Follow
Dan Thomsen
Title
Cited by
Cited by
Year
Locally adaptable central security management in a heterogeneous network environment
DJ Thomsen, R O'brien, J Bogle, C Payne
US Patent 7,308,702, 2007
1112007
Role based access control framework for network enterprises
D Thomsen, RC O'Brien, J Bogle
Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998
931998
Role Based Application Design and Enforcement
D Thomsen
Proc. of the Fourth IFIP Workshop on Database Security, Halifax, England, 1991
841991
The LDV Secure Relational DBMS Model.
JT Haigh, RC O'Brien, DJ Thomsen
DBSec, 265-280, 1990
691990
Locally adaptable central security management in a heterogeneous network environment
DJ Thomsen, R O'brien, J Bogle, C Payne
US Patent 8,181,222, 2012
492012
Napoleon: network application policy environment
D Thomsen, RC O'Brien, C Payne
Proceedings of the fourth ACM workshop on Role-based access control, 145-152, 1999
331999
A comparison of type enforcement and Unix setuid implementation of well-formed transactions
DJ Thomsen, JT Haigh
[1990] Proceedings of the Sixth Annual Computer Security Applications …, 1990
261990
FUZZBUSTER: Towards adaptive immunity from cyber threats
DJ Musliner, JM Rye, D Thomsen, DD McDonald, MH Burstein, ...
2011 Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems …, 2011
222011
Type enforcement: the new security model
D Thomsen
Multimedia: Full-Service Impact on Business, Education, and the Home 2617 …, 1996
201996
Napoleon: a recipe for workflow
C Payne, D Thomsen, J Bogle, R O'Brien
Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99 …, 1999
191999
Fuzzbuster: A system for self-adaptive immunity from cyber threats
DJ Musliner, JM Rye, D Thomsen, DD McDonald, MH Burstein, ...
Eighth International Conference on Autonomic and Autonomous Systems (ICAS-12 …, 2012
172012
The LDV Secure Relational DBMS Model." Database Security IV: Status and Prospects, S. Jajodia and CE Landwehr
JT Haigh, RC O'Brien, DJ Thomsen
North-Holland, 1991
141991
Incremental assurance for multilevel applications
D Thomsen, M Denz
Proceedings 13th Annual Computer Security Applications Conference, 81-88, 1997
111997
Multi-party conflict: the problem and its solutions
TF Keefe, DJ Thomsen, WT Tsai, MR Hansch
1989 Fifth Annual Computer Security Applications Conference, 222,223,224,225 …, 1989
111989
Sidewinder: Combining Type Enforcement and UNIX
DJ Thomsen
Proc. 11th Computer Security Applications Conference, Orlando, FL, 1995
101995
Systems and methods for performing security authentication based on responses to observed stimuli
TE Ott, DJ Thomsen
US Patent 9,477,823, 2016
92016
Can i reach you? do i need to? new semantics in security policy specification and testing
C Katsis, F Cicala, D Thomsen, N Ringo, E Bertino
Proceedings of the 26th ACM Symposium on Access Control Models and …, 2021
82021
Solving wicked problems
D Thomsen
Handbook of human computation, 265-275, 2013
62013
Massively collaborative problem solving: new security solutions and new security risks
K Greene, D Thomsen, P Michelucci
Security Informatics 1, 1-17, 2012
62012
Exploration in massively collaborative problem solving
K Greene, D Thomsen, P Michelucci
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
62011
The system can't perform the operation now. Try again later.
Articles 1–20