John E. Dobson
According to our database1,
John E. Dobson
authored at least 25 papers
between 1986 and 2002.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2002
J. Object Technol., 2002
Editorial message: special track on inter-disciplinary approaches to the design of dependable computer systems.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002
2001
Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE 2001), 2001
1999
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999
1998
Proceedings of the Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, 1998
Security and Privacy Issues for the World Wide Web: Panel Discussion.
Proceedings of the Database Security XII: Status and Prospects, 1998
1997
1996
Proceedings of the Safety-Critical Systems: The Convergence of High Tech and Human Factors, 1996
1995
Messages, Communication, Information Security: Protecting the User from the Data.
Proceedings of the Database Security IX: Status and Prospects, 1995
Report of Discussion Sessions Following Presentations.
Proceedings of the Database Security IX: Status and Prospects, 1995
1994
Proceedings of the First IEEE International Conference on Requirements Engineering, 1994
1993
The change and evolution of requirements as a challenge to the practice of software engineering.
Proceedings of IEEE International Symposium on Requirements Engineering, 1993
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993
ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements.
Proceedings of the Conference on Organizational Computing Systems, 1993
Proceedings of the Seventeenth Annual International Computer Software and Applications Conference, 1993
1992
Proceedings of the Sixteenth Annual International Computer Software and Applications Conference, 1992
1991
Information and Denial of Service.
Proceedings of the Database Security, 1991
1990
Enterprise Modeling and Security Policies.
Proceedings of the Database Security, 1990
1989
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989
Conversation Structures as a Means of Specifying Security Policy.
Proceedings of the Database Security, 1989
1988
Security Models and Enterprise Models.
Proceedings of the Database Security, 1988
1987
Security and Databases: A Personal View.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987
1986
Reliability and Security Issues in Distributed Computing Systems.
Proceedings of the Fifth Symposium on Reliability in Distributed Software and Database Systems, 1986
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986