| 2002 |
21 | | John E. Dobson,
Cliff B. Jones,
Rob Procter,
Mark Rouncefield,
Robin Williams:
Editorial message: special track on inter-disciplinary approaches to the design of dependable computer systems.
SAC 2002: 704-705 |
20 | | Panayiotis Periorellis,
John E. Dobson:
Organisational Failures in Dependable Collaborative Enterprise Systems.
Journal of Object Technology 1(3): 107-117 (2002) |
| 2001 |
19 | | John E. Dobson,
Brian Randell:
Building Reliable Secure Computing Systems out of Unreliable Insecure Components.
ACSAC 2001: 162-173 |
18 | | Bridgette Wessels,
John E. Dobson:
What Happens before Requirements Engineering?
RE 2001: 298-299 |
| 1999 |
17 | | Panayiotis Periorellis,
John E. Dobson:
Modeling Dynamic Networks: Advantages and Limitations of the O-O Approach.
TOOLS (31) 1999: 448-457 |
| 1998 |
16 | | Bhavani M. Thuraisingham,
Sushil Jajodia,
Pierangela Samarati,
John E. Dobson,
Martin S. Olivier:
Security and Privacy Issues for the World Wide Web: Panel Discussion.
DBSec 1998: 269-284 |
15 | | Ros Strens,
Mike Martin,
John E. Dobson,
Stephen Plagemann:
Business and Market Models of Brokerage in Network-Based Commerce.
IS&N 1998: 315-326 |
| 1997 |
14 | | Huey-Der Chu,
John E. Dobson,
I-Chiang Liu:
FAST: a framework for automating statistics-based testing.
Software Quality Journal 6(1): 13-36 (1997) |
| 1996 |
13 | | David L. Spooner,
Steven A. Demurjian,
John E. Dobson:
Database Security IX: Status and Prospects, Proceedings of the Ninth Annual IFIP WG11 Working Conference on Database Security, Rensselaerville, New York, USA, 13-16 August 1995
Chapman & Hall 1996 |
| 1995 |
12 | | John E. Dobson:
Report of Discussion Sessions Following Presentations.
DBSec 1995: 382-387 |
11 | | John E. Dobson,
Mike Martin:
Messages, Communication, Information Security: Protecting the User from the Data.
DBSec 1995: 8-23 |
| 1993 |
10 | | Andrew Blyth,
J. Chudge,
John E. Dobson,
Ros Strens:
ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements.
COOCS 1993: 216-227 |
| 1992 |
9 | | Alan Burns,
John A. McDermid,
John E. Dobson:
On the Meaning of Safety and Security.
Comput. J. 35(1): 3-15 (1992) |
| 1991 |
8 | | John E. Dobson:
Information and Denial of Service.
DBSec 1991: 21-46 |
| 1990 |
7 | | Mike Martin,
John E. Dobson:
Enterprise Modeling and Security Policies.
DBSec 1990: 117-150 |
| 1989 |
6 | | John E. Dobson:
Conversation Structures as a Means of Specifying Security Policy.
DBSec 1989: 25-39 |
5 | | John E. Dobson,
John A. McDermid:
A Framework for Expressing Models of Security Policy.
IEEE Symposium on Security and Privacy 1989: 229-241 |
| 1988 |
4 | | John E. Dobson,
John A. McDermid:
Security Models and Enterprise Models.
DBSec 1988: 1-39 |
| 1987 |
3 | | John E. Dobson:
Security and Databases: A Personal View.
DBSec 1987: 11-21 |
| 1986 |
2 | | John E. Dobson,
Brian Randell:
Building Reliable Secure Computing Systems out of Unreliable Insecure Components.
IEEE Symposium on Security and Privacy 1986: 187-193 |
1 | | Brian Randell,
John E. Dobson:
Reliability and Security Issues in Distributed Computing Systems.
Symposium on Reliability in Distributed Software and Database Systems 1986: 113-118 |