Glenn S. Benson

According to our database1, Glenn S. Benson authored at least 6 papers between 1989 and 2010.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Credentials Management for High-Value Transactions.
Proceedings of the Computer Network Security, 2010

1994
Redrawing the Security Perimeter of a Trusted System.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

1992
An optimal solution to the secure reader-writer problem.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

1991
A prototype B3 trusted X Window System.
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991

1990
A Security Reclassifier for a Local Area Network.
Proceedings of the ESORICS 90, 1990

1989
The Hierarchical Model of Distributed System Security.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989


  Loading...