Matthew A. Bishop
Affiliations: | University of California, Davis, Davis, CA |
Area:
Computer ScienceGoogle:
"Matthew Bishop"Parents
Sign in to add mentorDorothy E. Denning | grad student | 1984 | Purdue | |
(Practical Take-Grant Systems: Do They Exist?) |
Children
Sign in to add traineeThomas S. Walcott | grad student | 2004 | UC Davis |
Bhume Bhumiratana | grad student | 2009 | UC Davis |
S. T. Brugger | grad student | 2009 | UC Davis |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Furnell S, Bishop M. (2020) Addressing cyber security skills: the spectrum, not the silo Computer Fraud & Security. 2020: 6-11 |
Zhou J, Heckman M, Reynolds B, et al. (2007) Modeling network intrusion detection alerts for correlation Acm Transactions On Information and System Security. 10 |
Walcott T, Bishop M. (2004) Traducement: A model for record security Acm Transactions On Information and System Security. 7: 576-590 |
Bishop M, Vigna G. (2002) Computer Security Education: Training, Scholarship, and Research (Supplement to Computer Magazine) Ieee Computer |
Bishop M. (2000) Education in information security Ieee Concurrency. 8: 4-8 |
Bishop M. (1995) Theft of information in the take-grant protection model Journal of Computer Security. 3: 283-308 |
Bishop M, Klein DV. (1995) Refereed paper: Improving system security via proactive password checking Computers & Security. 14: 233-249 |
Bishop M. (1990) Collaboration using roles Software - Practice and Experience. 20: 485-497 |