J. Thomas Haigh
According to our database1,
J. Thomas Haigh
authored at least 11 papers
between 1986 and 2009.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
1990
The LDV Secure Relational DBMS Model.
Proceedings of the Database Security, 1990
A comparison of type enforcement and Unix setuid implementation of well-formed transactions.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
1989
The LDV Approach to Database Security.
Proceedings of the Database Security, 1989
Proceedings of the Second IEEE Computer Security Foundations Workshop, 1989
1988
Discussion Notes and Research Question List.
Proceedings of the Database Security, 1988
1987
IEEE Trans. Software Eng., 1987
IEEE Trans. Software Eng., 1987
Modeling Datbase Security Requirements.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987
1986
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986