Found 26 results
Filters: author is O’Brien [Clear All Filters]
2009
"The Case for Prevention-based, Host-resident Defenses in the Modern PCS Network", Cyber Security and Information Intelligence Research Workshop (CSIIRW 2009), Oak Ridge, TN, 04/13/2009.
"Virtual Private Groups for Protecting Critical Infrastructure Networks", CyberSecurity Applications and Technology Conference for Homeland Security, Washington, DC, 03/03/2009.
"Trapping Malicious Insiders in the SPDR Web", Hawaii International Conference on Systems Sciences (HICSS-42), Honolulu, HI, 01/05/2009.
2008
"Effective Monitoring of a Survivable Distributed Networked Information System", Third International Conference on Availability, Reliability and Security, 03/04/2008. Abstract
"Trapping Malicious Insiders in the SPDR Web", Hawaii International Conference on Systems Sciences, 2008 .
2003
"Intrusion Tolerance Via Network Layer Controls", DARPA Information Survivability Conference and Exposition, vol. 1, pp. 90-96, 04/22/2003. Abstract
2001
"Checkmate network security modeling", DARPA Information Survivability Conference & Exposition II, vol. 1, pp. 214-226, 06/12/2001. Abstract
2000
"Layered Security Policy Management Using Napoleon", MilCom 2000, pp. 134-142, 10/22/2000. Abstract
1999
"Napoleon: A Recipe for Workflow", 15th Annual Computer Security Applications Conference, Phoenix, AZ, pp. 134-142, 12/06/1999. Abstract
"Napoleon, Network Application Policy Environment", Fourth ACM RBAC Workshop, pp. 145-152, 10/28/1999. Abstract
1998
"Role Based Access Control Framework for Network Enterprises", 14th Annual Computer Security Applications Conference, Scottsdale, AZ, pp. 50-58, 12/07/1998. Abstract
1997
"Using kernel hypervisors to secure applications", 13th Annual Computer Security Applications Conference, pp. 175-181, 12/08/1997. Abstract
1995
"LOCK DBMS: Integrating Type Enforcement", Research Directions in Database Security VI, SRI, pp. 69-72, 09/1995.
"High Assurance MLS Database Applications", Proceedings of the AFCEA Database Conference, 1995.
1991
"Developing applications on LOCK", 14th NIST-NCSC National Computer Security Conference, pp. 147-156, 1991.
"The LDV Secure Relational DBMS Model", Database Security IV: Status and Prospects, Amsterdam, North-Holland, pp. 265-280, 1991.
1990
"The LDV Approach to Database Security", Database Security III: Status and Prospects, Amsterdam, North-Holland, 1990.
"The LDV Secure Relational DBMS Model", In Proc. IFIP W.G. 11.3 Workshop on Database Security, 1990.
1989
"Noninterference and the Unwinding for LOCK", Proceedings of Computer Security Foundations Workshop II, 05/22/1989.
1980
"A Separable Banach Space with the Radon-Nikodym Property that is not Isomorphic to a Subspace of a Separable Dual", Proceedings of the American Mathematical Society, 1, vol. 78, pp. 40-42, 1980.
1978
"Nonexpansive Mappings, Asymptotic Regularity and Successive Approximations", Journal of the London Mathematical Society, pp. 547-554, 1978.
1977
"An upper bound on the path number of a digraph", Journal of Combinatorial Theory, pp. 168-174, 1977.
"On points at which a set is cone shaped", Proceedings of the American Mathematical Society, pp. 327-330, 1977.
1976
"On the openness of the barycentre map", Mathematische Annalen, pp. 207-212, 1976.
"On embedding a compact convex set into a locally convex topological vector space", Pacific Journal of Mathematics, vol. 64, issue 1, 1976.
12next ›last »
|