The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Timothy E. Levin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Cynthia E. Irvine, Timothy E. Levin
    Toward a Taxonomy and Costing Method for Security Services. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:183-188 [Conf]
  2. Raj Mohan, Timothy E. Levin, Cynthia E. Irvine
    An Editor for Adaptive XML-Based Policy Management of IPsec. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:276-285 [Conf]
  3. E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvine
    Calculating Costs for Quality of Security Service. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:334-343 [Conf]
  4. Cynthia E. Irvine, David J. Shifflett, Paul Clark, Timothy E. Levin, George W. Dinolt
    MYSEA Technology Demonstration. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:10-12 [Conf]
  5. Cynthia E. Irvine, David J. Shifflett, Paul Clark, Timothy E. Levin, George W. Dinolt
    Monterey Security Enhanced Architecture Project. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:176-181 [Conf]
  6. Debra A. Hensgen, Taylor Kidd, David St. John, Matthew C. Schnaidt, Howard Jay Siegel, Tracy D. Braun, Muthucumaru Maheswaran, Shoukat Ali, Jong-Kook Kim, Cynthia E. Irvine, Timothy E. Levin, Richard F. Freund, Matt Kussow, Michael W. Godfrey, Alpay Duman, Paul Carff, Shirley Kidd, Viktor K. Prasanna, Prashanth B. Bhat, Ammar H. Alhusaini
    An Overview of MSHN: The Management System for Heterogeneous Networks. [Citation Graph (0, 0)][DBLP]
    Heterogeneous Computing Workshop, 1999, pp:184-198 [Conf]
  7. Cynthia E. Irvine, Timothy E. Levin
    Toward Quality of Security Service in a Resource Management System Benefit Function. [Citation Graph (0, 0)][DBLP]
    Heterogeneous Computing Workshop, 2000, pp:133-139 [Conf]
  8. Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen
    A Model for Temporal Interval Authorizations. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  9. Geoffrey G. Xie, Cynthia E. Irvine, Timothy E. Levin
    Quantifying Effect of Network Latency and Clock Drift on Time-Driven Key Sequencing. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2002, pp:35-42 [Conf]
  10. Cynthia E. Irvine, Timothy E. Levin, E. Spyropoulou, Bruce Allen
    Security as a Dimension of Quality of Service in Active Service Environments. [Citation Graph (0, 0)][DBLP]
    Active Middleware Services, 2001, pp:87-0 [Conf]
  11. Craig W. Rasmussen, Cynthia E. Irvine, George W. Dinolt, Timothy E. Levin, Karen L. Burke
    A Program for Education in Certification and Accreditation. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:131-149 [Conf]
  12. Cynthia E. Irvine, Timothy E. Levin
    A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:173-180 [Conf]
  13. Jong-Kook Kim, Taylor Kidd, Howard Jay Siegel, Cynthia E. Irvine, Timothy E. Levin, Debra A. Hensgen, David St. John, Viktor K. Prasanna, Richard F. Freund, N. Wayne Porter
    Collective Value of QoS: A Performance Measure Framework for Distributed Heterogeneous Networks. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2001, pp:84- [Conf]
  14. Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine
    High Robustness Requirements in a Common Criteria Protection Profile. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:66-78 [Conf]
  15. Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen
    Foundation for a Time Interval Access Control Model. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:406-411 [Conf]
  16. Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen
    Least Privilege in Separation Kernels. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:355-362 [Conf]
  17. Cynthia E. Irvine, Timothy E. Levin
    Is Electronic Privacy Achievable? [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:76-77 [Conf]
  18. Timothy E. Levin, S. J. Padilla, Cynthia E. Irvine
    A Formal Model for UNIX Setuid. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:73-83 [Conf]
  19. Ted Huffmire, Brett Brotherton, Gang Wang, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine
    Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:281-295 [Conf]
  20. Cynthia E. Irvine, Timothy E. Levin
    A cautionary note regarding the data integrity capacity of certain secure systems. [Citation Graph (0, 0)][DBLP]
    IICIS, 2001, pp:3-26 [Conf]
  21. Jong-Kook Kim, Debra A. Hensgen, Taylor Kidd, Howard Jay Siegel, David St. John, Cynthia E. Irvine, Timothy E. Levin, N. Wayne Porter, Viktor K. Prasanna, Richard F. Freund
    A flexible multi-dimensional QoS performance measure framework for distributed heterogeneous systems. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 2006, v:9, n:3, pp:281-296 [Journal]
  22. Cynthia E. Irvine, Timothy E. Levin, Jeffery D. Wilson, David J. Shifflett, Barbara Pereira
    An Approach to Security Requirements Engineering for a High Assurance System. [Citation Graph (0, 0)][DBLP]
    Requir. Eng., 2002, v:7, n:4, pp:192-206 [Journal]

  23. An Ontological Approach to Secure MANET Management. [Citation Graph (, )][DBLP]


  24. Toward a Medium-Robustness Separation Kernel Protection Profile. [Citation Graph (, )][DBLP]


  25. Analysis of three multilevel security architectures. [Citation Graph (, )][DBLP]


  26. A security architecture for transient trust. [Citation Graph (, )][DBLP]


  27. MYSEA: the monterey security architecture. [Citation Graph (, )][DBLP]


  28. A security domain model to assess software for exploitable covert channels. [Citation Graph (, )][DBLP]


  29. Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture. [Citation Graph (, )][DBLP]


  30. Trustworthy System Security through 3-D Integrated Hardware. [Citation Graph (, )][DBLP]


  31. Idea: Trusted Emergency Management. [Citation Graph (, )][DBLP]


  32. Enforcing memory policy specifications in reconfigurable hardware. [Citation Graph (, )][DBLP]


  33. Managing Security in FPGA-Based Embedded Systems. [Citation Graph (, )][DBLP]


Search in 0.020secs, Finished in 0.021secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002