The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Cynthia E. Irvine: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Blaine Burnham, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Rayford B. Vaughn
    Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:265-0 [Conf]
  2. Cynthia E. Irvine, Timothy E. Levin
    Toward a Taxonomy and Costing Method for Security Services. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:183-188 [Conf]
  3. Raj Mohan, Timothy E. Levin, Cynthia E. Irvine
    An Editor for Adaptive XML-Based Policy Management of IPsec. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:276-285 [Conf]
  4. E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvine
    Calculating Costs for Quality of Security Service. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:334-343 [Conf]
  5. Roger Wright, David J. Shifflett, Cynthia E. Irvine
    Security Architecture for a Virtual Heterogeneous Machine. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:167-177 [Conf]
  6. Cynthia E. Irvine, David J. Shifflett, Paul Clark, Timothy E. Levin, George W. Dinolt
    MYSEA Technology Demonstration. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:10-12 [Conf]
  7. Cynthia E. Irvine, David J. Shifflett, Paul Clark, Timothy E. Levin, George W. Dinolt
    Monterey Security Enhanced Architecture Project. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:176-181 [Conf]
  8. Debra A. Hensgen, Taylor Kidd, David St. John, Matthew C. Schnaidt, Howard Jay Siegel, Tracy D. Braun, Muthucumaru Maheswaran, Shoukat Ali, Jong-Kook Kim, Cynthia E. Irvine, Timothy E. Levin, Richard F. Freund, Matt Kussow, Michael W. Godfrey, Alpay Duman, Paul Carff, Shirley Kidd, Viktor K. Prasanna, Prashanth B. Bhat, Ammar H. Alhusaini
    An Overview of MSHN: The Management System for Heterogeneous Networks. [Citation Graph (0, 0)][DBLP]
    Heterogeneous Computing Workshop, 1999, pp:184-198 [Conf]
  9. Cynthia E. Irvine, Timothy E. Levin
    Toward Quality of Security Service in a Resource Management System Benefit Function. [Citation Graph (0, 0)][DBLP]
    Heterogeneous Computing Workshop, 2000, pp:133-139 [Conf]
  10. Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen
    A Model for Temporal Interval Authorizations. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  11. Geoffrey G. Xie, Cynthia E. Irvine, Timothy E. Levin
    Quantifying Effect of Network Latency and Clock Drift on Time-Driven Key Sequencing. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2002, pp:35-42 [Conf]
  12. Cynthia E. Irvine, Timothy E. Levin, E. Spyropoulou, Bruce Allen
    Security as a Dimension of Quality of Service in Active Service Environments. [Citation Graph (0, 0)][DBLP]
    Active Middleware Services, 2001, pp:87-0 [Conf]
  13. Craig W. Rasmussen, Cynthia E. Irvine, George W. Dinolt, Timothy E. Levin, Karen L. Burke
    A Program for Education in Certification and Accreditation. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:131-149 [Conf]
  14. Cynthia E. Irvine, Timothy E. Levin
    A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:173-180 [Conf]
  15. Jong-Kook Kim, Taylor Kidd, Howard Jay Siegel, Cynthia E. Irvine, Timothy E. Levin, Debra A. Hensgen, David St. John, Viktor K. Prasanna, Richard F. Freund, N. Wayne Porter
    Collective Value of QoS: A Performance Measure Framework for Distributed Heterogeneous Networks. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2001, pp:84- [Conf]
  16. Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine
    High Robustness Requirements in a Common Criteria Protection Profile. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:66-78 [Conf]
  17. Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen
    Foundation for a Time Interval Access Control Model. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:406-411 [Conf]
  18. Dawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David Wagner
    Cool security trends. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:53- [Conf]
  19. Benjamin D. Cone, Michael F. Thompson, Cynthia E. Irvine, Thuy D. Nguyen
    Cyber Security Training and Awareness Through Game Play. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:431-436 [Conf]
  20. Thuy D. Nguyen, Cynthia E. Irvine
    Utilizing the Common Criteria for Advanced Student Research Projects. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:317-328 [Conf]
  21. Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen
    Least Privilege in Separation Kernels. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:355-362 [Conf]
  22. Cynthia E. Irvine
    Goals for Computer Security Education. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:24-25 [Conf]
  23. Cynthia E. Irvine
    Security in Innovative New Operating Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:202-203 [Conf]
  24. Cynthia E. Irvine, Timothy E. Levin
    Is Electronic Privacy Achievable? [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:76-77 [Conf]
  25. Haruna R. Isa, William R. Shockley, Cynthia E. Irvine
    A Multi-Threading Architecture for Multilevel Secure Transaction Processing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:166-180 [Conf]
  26. Timothy E. Levin, S. J. Padilla, Cynthia E. Irvine
    A Formal Model for UNIX Setuid. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:73-83 [Conf]
  27. Ted Huffmire, Brett Brotherton, Gang Wang, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine
    Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:281-295 [Conf]
  28. Cynthia E. Irvine, Timothy E. Levin
    A cautionary note regarding the data integrity capacity of certain secure systems. [Citation Graph (0, 0)][DBLP]
    IICIS, 2001, pp:3-26 [Conf]
  29. Jong-Kook Kim, Debra A. Hensgen, Taylor Kidd, Howard Jay Siegel, David St. John, Cynthia E. Irvine, Timothy E. Levin, N. Wayne Porter, Viktor K. Prasanna, Richard F. Freund
    A flexible multi-dimensional QoS performance measure framework for distributed heterogeneous systems. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 2006, v:9, n:3, pp:281-296 [Journal]
  30. Dennis M. Volpano, Cynthia E. Irvine
    Secure flow typing. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:2, pp:137-144 [Journal]
  31. Benjamin D. Cone, Cynthia E. Irvine, Michael F. Thompson, Thuy D. Nguyen
    A video game for cyber security training and awareness. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2007, v:26, n:1, pp:63-72 [Journal]
  32. Cynthia E. Irvine, Shiu-Kai Chin, Deborah A. Frincke
    Integrating Security into the Curriculum. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:12, pp:25-30 [Journal]
  33. Cynthia E. Irvine
    Teaching Constructive Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:59-61 [Journal]
  34. Cynthia E. Irvine, Michael F. Thompson, Ken Allen
    CyberCIEGE: Gaming for Information Assurance. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:61-64 [Journal]
  35. Dennis M. Volpano, Cynthia E. Irvine, Geoffrey Smith
    A Sound Type System for Secure Flow Analysis. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:2/3, pp:167-188 [Journal]
  36. Cynthia E. Irvine, Timothy E. Levin, Jeffery D. Wilson, David J. Shifflett, Barbara Pereira
    An Approach to Security Requirements Engineering for a High Assurance System. [Citation Graph (0, 0)][DBLP]
    Requir. Eng., 2002, v:7, n:4, pp:192-206 [Journal]
  37. Catherine Dodge, Cynthia E. Irvine, Thuy D. Nguyen
    A study of initialization in Linux and OpenBSD. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:2, pp:79-93 [Journal]
  38. Cynthia E. Irvine, Karl N. Levitt
    Trusted Hardware: Can It Be Trustworthy? [Citation Graph (0, 0)][DBLP]
    DAC, 2007, pp:1-4 [Conf]

  39. An Ontological Approach to Secure MANET Management. [Citation Graph (, )][DBLP]


  40. Toward a Medium-Robustness Separation Kernel Protection Profile. [Citation Graph (, )][DBLP]


  41. Analysis of three multilevel security architectures. [Citation Graph (, )][DBLP]


  42. A security architecture for transient trust. [Citation Graph (, )][DBLP]


  43. MYSEA: the monterey security architecture. [Citation Graph (, )][DBLP]


  44. A security domain model to assess software for exploitable covert channels. [Citation Graph (, )][DBLP]


  45. Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture. [Citation Graph (, )][DBLP]


  46. Trustworthy System Security through 3-D Integrated Hardware. [Citation Graph (, )][DBLP]


  47. Idea: Trusted Emergency Management. [Citation Graph (, )][DBLP]


  48. Managing Security in FPGA-Based Embedded Systems. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002