10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

50. MDDS: Interviews, Concept <strong>of</strong> Oper<strong>at</strong>ion, Scenarios and Technologies, MITRE Report, 1999.51. Adaptable Real-time Object Request Brokers, Volume 3, MITRE tech Report, September 1999 (coauthor:S. Wohlever et al)52. Inference Problem, MITRE Technical Report, 1999. (co-author: H. Rubinovitz)IV. Other Significant Technical Reports1. Multilevel Security for D<strong>at</strong>abase Management Systems, October 1986, Technical Report, HoneywellComputer Sciences Center, Minneapolis, MN, (co-authors: P. Dwyer, G. Jel<strong>at</strong>is).2. Security Policy for LDV, 1989, Technical Report, Honeywell Secure Computing Technology Center,Minneapolis, MN, (co-authors: E. Boebert, B. Dillaway, P. Dwyer, T. Haigh) (also published asRADC Technical report).3. Implement<strong>at</strong>ion Specific<strong>at</strong>ions for LDV, 1989, Technical Report, Honeywell Secure ComputingTechnology Center, Minneapolis, MN, (co-authors: P. Dwyer, T. Haigh, E. Onuegbe, P. Stachour)(also published as RADC Technical report).4. Deficiencies Analysis for LDV, 1989, Technical Report, Honeywell Secure Computing TechnologyCenter, Minneapolis, MN, (co-authors: R. O'Brien, T. Haigh, J. Payne, P. Stachour, D. Toups).5. Optimal Placement <strong>of</strong> Recovery Points in Distributed Environments, 1986,Technical Report TR86-43, <strong>University</strong> <strong>of</strong> Minnesota, Minneapolis, MN, (co-authors: S. Chen, W. Tsai).6. On the Optimal AT and RP Assignment, 1987, Technical Report TR86-47, <strong>University</strong> <strong>of</strong> Minnesota,Minneapolis, MN, (co-authors: W. Tsai, et al.).7. Secure Query Processing Using AI Techniques, 1987, Technical Report TR87-37, Department <strong>of</strong>Computer Science, <strong>University</strong> <strong>of</strong> Minnesota, Minneapolis, MN, (co-authors: W. T. Tsai, T. Keefe).8. Multilevel Security in Object-Oriented Systems, January 1988, Technical Report TR88-8, <strong>University</strong><strong>of</strong> Minnesota, Minneapolis, MN, (co-authors: T. Keefe, W. T. Tsai).9. Artificial Intelligence Applic<strong>at</strong>ions in D<strong>at</strong>abase Security, 1988, Technical Report TR88-31,<strong>University</strong> <strong>of</strong> Minnesota, Minneapolis, MN, (co-authors: W. T. Tsai, T. Keefe, D. Thomsen) (alsoappeared in Computer Security Journal, 1988).10. SODA - A Secure Object-Oriented D<strong>at</strong>abase System, 1989, Technical Report, <strong>University</strong> <strong>of</strong>Minnesota, Minneapolis, MN, (co-authors: W. T. Tsai, T. Keefe).11. Real-time Method Invoc<strong>at</strong>ions in Distributed Environments, TR95-244, January 1996 (co-author: V.Fay. Wolfe et al).12. Real-time CORBA Development <strong>at</strong> MITRE, NRad, TriPacific and URI, TR99-272, December 1997(co-author: G. Cooper et al).13. Scheduling and Priority Mapping for St<strong>at</strong>ic Real-Time Middleware, TR98-261, September 1998 (coauthors:L. DiPippo et al).72

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!