default search action
James Bret Michael
Person information
- affiliation: Naval Postgraduate School, Monterey, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j70]Michael T. Swearingen, James Bret Michael, Joseph Weiss, Robert Radvanovsky:
Resilient Without Zero Trust. Computer 57(1): 120-122 (2024) - [j69]Andreas Grünert, James Bret Michael, Rolf Oppliger, Ruedi Rytz:
Why Probabilities Cannot Be Used in Cyber Risk Management. Computer 57(10): 86-89 (2024) - [j68]Matthew Litton, Doron Drusinsky, London Bridget, James Bret Michael:
Machine-Learned Correctness Properties, Runtime Verification, and Advance-Warning Oracles for Autonomous Systems. Computer 57(10): 118-130 (2024) - [i1]Matthew Litton, Doron Drusinsky, James Bret Michael:
Discovering Decision Manifolds to Assure Trusted Autonomous Systems. CoRR abs/2402.07791 (2024) - 2023
- [j67]Qinghua Lu, Liming Zhu, Jon Whittle, James Bret Michael:
Software Engineering for Responsible AI. Computer 56(4): 13-16 (2023) - [j66]Thomas C. Wingfield, James Bret Michael:
Waterfall: Cascading Effects of a Strategic Cyber Campaign. Computer 56(4): 143-148 (2023) - [j65]Doron Drusinsky, Matthew Litton, James Bret Michael:
Machine-Learned Verification and Advance Notice Oracles for Autonomous Systems. Computer 56(7): 121-130 (2023) - [j64]Joseph Weiss, James Bret Michael, Michael T. Swearingen:
There Is No Chilling When Your Control System Cybersecurity Is Unfulfilling. Computer 56(12): 120-124 (2023) - 2022
- [j63]Doron Drusinsky, Matthew Litton, James Bret Michael:
Lightweight Verification and Validation of Cyberphysical Systems Using Machine-Learned Correctness Properties. Computer 55(2): 102-108 (2022) - [j62]James Bret Michael, Marko Orescanin:
Developing and Deploying Artificial Intelligence Systems. Computer 55(6): 15-17 (2022) - [j61]James Bret Michael:
Placing Trust in Automated Software Development Processes. Computer 55(7): 78-81 (2022) - [j60]James Bret Michael, George W. Dinolt, Frederick B. Cohen, Duminda Wijesekera:
Can You Trust Zero Trust? Computer 55(8): 103-105 (2022) - [j59]James Bret Michael:
Understanding Conversational Artificial Intelligence. Computer 55(9): 115-119 (2022) - [j58]Joseph Weiss, Michael Hood, Nadine Miller, Chris Potorieko, James Bret Michael:
Using Machine Learning to Work Around the Operational and Cybersecurity Limitations of Legacy Process Sensors. Computer 55(11): 106-111 (2022) - [j57]James Bret Michael:
Taking a Measured Approach to Investing in Information Infrastructure for Attaining Leading-Edge Trustworthy Artificial Intelligence. IEEE Secur. Priv. 20(5): 4-6 (2022) - [c61]Doron Drusinsky, James Bret Michael, Matthew Litton:
Machine-Learned Specifications for the Verification and Validation of Autonomous Cyberphysical Systems. ISSRE Workshops 2022: 333-341 - 2021
- [j56]Richard D. Riehle, James Bret Michael:
Improving the Trustworthiness of Software Through Rigorous Data Type Design. Computer 54(1): 89-95 (2021) - [j55]Matthew Lanoue, Chad A. Bollmann, James Bret Michael, John D. Roth, Duminda Wijesekera:
An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities. Computer 54(4): 76-84 (2021) - [j54]Joanna F. DeFranco, Christopher S. Eagle, James Bret Michael, John Viega, Jeffrey M. Voas:
Hackathons 101. Computer 54(5): 65-69 (2021) - [j53]Joshua A. Kroll, James Bret Michael, David B. Thaw:
Enhancing Cybersecurity via Artificial Intelligence: Risks, Rewards, and Frameworks. Computer 54(6): 64-71 (2021) - [j52]John Viega, James Bret Michael:
Struggling With Supply-Chain Security. Computer 54(7): 98-104 (2021) - [j51]Doron Drusinsky, James Bret Michael:
Multiagent Pathfinding Under Rigid, Optimization, and Uncertainty Constraints. Computer 54(7): 111-118 (2021) - [j50]James Bret Michael, Doron Drusinsky, Duminda Wijesekera:
Formal Verification of Cyberphysical Systems. Computer 54(9): 15-24 (2021) - [j49]James Bret Michael, Doron Drusinsky, Duminda Wijesekera:
Formal Methods in Cyberphysical Systems. Computer 54(9): 25-29 (2021) - [j48]James Bret Michael, Thomas C. Wingfield:
Defensive AI: The Future Is Yesterday. Computer 54(9): 90-96 (2021) - [j47]James Bret Michael:
Trusting Human-Machine Teaming. Computer 54(11): 104-107 (2021) - [j46]Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael:
Perspectives on the SolarWinds Incident. IEEE Secur. Priv. 19(2): 7-13 (2021) - [j45]James Bret Michael:
Security and Privacy for Edge Artificial Intelligence. IEEE Secur. Priv. 19(4): 4-7 (2021) - [j44]Thomas Carter, Joshua A. Kroll, James Bret Michael:
Lessons Learned From Applying the NIST Privacy Framework. IT Prof. 23(4): 9-13 (2021) - [c60]Matthew Lanoue, James Bret Michael, Chad A. Bollmann:
Spoofed Networks: Exploitation of GNSS Security Vulnerability in 4G and 5G Mobile Networks. SPECTS 2021: 1-8 - 2020
- [j43]Loren E. Peitso, James Bret Michael:
The Promise of Interactive Shared Augmented Reality. Computer 53(1): 45-52 (2020) - [j42]Doron Drusinsky, James Bret Michael:
Obtaining Trust in Executable Derivatives Using Crowdsourced Critiques With Blind Signatures. Computer 53(4): 51-56 (2020) - [j41]James Bret Michael, George W. Dinolt, Doron Drusinsky:
Open Questions in Formal Methods. Computer 53(5): 81-84 (2020) - [j40]James Bret Michael, D. Richard Kuhn, Jeffrey M. Voas:
Cyberthreats in 2025. Computer 53(6): 16-27 (2020) - [j39]James Bret Michael, D. Richard Kuhn, Jeffrey M. Voas:
Security or Privacy: Can You Have Both? Computer 53(9): 20-30 (2020) - [j38]James Bret Michael, Jeffrey M. Voas:
Algorithms, Algorithms, Algorithms. Computer 53(11): 13-15 (2020) - [j37]James Bret Michael:
Practical Aspects of Employing Antireverse Engineering. IT Prof. 22(3): 11-13 (2020) - [c59]Nathan Thiem, Marko Orescanin, James Bret Michael:
Reducing Artifacts in GAN Audio Synthesis. ICMLA 2020: 1268-1275
2010 – 2019
- 2019
- [j36]John D. Roth, Corey E. Lutton, James Bret Michael:
Security Through Simplicity: A Case Study in Logical Segmentation Inference. Computer 52(7): 76-79 (2019) - [j35]James Bret Michael:
Assessing the Trustworthiness of Electronic Systems. Computer 52(11): 80-83 (2019) - [j34]James Bret Michael:
Trustworthiness of Autonomous Machines in Armed Conflict. IEEE Secur. Priv. 17(6): 4-6 (2019) - 2015
- [j33]James Bret Michael:
Trusted Computing: An Elusive Goal. Computer 48(3): 99-101 (2015) - 2014
- [j32]Michael A. Schumann, Doron Drusinsky, James Bret Michael, Duminda Wijesekera:
Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes. IEEE Trans. Software Eng. 40(2): 154-166 (2014) - 2013
- [j31]James Bret Michael:
Empowering Users through Secure On-Demand Data Provisioning. Computer 46(6): 84-85 (2013) - [j30]James Bret Michael, Phillip A. Laplante, Jeffery E. Payne, Paul E. Black, Jeffrey M. Voas:
Does Security Trump Reliability? Computer 46(11): 84-86 (2013) - [j29]Miriam C. Bergue Alves, Doron Drusinsky, James Bret Michael, Man-tak Shing:
End-to-End Formal Specification, Validation, and Verification Process: A Case Study of Space Flight Software. IEEE Syst. J. 7(4): 632-641 (2013) - 2012
- [j28]Anthony Patrick Melaragno, Damindra Bandara, Duminda Wijesekera, James Bret Michael:
Securing the ZigBee Protocol in the Smart Grid. Computer 45(4): 92-94 (2012) - [j27]William H. Boothby, Wolff Heintschel von Heinegg, James Bret Michael, Michael N. Schmitt, Thomas C. Wingfield:
When Is a Cyberattack a Use of Force or an Armed Attack? Computer 45(8): 82-84 (2012) - [j26]Arnold Brown, Benjamin Apple, James Bret Michael, Michael A. Schumann:
Atomic-Level Security for Web Applications in a Cloud Environment. Computer 45(12): 80-83 (2012) - [j25]Jeffrey M. Voas, J. Bret Michael, Michiel van Genuchten:
The Mobile Software App Takeover. IEEE Softw. 29(4): 25-27 (2012) - [c58]Mohammad Ababneh, Duminda Wijesekera, James Bret Michael:
A Policy-Based Dialogue System for Physical Access Control. STIDS 2012: 57-63 - 2011
- [j24]Jeffrey M. Voas, George F. Hurlburt, Keith W. Miller, Phillip A. Laplante, Bret Michael:
Thoughts on Higher Education and Scientific Research. IT Prof. 13(2): 6-9 (2011) - [j23]T. Owens Walker III, Murali Tummala, John C. McEachen, J. Bret Michael:
Flow-Specific Medium Access for Networked Satellite System. IEEE Syst. J. 5(3): 427-434 (2011) - [j22]James Bret Michael, Doron Drusinsky, Thomas W. Otani, Man-tak Shing:
Verification and Validation for Trustworthy Software Systems. IEEE Softw. 28(6): 86-92 (2011) - [c57]Jason S. Bolin, James Bret Michael, Man-tak Shing:
Cloud Computing Support for Collaboration and Communication in Enterprise-Wide Workflow Processes. SERVICES 2011: 589-593 - [c56]Doron Drusinsky, J. Bret Michael, Man-tak Shing:
Rapid runtime system verification using automatic source code instrumentation. SoSE 2011: 1-6 - [c55]Doron Drusinsky, J. Bret Michael, Thomas W. Otani, Man-tak Shing:
Putting order into the cloud: Object-oriented UML-based enforcement for document and application organization. SoSE 2011: 119-124 - [c54]Miriam C. Bergue Alves, Doron Drusinsky, J. Bret Michael, Man-tak Shing:
Formal validation and verification of space flight software using statechart-assertions and runtime execution monitoring. SoSE 2011: 155-160 - [c53]Alex J. Nelson, George W. Dinolt, J. Bret Michael, Man-tak Shing:
A security and usability perspective of cloud file systems. SoSE 2011: 161-166 - [c52]Scott Dowell, Albert Barreto, J. Bret Michael, Man-tak Shing:
Cloud to cloud interoperability. SoSE 2011: 258-263 - 2010
- [j21]James Bret Michael, John F. Sarkesain, Thomas C. Wingfield, Georgios Dementis, Goncalo Nuno Baptista Sousa:
Integrating Legal and Policy Factors in Cyberpreparedness. Computer 43(4): 90-92 (2010) - [j20]James Bret Michael, Eneken Tikk, Peter Wahlgren, Thomas C. Wingfield:
From Chaos to Collective Defense. Computer 43(8): 91-94 (2010) - [j19]George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller, Phillip A. Laplante, Bret Michael:
A Nonlinear Perspective on Higher Education. Computer 43(12): 90-92 (2010) - [j18]John Viega, Bret Michael:
Guest Editors' Introduction: Mobile Device Security. IEEE Secur. Priv. 8(2): 11-12 (2010) - [j17]Bret Michael:
Balancing Liberty, Stability, and Security. IEEE Secur. Priv. 8(3): 3 (2010) - [j16]James Bret Michael, Man-tak Shing, Kristian John Cruickshank, Patrick J. Redmond:
Hazard Analysis and Validation Metrics Framework for System of Systems Software Safety. IEEE Syst. J. 4(2): 186-197 (2010) - [c51]Kevin D. Foster, John J. Shea, James Bret Michael, Thomas W. Otani, Loren E. Peitso, Man-tak Shing:
Cloud Computing for Large-Scale Weapon Systems. GrC 2010: 161-166 - [c50]Kevin D. Foster, John J. Shea, Doron Drusinsky, James Bret Michael, Thomas W. Otani, Man-tak Shing:
Removing the Boundaries: Steps Toward a Cloud Nirvana. GrC 2010: 167-171 - [c49]Stephen B. Driskell, Judy Murphy, James Bret Michael, Man-tak Shing:
Independent validation of software safety requirements for systems of systems. SoSE 2010: 1-6 - [c48]Thomas W. Otani, James Bret Michael, Man-tak Shing:
Goal-driven software reuse in the IV&V of system of systems. SoSE 2010: 1-6
2000 – 2009
- 2009
- [j15]Nikolaos Petrakos, George W. Dinolt, James Bret Michael, Pantelimon Stanica:
Cube-Type Algebraic Attacks on Wireless Encryption Protocols. Computer 42(10): 103-105 (2009) - [j14]Alexander J. Beecroft, James Bret Michael:
Passive Fingerprinting of Network Reconnaissance Tools. Computer 42(11): 91-93 (2009) - [j13]Bret Michael, Jeffrey M. Voas, Phillip A. Laplante:
Cyberpandemics: History, Inevitability, Response. IEEE Secur. Priv. 7(1): 63-67 (2009) - [j12]Bret Michael:
In Clouds Shall We Trust? IEEE Secur. Priv. 7(5): 3 (2009) - [j11]K. J. Rothenhaus, James Bret Michael, Man-tak Shing:
Architectural Patterns and Auto-Fusion Process for Automated Multisensor Fusion in SOA System-of-Systems. IEEE Syst. J. 3(3): 304-316 (2009) - [c47]Kadir Alpaslan Demir, James Bret Michael, John S. Osmundson:
Approaches for Measuring Software Project Management Effectiveness. Software Engineering Research and Practice 2009: 613-619 - [c46]Randall J. Arvay, Duminda Wijesekera, James Bret Michael:
Using RuleML to specify cross-domain information flow control policies. SoSE 2009: 1-6 - [c45]Kristian John Cruickshank, James Bret Michael, Man-tak Shing:
A Validation Metrics Framework for safety-critical software-intensive Systems. SoSE 2009: 1-8 - [c44]Desmond J. Meacham, James Bret Michael, Man-tak Shing, Jeffrey M. Voas:
Standards interoperability: Applying software safety assurance standards to the evolution of legacy software. SoSE 2009: 1-8 - [c43]James Bret Michael, Richard D. Riehle, Man-tak Shing:
The verification and validation of software architecture for systems of systems. SoSE 2009: 1-6 - [c42]Thomas W. Otani, James Bret Michael, Man-tak Shing:
Software reuse in the IV&V of system of systems. SoSE 2009: 1-5 - [c41]Michael A. Schumann, James Bret Michael:
Statechart based formal modeling of workflow processes. SoSE 2009: 1-5 - [c40]T. Owens Walker III, Murali Tummala, John C. McEachen, J. Bret Michael:
Medium access for hybrid, large-scale wireless networks for missile defense. SoSE 2009: 1-5 - 2008
- [j10]Bret Michael:
Are Governments Up to the Task? IEEE Secur. Priv. 6(6): 4-5 (2008) - [j9]Doron Drusinsky, James Bret Michael, Man-tak Shing:
A framework for computer-aided validation. Innov. Syst. Softw. Eng. 4(2): 161-168 (2008) - [j8]Doron Drusinsky, James Bret Michael, Man-tak Shing:
A Visual Tradeoff Space for Formal Verification and Validation Techniques. IEEE Syst. J. 2(4): 513-519 (2008) - [c39]Clifford C. Juan, James Bret Michael, Christopher S. Eagle:
Vulnerability Analysis of HD Photo Image Viewer Applications. SSIRI 2008: 1-7 - [c38]Doron Drusinsky, James Bret Michael, Thomas W. Otani, Man-tak Shing:
Validating UML Statechart-Based Assertions Libraries for Improved Reliability and Assurance. SSIRI 2008: 47-51 - [c37]Doron Drusinsky, James Bret Michael, Thomas W. Otani, Man-tak Shing:
Integrating statechart assertions into Java components using AspectJ. SoSE 2008: 1-7 - [c36]Grigorios Katsis, T. Owens Walker III, Panagiotis Katopodis, Murali Tummala, J. Bret Michael:
Multistage security for hybrid, large-scale, mobile wireless sensor networks for missile defense. SoSE 2008: 1-6 - [c35]Patrick J. Redmond, J. Bret Michael, Paul V. Shebalin:
Interface hazard analysis for system of systems. SoSE 2008: 1-8 - [c34]Bradley Warren, James Bret Michael, Man-tak Shing:
A framework for software reuse in safety-critical system-of-systems. SoSE 2008: 1-6 - 2007
- [c33]Thomas W. Otani, Mikhail Auguston, Thomas S. Cook, Doron Drusinsky, James Bret Michael, Man-tak Shing:
A design pattern for using non-developmental items in real-time Java. JTRES 2007: 135-143 - [c32]Panagiotis Katopodis, Grigorios Katsis, T. Owens Walker III, Murali Tummala, J. Bret Michael:
A Hybrid, Large-scale Wireless Sensor Network for Missile Defense. SoSE 2007: 1-5 - [c31]B. Rakdham, Murali Tummala, Phillip E. Pace, J. Bret Michael, Z. P. Pace:
Boost Phase Ballistic Missile Defense Using Multiple Hypothesis Tracking. SoSE 2007: 1-6 - [c30]T. Owens Walker III, Murali Tummala, J. Bret Michael:
A Distributed Medium Access Control Protocol for Wireless Networks of Cooperative Radar Systems. SoSE 2007: 1-6 - 2006
- [j7]Mikhail Auguston, James Bret Michael, Man-tak Shing:
Environment behavior models for automation of testing and assessment of system safety. Inf. Softw. Technol. 48(10): 971-980 (2006) - [j6]Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael:
An ontology-based distributed whiteboard to determine legal responses to online cyber attacks. Internet Res. 16(5): 475-490 (2006) - [c29]Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael:
An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks. WOSIS 2006: 232-245 - [c28]Harsha Tummala, Mikhail Auguston, James Bret Michael, Man-tak Shing, David Little, Zachary Pace:
Implementation and analysis of environment behavior models as a tool for testing real-time, reactive systems. SoSE 2006: 1-5 - [c27]Thaddeus Owens Walker III, Murali Tummala, James Bret Michael:
Pulse transmission scheduling for a distributed system of cooperative radars. SoSE 2006: 1-6 - 2005
- [j5]James Bret Michael, Steven E. Roberts, Jeffrey M. Voas, Thomas C. Wingfield:
The Role of Policy in Balancing Outsourcing and Homeland Security. IT Prof. 7(4): 19-23 (2005) - [j4]Naren Kodali, Duminda Wijesekera, James Bret Michael:
SPUTERS: An Integrated Traffic Surveillance and Emergency Response Architecture. J. Intell. Transp. Syst. 9(1): 11-22 (2005) - [j3]Mikhail Auguston, James Bret Michael, Man-tak Shing:
Environment behavior models for scenario generation and testing automation. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-6 (2005) - [c26]Mikhail Auguston, James Bret Michael, Man-tak Shing:
Environment behavior models for scenario generation and testing automation. A-MOST 2005 - [c25]Leisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael:
Making Decisions about Legal Responses to Cyber Attacks. IFIP Int. Conf. Digital Forensics 2005: 283-294 - [c24]Duminda Wijesekera, James Bret Michael, Anil Nerode:
An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy. POLICY 2005: 115-118 - [c23]Mikhail Auguston, James Bret Michael, Man-tak Shing:
Test Automation and Safety Assessment in Rapid Systems Prototyping. IEEE International Workshop on Rapid System Prototyping 2005: 188-194 - [c22]Dale Scott Caffall, James Bret Michael:
Formal methods in a system-of-systems development. SMC 2005: 1856-1863 - [c21]Mikhail Auguston, James Bret Michael, Man-tak Shing, David L. Floodeen:
Using attributed event grammar environment models for automated test generation and software risk assessment of system-of-systems. SMC 2005: 1870-1875 - [c20]Dale Scott Caffall, James Bret Michael:
Architectural framework for a system-of-systems. SMC 2005: 1876-1881 - 2004
- [c19]Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera:
THEMIS: Threat Evaluation Metamodel for Information Systems. ISI 2004: 307-321 - [c18]James Bret Michael, Man-tak Shing, Michael H. Miklaski, Joel D. Babbitt:
Modeling and Simulation of System-of-Systems Timing Constraints with UML-RT and OMNeT++. IEEE International Workshop on Rapid System Prototyping 2004: 202-209 - 2003
- [j2]John S. Osmundson, James Bret Michael, Martin J. Machniak, Mary A. Grossman:
Quality management metrics for software development. Inf. Manag. 40(8): 799-812 (2003) - [c17]James Bret Michael, Thomas C. Wingfield, Steven E. Roberts:
Homeland Security's Cyber Component: A Survey of Legal Issues. COMPSAC 2003: 24- - [c16]James Bret Michael, Thomas C. Wingfield, Duminda Wijesekera:
Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System. COMPSAC 2003: 621-626 - [c15]Donald P. Julian, Neil C. Rowe, James Bret Michael:
Experiments with Deceptive Software Responses to Buffer-Based Attacks. IAW 2003: 43-44 - [c14]J. D. Judd, John C. McEachen, James Bret Michael, Daniel W. Ettlich:
Network stream splitting for intrusion detection. ICON 2003: 525-530 - [c13]James Bret Michael, Georgios Fragkos, Mikhail Auguston:
An Experiment in Software Decoy Design. SEC 2003: 253-264 - [c12]James Bret Michael, Thomas C. Wingfield:
Lawful Cyber Decoy Policy. SEC 2003: 483-488 - 2002
- [c11]James Bret Michael:
On the Response Policy of Software Decoys: Conducting Software-Based Deception in the Cyber Battlespace. COMPSAC 2002: 957-962 - [c10]Ernesto J. Sallés, James Bret Michael, Michael V. Capps, Don McGregor, Andrzej Kapolka:
Security of runtime extensible virtual environments. CVE 2002: 97-104 - [c9]James Bret Michael, Bernard J. Bossuyt, Byron B. Snyder:
Metrics for Measuring the Effectiveness of Software-Testing Tools. ISSRE 2002: 117-128 - [c8]Dale Scott Caffall, James Bret Michael:
A New Paradigm for Requirements Specification and Analysis of System-of-Systems. RISSEF 2002: 108-121 - 2001
- [c7]James Bret Michael, Vanessa L. Ong, Neil C. Rowe:
Natural-Language Processing Support for Developing Policy-Governed Software Systems. TOOLS (39) 2001: 263-275 - 2000
- [c6]James Bret Michael, Leonard T. Gaines:
Trust Management in Distributed Databases. DBSec 2000: 329-337
1990 – 1999
- 1999
- [c5]John McHugh, James Bret Michael:
Secure group management in large distributed systems: what is a group and what does it do? NSPW 1999: 80-85 - 1998
- [j1]James Bret Michael, Datta N. Godbole, John Lygeros, Raja Sengupta:
Capacity Analysis of Traffic Flow Over a Single-Lane Automated Highway System. J. Intell. Transp. Syst. 4(1-2): 49-80 (1998) - 1993
- [c4]James Bret Michael, Edgar H. Sibley, David C. Littman:
Integration of formal and heuristic reasoning as a basis for testing and debugging computer security policy. NSPW 1993: 69-75 - [c3]Edgar H. Sibley, Richard L. Wexelblat, J. Bret Michael, Michael C. Tanner, David C. Littman:
The role of policy in requirements definition. RE 1993: 277-280 - [e1]James Bret Michael, Victoria Ashby, Catherine Meadows:
Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, USA. ACM 1993, ISBN 0-8186-5430-9 [contents] - 1992
- [c2]James Bret Michael, Edgar H. Sibley, Richard F. Baum, Fu Li:
On the Axiomatization of Security Policy: Some Tentative Observations about Logic Representation. DBSec 1992: 367-386 - 1991
- [c1]Edgar H. Sibley, James Bret Michael, Richard L. Wexelblat:
Use of an Experimental Policy Workbench: Description and Preliminary Results. DBSec 1991: 47-76
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint