default search action
John McLean
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2008
- [j10]Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John McLean:
Applying Formal Methods to a Certifiably Secure Software System. IEEE Trans. Software Eng. 34(1): 82-98 (2008) - 2007
- [c13]John McLean:
Formal methods in security engineering: where we've been, where we are, where we need to go. FMSE 2007: 1 - 2006
- [j9]Jonathan Westwell, Miriam Andrews, John McLean, Katrina Mitchell:
Baker & McKenzie's annual review of developments in EU law relating to IP, IT and telecommunications. Comput. Law Secur. Rev. 22(1): 20-25 (2006) - [c12]Ann Miller, John McLean, O. Sami Saydjari, Jeffrey M. Voas:
COMPSAC Panel Session on Trustworthy Computing. COMPSAC (1) 2006: 31 - [c11]John McLean:
Trustworthy Software: Why we need it, Why we don't have it, How we can get it. COMPSAC (1) 2006: 32-33 - 2005
- [j8]Jonathan Westwell, Miriam Andrews, John McLean, Katrina Mitchell:
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications. Comput. Law Secur. Rev. 21(6): 452-457 (2005) - 2002
- [j7]Clay Williams, Harm Sluiman, David Pitcher, Marius Slavescu, Jim Spratley, Mark Brodhun, John McLean, Charles Rankin, Karen Rosengren:
The STCL test tools architecture. IBM Syst. J. 41(1): 74-88 (2002)
1990 – 1999
- 1999
- [c10]John McLean:
Twenty Years of Formal Methods. S&P 1999: 115-116 - 1996
- [j6]John McLean:
A General Theory of Composition for a Class of "Possibilistic'' Properties. IEEE Trans. Software Eng. 22(1): 53-67 (1996) - 1995
- [c9]James W. Gray III, John McLean:
Using temporal logic to specify and verify cryptographic protocols. CSFW 1995: 108- - 1994
- [c8]Oliver Costich, John McLean, John P. McDermott:
Confidentiality in a Replicated Architecture Trusted Database System: A Formal Model. CSFW 1994: 60-65 - [c7]John McLean:
A general theory of composition for trace sets closed under selective interleaving functions. S&P 1994: 79-93 - 1993
- [c6]John McLean:
New paradigms for high assurance software. NSPW 1993: 42-47 - 1992
- [j5]John McLean:
Proving Noninterference and Functional Correctness Using Traces. J. Comput. Secur. 1(1): 37-58 (1992) - 1990
- [j4]John McLean:
The Specification and Modeling of Computer Security. Computer 23(1): 9-16 (1990) - [c5]John McLean:
Security Models and Information Flow. S&P 1990: 180-189
1980 – 1989
- 1988
- [c4]John McLean:
The algebra of security. S&P 1988: 2-7 - 1987
- [c3]John McLean:
Reasoning About Security Models. S&P 1987: 123-133 - 1985
- [j3]John McLean:
A Comment on the 'Basic Security Theorem' of Bell and LaPadula. Inf. Process. Lett. 20(2): 67-70 (1985) - [j2]John McLean:
Two dogmas of program specification. ACM SIGSOFT Softw. Eng. Notes 10(4): 85-87 (1985) - 1984
- [j1]John McLean:
A Formal Method for the Abstract Specification of Software. J. ACM 31(3): 600-627 (1984) - 1983
- [c2]John McLean:
A Complete System of Temporal Logic for Specification Schemata. Logic of Programs 1983: 360-370 - 1982
- [c1]John K. Dixon, John McLean, David Lorge Parnas:
Rapid prototyping by means of abstract module specifications written as trace axioms. Rapid Prototyping 1982: 45-49
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint