A general theory of composition for trace sets closed under selective interleaving functions J McLean Proceedings of 1994 IEEE Computer Society Symposium on Research in Security …, 1994 | 429 | 1994 |
Security models and information flow J McLean IEEE Symposium on Research in Security and Privacy, 180-187, 1990 | 420 | 1990 |
A Security Model for Military Message Systems C Landwehr, C Heitmeyer, J McLean Naval Research Laboratory, 1984 | 266 | 1984 |
Security Models J McLean Encyclopedia of Software Engineering 2, 1136-1145, 1994 | 248 | 1994 |
The specification and modeling of computer security J McLean Computer 23 (1), 9-16, 1990 | 248 | 1990 |
A general theory of composition for a class of" possibilistic" properties J McLean IEEE Transactions on Software Engineering 22 (1), 53-67, 1996 | 209 | 1996 |
A comment on the ‘basic security theorem’of Bell and LaPadula J McLean Information Processing Letters 20 (2), 67-70, 1985 | 188 | 1985 |
Proving noninterference and functional correctness using traces J McLean Journal of Computer security 1 (1), 37-57, 1992 | 156 | 1992 |
Reasoning about security models J McLean Research in Security and Privacy, 1987. Proceedings., 1987 IEEE Computer …, 1987 | 150 | 1987 |
Applying formal methods to a certifiably secure software system C Heitmeyer, M Archer, E Leonard, J McLean IEEE Transactions on Software Engineering 34 (1), 82-98, 2008 | 134 | 2008 |
The Algebra of Security J McLean Proceedings of the 1988 IEEE Symposium on Security and Privacy, 2-7, 1988 | 118* | 1988 |
Formal specification and verification of data separation in a separation kernel for an embedded system CL Heitmeyer, M Archer, EI Leonard, J McLean Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 106 | 2006 |
Unusual side effects of clomipramine associated with yawning JD McLean, RG Forsythe, IA Kapkin The Canadian Journal of Psychiatry 28 (7), 569-570, 1983 | 103 | 1983 |
Non-interference: Who needs it? P Ryan, JD McLean, JK Millen, VD Gligor Proceedings of the 14th IEEE workshop on Computer Security Foundations 1, 237, 2001 | 102* | 2001 |
A formal method for the abstract specification of software J McLean Journal of the ACM (JACM) 31 (3), 600-627, 1984 | 86 | 1984 |
Abstract requirements specification: A new approach and its application CL Heitmeyer, JD McLean Software Engineering, IEEE Transactions on, 580-589, 1983 | 67 | 1983 |
Using temporal logic to specify and verify cryptographic protocols JW Gray, J McLean Proceedings The Eighth IEEE Computer Security Foundations Workshop, 108-116, 1995 | 66 | 1995 |
What Happened to Formal Methods for Security K Schaffer, Voas, Jeff, P Black, C Heitmeyer, J Kiniry, K Levitt, J McLean, ... IEEE Computer, 70-99, 2016 | 30* | 2016 |
High assurance computer systems: A research agenda J McLean, C Heitmeyer America in the Age of Information, National Science and Technology Council …, 1995 | 27 | 1995 |
Security and dependability: then and now C Meadows, J McLean Proceedings Computer Security, Dependability, and Assurance: From Needs to …, 1998 | 25 | 1998 |