Matthew A. Bishop

Affiliations: 
University of California, Davis, Davis, CA 
Area:
Computer Science
Google:
"Matthew Bishop"

Parents

Sign in to add mentor
Dorothy E. Denning grad student 1984 Purdue
 (Practical Take-Grant Systems: Do They Exist?)

Children

Sign in to add trainee
Thomas S. Walcott grad student 2004 UC Davis
Bhume Bhumiratana grad student 2009 UC Davis
S. T. Brugger grad student 2009 UC Davis
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Furnell S, Bishop M. (2020) Addressing cyber security skills: the spectrum, not the silo Computer Fraud & Security. 2020: 6-11
Zhou J, Heckman M, Reynolds B, et al. (2007) Modeling network intrusion detection alerts for correlation Acm Transactions On Information and System Security. 10
Walcott T, Bishop M. (2004) Traducement: A model for record security Acm Transactions On Information and System Security. 7: 576-590
Bishop M, Vigna G. (2002) Computer Security Education: Training, Scholarship, and Research (Supplement to Computer Magazine) Ieee Computer
Bishop M. (2000) Education in information security Ieee Concurrency. 8: 4-8
Bishop M. (1995) Theft of information in the take-grant protection model Journal of Computer Security. 3: 283-308
Bishop M, Klein DV. (1995) Refereed paper: Improving system security via proactive password checking Computers & Security. 14: 233-249
Bishop M. (1990) Collaboration using roles Software - Practice and Experience. 20: 485-497
See more...