Citation Impact

Citing Papers

Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.
2007 Standout
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
2010 Standout
Coping With Systems Risk: Security Planning Models for Management Decision Making1
1998 Standout
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness1
2010 Standout
A unifying approach to the security of distributed and multi-threaded programs1
2003
A Per Model of Secure Information Flow in Sequential Programs
2001
Language-based information-flow security
2003 Standout
Wireless Communication Technologies for Safe Cooperative Cyber Physical Systems
2018 Standout
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
2010 Standout
Protection motivation and deterrence: a framework for security policy compliance in organisations
2009 Standout
Cyber-physical systems and their security issues
2018 Standout
A survey on security control and attack detection for industrial cyber-physical systems
2017 Standout
Current directions in IS security research: towards socio‐organizational perspectives
2001
seL4
2009 Standout
Automatic creation of SQL Injection and cross-site scripting attacks
2009 Standout
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
2009 Standout
Security Requirements Engineering: A Framework for Representation and Analysis
2008 Standout
Information systems security design methods
1993
TaintDroid
2014 Standout
Basic concepts and taxonomy of dependable and secure computing
2004 Standout
Socio-technical systems: From design methods to systems engineering
2010 Standout
A survey of approaches combining safety and security for industrial control systems
2015 Standout
Operating system verification—An overview
2009

Works of John McLean being referenced

Applying Formal Methods to a Certifiably Secure Software System
2008
The specification and modeling of computer security
1990
Proving Noninterference and Functional Correctness Using Traces
1992
A general theory of composition for a class of "possibilistic" properties
1996
A comment on the ‘basic security theorem’ of Bell and LaPadula
1985
Rankless by CCL
2026