Follow
John McLean
John McLean
Superintendent of Information Technology Division, Naval Research Lab
Verified email at nrl.navy.mil - Homepage
Title
Cited by
Cited by
Year
A general theory of composition for trace sets closed under selective interleaving functions
J McLean
Proceedings of 1994 IEEE Computer Society Symposium on Research in Security …, 1994
4291994
Security models and information flow
J McLean
IEEE Symposium on Research in Security and Privacy, 180-187, 1990
4201990
A Security Model for Military Message Systems
C Landwehr, C Heitmeyer, J McLean
Naval Research Laboratory, 1984
2661984
Security Models
J McLean
Encyclopedia of Software Engineering 2, 1136-1145, 1994
2481994
The specification and modeling of computer security
J McLean
Computer 23 (1), 9-16, 1990
2481990
A general theory of composition for a class of" possibilistic" properties
J McLean
IEEE Transactions on Software Engineering 22 (1), 53-67, 1996
2091996
A comment on the ‘basic security theorem’of Bell and LaPadula
J McLean
Information Processing Letters 20 (2), 67-70, 1985
1881985
Proving noninterference and functional correctness using traces
J McLean
Journal of Computer security 1 (1), 37-57, 1992
1561992
Reasoning about security models
J McLean
Research in Security and Privacy, 1987. Proceedings., 1987 IEEE Computer …, 1987
1501987
Applying formal methods to a certifiably secure software system
C Heitmeyer, M Archer, E Leonard, J McLean
IEEE Transactions on Software Engineering 34 (1), 82-98, 2008
1342008
The Algebra of Security
J McLean
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 2-7, 1988
118*1988
Formal specification and verification of data separation in a separation kernel for an embedded system
CL Heitmeyer, M Archer, EI Leonard, J McLean
Proceedings of the 13th ACM conference on Computer and communications …, 2006
1062006
Unusual side effects of clomipramine associated with yawning
JD McLean, RG Forsythe, IA Kapkin
The Canadian Journal of Psychiatry 28 (7), 569-570, 1983
1031983
Non-interference: Who needs it?
P Ryan, JD McLean, JK Millen, VD Gligor
Proceedings of the 14th IEEE workshop on Computer Security Foundations 1, 237, 2001
102*2001
A formal method for the abstract specification of software
J McLean
Journal of the ACM (JACM) 31 (3), 600-627, 1984
861984
Abstract requirements specification: A new approach and its application
CL Heitmeyer, JD McLean
Software Engineering, IEEE Transactions on, 580-589, 1983
671983
Using temporal logic to specify and verify cryptographic protocols
JW Gray, J McLean
Proceedings The Eighth IEEE Computer Security Foundations Workshop, 108-116, 1995
661995
What Happened to Formal Methods for Security
K Schaffer, Voas, Jeff, P Black, C Heitmeyer, J Kiniry, K Levitt, J McLean, ...
IEEE Computer, 70-99, 2016
30*2016
High assurance computer systems: A research agenda
J McLean, C Heitmeyer
America in the Age of Information, National Science and Technology Council …, 1995
271995
Security and dependability: then and now
C Meadows, J McLean
Proceedings Computer Security, Dependability, and Assurance: From Needs to …, 1998
251998
The system can't perform the operation now. Try again later.
Articles 1–20