Search the dblp DataBase
Cynthia E. Irvine :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Blaine Burnham , Cynthia E. Irvine , Charles Reynolds , Ravi S. Sandhu , Rayford B. Vaughn Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:265-0 [Conf ] Cynthia E. Irvine , Timothy E. Levin Toward a Taxonomy and Costing Method for Security Services. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:183-188 [Conf ] Raj Mohan , Timothy E. Levin , Cynthia E. Irvine An Editor for Adaptive XML-Based Policy Management of IPsec. [Citation Graph (0, 0)][DBLP ] ACSAC, 2003, pp:276-285 [Conf ] E. Spyropoulou , Timothy E. Levin , Cynthia E. Irvine Calculating Costs for Quality of Security Service. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:334-343 [Conf ] Roger Wright , David J. Shifflett , Cynthia E. Irvine Security Architecture for a Virtual Heterogeneous Machine. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:167-177 [Conf ] Cynthia E. Irvine , David J. Shifflett , Paul Clark , Timothy E. Levin , George W. Dinolt MYSEA Technology Demonstration. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:10-12 [Conf ] Cynthia E. Irvine , David J. Shifflett , Paul Clark , Timothy E. Levin , George W. Dinolt Monterey Security Enhanced Architecture Project. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:176-181 [Conf ] Debra A. Hensgen , Taylor Kidd , David St. John , Matthew C. Schnaidt , Howard Jay Siegel , Tracy D. Braun , Muthucumaru Maheswaran , Shoukat Ali , Jong-Kook Kim , Cynthia E. Irvine , Timothy E. Levin , Richard F. Freund , Matt Kussow , Michael W. Godfrey , Alpay Duman , Paul Carff , Shirley Kidd , Viktor K. Prasanna , Prashanth B. Bhat , Ammar H. Alhusaini An Overview of MSHN: The Management System for Heterogeneous Networks. [Citation Graph (0, 0)][DBLP ] Heterogeneous Computing Workshop, 1999, pp:184-198 [Conf ] Cynthia E. Irvine , Timothy E. Levin Toward Quality of Security Service in a Resource Management System Benefit Function. [Citation Graph (0, 0)][DBLP ] Heterogeneous Computing Workshop, 2000, pp:133-139 [Conf ] Francis B. Afinidad , Timothy E. Levin , Cynthia E. Irvine , Thuy D. Nguyen A Model for Temporal Interval Authorizations. [Citation Graph (0, 0)][DBLP ] HICSS, 2006, pp:- [Conf ] Geoffrey G. Xie , Cynthia E. Irvine , Timothy E. Levin Quantifying Effect of Network Latency and Clock Drift on Time-Driven Key Sequencing. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2002, pp:35-42 [Conf ] Cynthia E. Irvine , Timothy E. Levin , E. Spyropoulou , Bruce Allen Security as a Dimension of Quality of Service in Active Service Environments. [Citation Graph (0, 0)][DBLP ] Active Middleware Services, 2001, pp:87-0 [Conf ] Craig W. Rasmussen , Cynthia E. Irvine , George W. Dinolt , Timothy E. Levin , Karen L. Burke A Program for Education in Certification and Accreditation. [Citation Graph (0, 0)][DBLP ] World Conference on Information Security Education, 2003, pp:131-149 [Conf ] Cynthia E. Irvine , Timothy E. Levin A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach. [Citation Graph (0, 0)][DBLP ] International Information Security Workshops, 2004, pp:173-180 [Conf ] Jong-Kook Kim , Taylor Kidd , Howard Jay Siegel , Cynthia E. Irvine , Timothy E. Levin , Debra A. Hensgen , David St. John , Viktor K. Prasanna , Richard F. Freund , N. Wayne Porter Collective Value of QoS: A Performance Measure Framework for Distributed Heterogeneous Networks. [Citation Graph (0, 0)][DBLP ] IPDPS, 2001, pp:84- [Conf ] Thuy D. Nguyen , Timothy E. Levin , Cynthia E. Irvine High Robustness Requirements in a Common Criteria Protection Profile. [Citation Graph (0, 0)][DBLP ] IWIA, 2006, pp:66-78 [Conf ] Francis B. Afinidad , Timothy E. Levin , Cynthia E. Irvine , Thuy D. Nguyen Foundation for a Time Interval Access Control Model. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2005, pp:406-411 [Conf ] Dawson R. Engler , Cynthia E. Irvine , Trent Jaeger , David Wagner Cool security trends. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:53- [Conf ] Benjamin D. Cone , Michael F. Thompson , Cynthia E. Irvine , Thuy D. Nguyen Cyber Security Training and Awareness Through Game Play. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:431-436 [Conf ] Thuy D. Nguyen , Cynthia E. Irvine Utilizing the Common Criteria for Advanced Student Research Projects. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:317-328 [Conf ] Timothy E. Levin , Cynthia E. Irvine , Thuy D. Nguyen Least Privilege in Separation Kernels. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:355-362 [Conf ] Cynthia E. Irvine Goals for Computer Security Education. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:24-25 [Conf ] Cynthia E. Irvine Security in Innovative New Operating Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1997, pp:202-203 [Conf ] Cynthia E. Irvine , Timothy E. Levin Is Electronic Privacy Achievable? [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:76-77 [Conf ] Haruna R. Isa , William R. Shockley , Cynthia E. Irvine A Multi-Threading Architecture for Multilevel Secure Transaction Processing. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1999, pp:166-180 [Conf ] Timothy E. Levin , S. J. Padilla , Cynthia E. Irvine A Formal Model for UNIX Setuid. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1989, pp:73-83 [Conf ] Ted Huffmire , Brett Brotherton , Gang Wang , Timothy Sherwood , Ryan Kastner , Timothy E. Levin , Thuy D. Nguyen , Cynthia E. Irvine Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:281-295 [Conf ] Cynthia E. Irvine , Timothy E. Levin A cautionary note regarding the data integrity capacity of certain secure systems. [Citation Graph (0, 0)][DBLP ] IICIS, 2001, pp:3-26 [Conf ] Jong-Kook Kim , Debra A. Hensgen , Taylor Kidd , Howard Jay Siegel , David St. John , Cynthia E. Irvine , Timothy E. Levin , N. Wayne Porter , Viktor K. Prasanna , Richard F. Freund A flexible multi-dimensional QoS performance measure framework for distributed heterogeneous systems. [Citation Graph (0, 0)][DBLP ] Cluster Computing, 2006, v:9, n:3, pp:281-296 [Journal ] Dennis M. Volpano , Cynthia E. Irvine Secure flow typing. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:2, pp:137-144 [Journal ] Benjamin D. Cone , Cynthia E. Irvine , Michael F. Thompson , Thuy D. Nguyen A video game for cyber security training and awareness. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2007, v:26, n:1, pp:63-72 [Journal ] Cynthia E. Irvine , Shiu-Kai Chin , Deborah A. Frincke Integrating Security into the Curriculum. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1998, v:31, n:12, pp:25-30 [Journal ] Cynthia E. Irvine Teaching Constructive Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:6, pp:59-61 [Journal ] Cynthia E. Irvine , Michael F. Thompson , Ken Allen CyberCIEGE: Gaming for Information Assurance. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:3, pp:61-64 [Journal ] Dennis M. Volpano , Cynthia E. Irvine , Geoffrey Smith A Sound Type System for Secure Flow Analysis. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:2/3, pp:167-188 [Journal ] Cynthia E. Irvine , Timothy E. Levin , Jeffery D. Wilson , David J. Shifflett , Barbara Pereira An Approach to Security Requirements Engineering for a High Assurance System. [Citation Graph (0, 0)][DBLP ] Requir. Eng., 2002, v:7, n:4, pp:192-206 [Journal ] Catherine Dodge , Cynthia E. Irvine , Thuy D. Nguyen A study of initialization in Linux and OpenBSD. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2005, v:39, n:2, pp:79-93 [Journal ] Cynthia E. Irvine , Karl N. Levitt Trusted Hardware: Can It Be Trustworthy? [Citation Graph (0, 0)][DBLP ] DAC, 2007, pp:1-4 [Conf ] An Ontological Approach to Secure MANET Management. [Citation Graph (, )][DBLP ] Toward a Medium-Robustness Separation Kernel Protection Profile. [Citation Graph (, )][DBLP ] Analysis of three multilevel security architectures. [Citation Graph (, )][DBLP ] A security architecture for transient trust. [Citation Graph (, )][DBLP ] MYSEA: the monterey security architecture. [Citation Graph (, )][DBLP ] A security domain model to assess software for exploitable covert channels. [Citation Graph (, )][DBLP ] Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture. [Citation Graph (, )][DBLP ] Trustworthy System Security through 3-D Integrated Hardware. [Citation Graph (, )][DBLP ] Idea: Trusted Emergency Management. [Citation Graph (, )][DBLP ] Managing Security in FPGA-Based Embedded Systems. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.005secs