Follow
John McLean
John McLean
Superintendent of Information Technology Division, Naval Research Lab
Verified email at nrl.navy.mil - Homepage
Title
Cited by
Cited by
Year
A general theory of composition for trace sets closed under selective interleaving functions
J McLean
Proceedings of 1994 IEEE Computer Society Symposium on Research in Security …, 1994
4221994
Security models and information flow
J McLean
IEEE Symposium on Research in Security and Privacy, 180-187, 1990
4191990
A security model for military message systems
CE Landwehr, CL Heitmeyer, J McLean
ACM Transactions on Computer Systems (TOCS) 2 (3), 198-222, 1984
2611984
A Security Model for Military Message Systems
C Landwehr, C Heitmeyer, J McLean
Naval Research Laboratory, 1984
2611984
Security Models
J McLean
Encyclopedia of Software Engineering 2, 1136-1145, 1994
2501994
The specification and modeling of computer security
J McLean
Computer 23 (1), 9-16, 1990
2501990
A general theory of composition for a class of" possibilistic" properties
J McLean
IEEE Transactions on Software Engineering 22 (1), 53-67, 1996
2051996
A comment on the ‘basic security theorem’of Bell and LaPadula
J McLean
Information Processing Letters 20 (2), 67-70, 1985
1891985
Proving noninterference and functional correctness using traces
J McLean
Journal of Computer security 1 (1), 37-57, 1992
1501992
Reasoning about security models
J McLean
Research in Security and Privacy, 1987. Proceedings., 1987 IEEE Computer …, 1987
1501987
Applying formal methods to a certifiably secure software system
C Heitmeyer, M Archer, E Leonard, J McLean
IEEE Transactions on Software Engineering 34 (1), 82-98, 2008
1302008
The Algebra of Security
J McLean
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 2-7, 1988
118*1988
Formal specification and verification of data separation in a separation kernel for an embedded system
CL Heitmeyer, M Archer, EI Leonard, J McLean
Proceedings of the 13th ACM conference on Computer and communications …, 2006
1062006
Non-interference: Who needs it?
P Ryan, JD McLean, JK Millen, VD Gligor
Proceedings of the 14th IEEE workshop on Computer Security Foundations 1, 237, 2001
101*2001
Unusual side effects of clomipramine associated with yawning
JD McLean, RG Forsythe, IA Kapkin
The Canadian Journal of Psychiatry 28 (7), 569-570, 1983
971983
A formal method for the abstract specification of software
J McLean
Journal of the ACM (JACM) 31 (3), 600-627, 1984
861984
Abstract requirements specification: A new approach and its application
CL Heitmeyer, JD McLean
Software Engineering, IEEE Transactions on, 580-589, 1983
681983
Using temporal logic to specify and verify cryptographic protocols
JW Gray, J McLean
Proceedings The Eighth IEEE Computer Security Foundations Workshop, 108-116, 1995
661995
What Happened to Formal Methods for Security
K Schaffer, Voas, Jeff, P Black, C Heitmeyer, J Kiniry, K Levitt, J McLean, ...
IEEE Computer, 70-99, 2016
30*2016
High assurance computer systems: A research agenda
J McLean, C Heitmeyer
America in the Age of Information, National Science and Technology Council …, 1995
271995
The system can't perform the operation now. Try again later.
Articles 1–20