Judith N. Froscher
According to our database1,
Judith N. Froscher
authored at least 22 papers
between 1986 and 2003.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2003
Merging paradigms of survivability and security: stochastic faults and designed faults.
Proceedings of the New Security Paradigms Workshop 2003, 2003
2001
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001
A Secure Workflow System for Dynamic Collaboration.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
2000
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000
1999
A Strategy for an MLS Workflow Management System.
Proceedings of the Research Advances in Database and Information Systems Security, 1999
Proceedings of the Advanced Information Systems Engineering, 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
1996
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996
1994
The SINTRA Data Model: Structure and Operations.
Proceedings of the Database Security, 1994
Proceedings of the 10th Annual Computer Security Applications Conference, 1994
Proceedings of the 10th Annual Computer Security Applications Conference, 1994
1993
Using Object Modeling Techniques to Design MLS Data Models.
Proceedings of the Security for Object-Oriented Systems, 1993
1992
A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System.
Proceedings of the Database Security, 1992
1990
IEEE Trans. Knowl. Data Eng., 1990
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
Successful acquisition of certifiable application systems (or: How not to shake hands with the tar baby).
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
1988
Achieving a Trusted Database Management System Using Parallelism.
Proceedings of the Database Security, 1988
1986
Software Engineering for Rule-Based Software Systems.
Proceedings of the Fall Joint Computer Conference, November 2-6, 1986, Dallas, Texas, USA, 1986