Found 33 results

Filters: author is Haigh  [Clear All Filters]
2010
J. Thomas Haigh, Steven Harp, Charles Payne, "AIMFIRST: Planning for Mission Assurance", 5th International Conference on Information Warefare and Security, Wright-Patterson Air Force Base, Air Force Institute of Technology, Wright-Patterson Air Force Base, 04/08/2010. Abstract
2009
Charles Payne, Jr., Richard C. O’Brien, J. Thomas Haigh, (Adventium), "The Case for Prevention-based, Host-resident Defenses in the Modern PCS Network", Cyber Security and Information Intelligence Research Workshop (CSIIRW 2009), Oak Ridge, TN, 04/13/2009.
J. Thomas Haigh, Steven A. Harp, Richard C. O’Brien, Charles N. Payne, Johnathan Gohde, John Maraist, (Adventium), "Trapping Malicious Insiders in the SPDR Web", Hawaii International Conference on Systems Sciences (HICSS-42), Honolulu, HI, 01/05/2009.
2008
J. Thomas Haigh, Steven A. Harp, Richard C. O’Brien, Charles N. Payne, Johnathan Gohde, John Maraist, "Trapping Malicious Insiders in the SPDR Web", Hawaii International Conference on Systems Sciences, 2008  .
2006
Virgil D. Gligor, J. Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean, "Information Assurance Technology Forecast 2005", IEEE Security & Privacy, vol. 4, issue 1, pp. 62-69, 01/2006. Abstract
2005
Mark Boddy, Johnathan Gohde, J. Thomas Haigh, Steven Harp, "Course of Action Generation for Cyber Security Using Classical Planning", ICAPS-05, 06/05/2005. Abstract
2003
J. Thomas Haigh, "New Technologies that Break the Penetrate and Patch Cycle", VA InfoSec 2003 Conference, 06/25/2003.
2002
J. Thomas Haigh, "Cyber-Terrorism: Strategies for Prevention and Recovery", Internet World, 04/22/2002.
J. Thomas Haigh, "Defense in Depth: Layered Security for Broadband Networks (tutorial)", Broadband Year, 03/04/2002.
J. Thomas Haigh, "Building Secure Collaborative B2B Solutions", RSA Conference 2002, 02/18/2006.
2001
Tom Haigh, "Creating a Shared e-Business Server with the 3Com Embedded Firewall", Proceedings of the Annual Computer Security Applications Conf. (ACSAC), 12/14/2001.
Tom Haigh, "Not All Firewalls Are Created Equal", SC-Online Magazine, 10/2001.
1999
J. Thomas Haigh, Andrew W. Jensen, System and method for securing compiled program code, , 02/1999. Abstract
1997
J. Thomas Haigh, "Firewalls Are More Than Just Bandages (Panel)", 20th National Information Systems Security Conference, Baltimore, MD, 10/07/1997.
1996
J. Thomas Haigh, "Auditing on Sidewinder", CMAD IV, 12/12/1996.
J. Thomas Haigh, "Best of the New Security Paradigms Workshop (Panel Chair)", 19th National Information Systems Security Conference, 10/22/1996.
J. Thomas Haigh, "Proceedings of the 1996 Workshop on New Security Paradigms", 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, ACM Press, 09/16/1996.
1995
D. Thomsen, R. C. O’Brien, Tom Haigh, "LOCK DBMS: Integrating Type Enforcement", Research Directions in Database Security VI, SRI, pp. 69-72, 09/1995.
J.Thomas Haigh, R. O’Brien, D. Thomsen, "High Assurance MLS Database Applications", Proceedings of the AFCEA Database Conference, 1995.
1992
D.J. Thomsen, J. Thomas Haigh, Carl E. Landwehr, "Discussion Notes and Research Question List", Database Security IV: Status and Prospects, Amsterdam, North-Holland, pp. 263-280, 1992.
1991
J. Thomas Haigh, "LOCK Data Views (LDV)", Lecture Notes for the Short Course in Trusted Database Management Systems, 1991.
J. T. Haigh, R. C. O’Brien, D. J. Thomsen, "The LDV Secure Relational DBMS Model", Database Security IV: Status and Prospects, Amsterdam, North-Holland, pp. 265-280, 1991.
1990
D. J. Thomsen, J. T. Haigh, "A comparison of type enforcement and Unix setuid implementation of well-formed transactions", Proceedings of Sixth Annual Computer Security Applications Conference: ACM Press, pp. 304-312, 1990. Abstract
J.T. Haigh, R.C. O’Brien, P.D. Stachour, D.L. Toups, "The LDV Approach to Database Security", Database Security III: Status and Prospects, Amsterdam, North-Holland, 1990.
J. T.Haigh, R. C. O’Brien, D. J. Thomsen, "The LDV Secure Relational DBMS Model", In Proc. IFIP W.G. 11.3 Workshop on Database Security, 1990.
12next ›last »