Dan Thomsen
According to our database1,
Dan Thomsen
authored at least 26 papers
between 1988 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
2020
Proceedings of the 12th International Workshop on Theory and Practice of Provenance, 2020
2019
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019
2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
2013
Proceedings of the Handbook of Human Computation, 2013
Proceedings of the Handbook of Human Computation, 2013
2012
Massively collaborative problem solving: new security solutions and new security risks.
Secur. Informatics, 2012
2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
2007
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007
2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
1999
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1990
Role-Based Application Design and Enforcement.
Proceedings of the Database Security, 1990
The LDV Secure Relational DBMS Model.
Proceedings of the Database Security, 1990
A comparison of type enforcement and Unix setuid implementation of well-formed transactions.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
1989
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989
1988
Prototyping as a Research Tool for MLS/DBMS.
Proceedings of the Database Security, 1988
Discussion Notes and Research Question List.
Proceedings of the Database Security, 1988