Search the dblp DataBase
Timothy E. Levin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Cynthia E. Irvine , Timothy E. Levin Toward a Taxonomy and Costing Method for Security Services. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:183-188 [Conf ] Raj Mohan , Timothy E. Levin , Cynthia E. Irvine An Editor for Adaptive XML-Based Policy Management of IPsec. [Citation Graph (0, 0)][DBLP ] ACSAC, 2003, pp:276-285 [Conf ] E. Spyropoulou , Timothy E. Levin , Cynthia E. Irvine Calculating Costs for Quality of Security Service. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:334-343 [Conf ] Cynthia E. Irvine , David J. Shifflett , Paul Clark , Timothy E. Levin , George W. Dinolt MYSEA Technology Demonstration. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:10-12 [Conf ] Cynthia E. Irvine , David J. Shifflett , Paul Clark , Timothy E. Levin , George W. Dinolt Monterey Security Enhanced Architecture Project. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:176-181 [Conf ] Debra A. Hensgen , Taylor Kidd , David St. John , Matthew C. Schnaidt , Howard Jay Siegel , Tracy D. Braun , Muthucumaru Maheswaran , Shoukat Ali , Jong-Kook Kim , Cynthia E. Irvine , Timothy E. Levin , Richard F. Freund , Matt Kussow , Michael W. Godfrey , Alpay Duman , Paul Carff , Shirley Kidd , Viktor K. Prasanna , Prashanth B. Bhat , Ammar H. Alhusaini An Overview of MSHN: The Management System for Heterogeneous Networks. [Citation Graph (0, 0)][DBLP ] Heterogeneous Computing Workshop, 1999, pp:184-198 [Conf ] Cynthia E. Irvine , Timothy E. Levin Toward Quality of Security Service in a Resource Management System Benefit Function. [Citation Graph (0, 0)][DBLP ] Heterogeneous Computing Workshop, 2000, pp:133-139 [Conf ] Francis B. Afinidad , Timothy E. Levin , Cynthia E. Irvine , Thuy D. Nguyen A Model for Temporal Interval Authorizations. [Citation Graph (0, 0)][DBLP ] HICSS, 2006, pp:- [Conf ] Geoffrey G. Xie , Cynthia E. Irvine , Timothy E. Levin Quantifying Effect of Network Latency and Clock Drift on Time-Driven Key Sequencing. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2002, pp:35-42 [Conf ] Cynthia E. Irvine , Timothy E. Levin , E. Spyropoulou , Bruce Allen Security as a Dimension of Quality of Service in Active Service Environments. [Citation Graph (0, 0)][DBLP ] Active Middleware Services, 2001, pp:87-0 [Conf ] Craig W. Rasmussen , Cynthia E. Irvine , George W. Dinolt , Timothy E. Levin , Karen L. Burke A Program for Education in Certification and Accreditation. [Citation Graph (0, 0)][DBLP ] World Conference on Information Security Education, 2003, pp:131-149 [Conf ] Cynthia E. Irvine , Timothy E. Levin A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach. [Citation Graph (0, 0)][DBLP ] International Information Security Workshops, 2004, pp:173-180 [Conf ] Jong-Kook Kim , Taylor Kidd , Howard Jay Siegel , Cynthia E. Irvine , Timothy E. Levin , Debra A. Hensgen , David St. John , Viktor K. Prasanna , Richard F. Freund , N. Wayne Porter Collective Value of QoS: A Performance Measure Framework for Distributed Heterogeneous Networks. [Citation Graph (0, 0)][DBLP ] IPDPS, 2001, pp:84- [Conf ] Thuy D. Nguyen , Timothy E. Levin , Cynthia E. Irvine High Robustness Requirements in a Common Criteria Protection Profile. [Citation Graph (0, 0)][DBLP ] IWIA, 2006, pp:66-78 [Conf ] Francis B. Afinidad , Timothy E. Levin , Cynthia E. Irvine , Thuy D. Nguyen Foundation for a Time Interval Access Control Model. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2005, pp:406-411 [Conf ] Timothy E. Levin , Cynthia E. Irvine , Thuy D. Nguyen Least Privilege in Separation Kernels. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:355-362 [Conf ] Cynthia E. Irvine , Timothy E. Levin Is Electronic Privacy Achievable? [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:76-77 [Conf ] Timothy E. Levin , S. J. Padilla , Cynthia E. Irvine A Formal Model for UNIX Setuid. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1989, pp:73-83 [Conf ] Ted Huffmire , Brett Brotherton , Gang Wang , Timothy Sherwood , Ryan Kastner , Timothy E. Levin , Thuy D. Nguyen , Cynthia E. Irvine Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:281-295 [Conf ] Cynthia E. Irvine , Timothy E. Levin A cautionary note regarding the data integrity capacity of certain secure systems. [Citation Graph (0, 0)][DBLP ] IICIS, 2001, pp:3-26 [Conf ] Jong-Kook Kim , Debra A. Hensgen , Taylor Kidd , Howard Jay Siegel , David St. John , Cynthia E. Irvine , Timothy E. Levin , N. Wayne Porter , Viktor K. Prasanna , Richard F. Freund A flexible multi-dimensional QoS performance measure framework for distributed heterogeneous systems. [Citation Graph (0, 0)][DBLP ] Cluster Computing, 2006, v:9, n:3, pp:281-296 [Journal ] Cynthia E. Irvine , Timothy E. Levin , Jeffery D. Wilson , David J. Shifflett , Barbara Pereira An Approach to Security Requirements Engineering for a High Assurance System. [Citation Graph (0, 0)][DBLP ] Requir. Eng., 2002, v:7, n:4, pp:192-206 [Journal ] An Ontological Approach to Secure MANET Management. [Citation Graph (, )][DBLP ] Toward a Medium-Robustness Separation Kernel Protection Profile. [Citation Graph (, )][DBLP ] Analysis of three multilevel security architectures. [Citation Graph (, )][DBLP ] A security architecture for transient trust. [Citation Graph (, )][DBLP ] MYSEA: the monterey security architecture. [Citation Graph (, )][DBLP ] A security domain model to assess software for exploitable covert channels. [Citation Graph (, )][DBLP ] Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture. [Citation Graph (, )][DBLP ] Trustworthy System Security through 3-D Integrated Hardware. [Citation Graph (, )][DBLP ] Idea: Trusted Emergency Management. [Citation Graph (, )][DBLP ] Enforcing memory policy specifications in reconfigurable hardware. [Citation Graph (, )][DBLP ] Managing Security in FPGA-Based Embedded Systems. [Citation Graph (, )][DBLP ] Search in 0.020secs, Finished in 0.021secs