access Control Models and …, 2021 | 9 | 2021 |
Systems and methods for performing security authentication based on responses to observed stimuli TE Ott, DJ Thomsen US Patent 9,477,823, 2016 | 9 | 2016 |
Sidewinder: Combining Type Enforcement and UNIX DJ Thomsen Proc. 11th Computer Security Applications Conference, Orlando, FL, 1995 | 9 | 1995 |
Massively collaborative problem solving: new security solutions and new security risks K Greene, D Thomsen, P Michelucci Security Informatics 1, 1-17, 2012 | 7 | 2012 |
NEUTRON: a graph-based pipeline for zero-trust network architectures C Katsis, F Cicala, D Thomsen, N Ringo, E Bertino Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022 | 6 | 2022 |
Solving wicked problems D Thomsen Handbook of human computation, 265-275, 2013 | 6 | 2013 |