追蹤
Dan Thomsen
Dan Thomsen
SIFT
在 ieee.org 的電子郵件地址已通過驗證
標題
引用次數
引用次數
年份
Locally adaptable central security management in a heterogeneous network environment
DJ Thomsen, R O'brien, J Bogle, C Payne
US Patent 7,308,702, 2007
1122007
Role based access control framework for network enterprises
D Thomsen, RC O'Brien, J Bogle
Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998
911998
Role Based Application Design and Enforcement
D Thomsen
Proc. of the Fourth IFIP Workshop on Database Security, Halifax, England, 1991
861991
The LDV Secure Relational DBMS Model.
JT Haigh, RC O'Brien, DJ Thomsen
DBSec, 265-280, 1990
701990
Locally adaptable central security management in a heterogeneous network environment
DJ Thomsen, R O'brien, J Bogle, C Payne
US Patent 8,181,222, 2012
492012
Napoleon: network application policy environment
D Thomsen, RC O'Brien, C Payne
Proceedings of the fourth ACM workshop on Role-based access control, 145-152, 1999
331999
A comparison of type enforcement and Unix setuid implementation of well-formed transactions
DJ Thomsen, JT Haigh
[1990] Proceedings of the Sixth Annual Computer Security Applications …, 1990
261990
FUZZBUSTER: Towards adaptive immunity from cyber threats
DJ Musliner, JM Rye, D Thomsen, DD McDonald, MH Burstein, ...
2011 Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems …, 2011
232011
Type enforcement: the new security model
D Thomsen
Multimedia: Full-Service Impact on Business, Education, and the Home 2617 …, 1996
201996
Napoleon: a recipe for workflow
C Payne, D Thomsen, J Bogle, R O'Brien
Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99 …, 1999
181999
Fuzzbuster: A system for self-adaptive immunity from cyber threats
DJ Musliner, JM Rye, D Thomsen, DD McDonald, MH Burstein, ...
Eighth International Conference on Autonomic and Autonomous Systems (ICAS-12 …, 2012
172012
The LDV Secure Relational DBMS Model." Database Security IV: Status and Prospects, S. Jajodia and CE Landwehr
JT Haigh, RC O'Brien, DJ Thomsen
North-Holland, 1991
141991
Incremental assurance for multilevel applications
D Thomsen, M Denz
Proceedings 13th Annual Computer Security Applications Conference, 81-88, 1997
111997
Multi-party conflict: the problem and its solutions
TF Keefe, DJ Thomsen, WT Tsai, MR Hansch
1989 Fifth Annual Computer Security Applications Conference, 222,223,224,225 …, 1989
111989
Can i reach you? do i need to? new semantics in security policy specification and testing
C Katsis, F Cicala, D Thomsen, N Ringo, E Bertino
Proceedings of the 26th ACM Symposium on Access Control Models and …, 2021
92021
Systems and methods for performing security authentication based on responses to observed stimuli
TE Ott, DJ Thomsen
US Patent 9,477,823, 2016
92016
Sidewinder: Combining Type Enforcement and UNIX
DJ Thomsen
Proc. 11th Computer Security Applications Conference, Orlando, FL, 1995
91995
Massively collaborative problem solving: new security solutions and new security risks
K Greene, D Thomsen, P Michelucci
Security Informatics 1, 1-17, 2012
72012
NEUTRON: a graph-based pipeline for zero-trust network architectures
C Katsis, F Cicala, D Thomsen, N Ringo, E Bertino
Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022
62022
Solving wicked problems
D Thomsen
Handbook of human computation, 265-275, 2013
62013
系統目前無法執行作業,請稍後再試。
文章 1–20