The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Carl E. Landwehr: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Carl E. Landwehr
    Formal Models for Computer Security. [Citation Graph (13, 0)][DBLP]
    ACM Comput. Surv., 1981, v:13, n:3, pp:247-278 [Journal]
  2. Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean
    A Security Model for Military Message Systems [Citation Graph (4, 0)][DBLP]
    ACM Trans. Comput. Syst., 1984, v:2, n:3, pp:198-222 [Journal]
  3. Carl E. Landwehr
    Protecting Unattended Computers Without Software. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:274-0 [Conf]
  4. Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean
    A Security Model for Military Message Systems: Retrospective. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:174-190 [Conf]
  5. Stephen S. Yau, Carl E. Landwehr, Jeffrey M. Voas, Thomas J. Weigert
    Challenges and Recent Advances in Developing Trustworthy Software-Based Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:208-0 [Conf]
  6. Carl E. Landwehr
    Database Security: Where are We? [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:1-9 [Conf]
  7. Carl E. Landwehr
    Research Question List, Answers, and Revision. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:377-394 [Conf]
  8. Carl E. Landwehr
    Research Question List. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:405-0 [Conf]
  9. Carl E. Landwehr
    IFIP WG 11.3 Database Security: Research Questions of Current Significance. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:397-0 [Conf]
  10. Matthew Morgenstern, Joachim Biskup, Klaus R. Dittrich, Carl E. Landwehr, Marvin Schaefer
    Perspectives on Database Security - Panel Summary. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:377-390 [Conf]
  11. D. J. Thomsen, J. Thomas Haigh, Carl E. Landwehr
    Discussion Notes and Research Question List. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:263-280 [Conf]
  12. Paul F. Syverson, Gene Tsudik, Michael G. Reed, Carl E. Landwehr
    Towards an Analysis of Onion Routing Security. [Citation Graph (0, 0)][DBLP]
    Workshop on Design Issues in Anonymity and Unobservability, 2000, pp:96-114 [Conf]
  13. Carl E. Landwehr, Steven M. Bellovin
    Intrusion Tolerant Systems Workshop. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:785-786 [Conf]
  14. Carl E. Landwehr
    Trusting strangers: Open source software and security. [Citation Graph (0, 0)][DBLP]
    IFIP Congress Topical Sessions, 2004, pp:679-684 [Conf]
  15. Carl E. Landwehr
    Hidden Safety Requirements in Large-Scale Systems. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (3), 1994, pp:295-302 [Conf]
  16. Carl E. Landwehr
    NSF Activities in Cyber Trust. [Citation Graph (0, 0)][DBLP]
    NCA, 2003, pp:85-0 [Conf]
  17. Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr
    Panel: The next generation of acess control models (panel session): do we need them and what should they be? [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:53- [Conf]
  18. Carl E. Landwehr
    An endogenous priority model for load control in combined batch - interactive computer systems. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1976, pp:282-295 [Conf]
  19. Richard Y. Kain, Carl E. Landwehr
    On Access Checking in Capability-Based Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:95-101 [Conf]
  20. John D. McLean, Carl E. Landwehr, Constance L. Heitmeyer
    A Formal Statement of the MMS Security Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:188-194 [Conf]
  21. Carl E. Landwehr, John M. Carroll
    Hardware Requirements for Secure Computer Systems: A Framework. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:34-40 [Conf]
  22. Carl E. Landwehr
    An Endogenous Priority Model for Load Control in Combined Batch-Interactive Computer Systems [Citation Graph (0, 0)][DBLP]
    Acta Inf., 1976, v:7, n:, pp:153-166 [Journal]
  23. Carl E. Landwehr, Alan R. Bull, John P. McDermott, William S. Choi
    A Taxonomy of Computer Program Security Flaws. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1994, v:26, n:3, pp:211-254 [Journal]
  24. Virgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean
    Information Assurance Technology Forecast 2005. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:62-69 [Journal]
  25. Susan Landau, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider
    Overview of Cyber Security: A Crisis of Prioritization. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:9-11 [Journal]
  26. Carl E. Landwehr
    From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:5- [Journal]
  27. Carl E. Landwehr
    Changing the Puzzle Pieces. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:3-4 [Journal]
  28. Carl E. Landwehr
    Green Computing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:3- [Journal]
  29. Carl E. Landwehr
    Computer security. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2001, v:1, n:1, pp:3-13 [Journal]
  30. Brian Witten, Carl E. Landwehr, Michael Caloyannides
    Does Open Source Improve System Security? [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2001, v:18, n:5, pp:57-61 [Journal]
  31. Algirdas Avizienis, Jean-Claude Laprie, Brian Randell, Carl E. Landwehr
    Basic Concepts and Taxonomy of Dependable and Secure Computing. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:1, pp:11-33 [Journal]
  32. Carl E. Landwehr
    An Abstract Type for Statistics Collection in Simula. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1980, v:2, n:4, pp:544-563 [Journal]
  33. Richard Y. Kain, Carl E. Landwehr
    On Access Checking in Capability-Based Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:202-207 [Journal]

  34. Cyber security and artificial intelligence: from fixing the plumbing to smart water. [Citation Graph (, )][DBLP]


  35. History of US Government Investments in Cybersecurity Research: A Personal Perspective. [Citation Graph (, )][DBLP]


  36. Results of Workshops on Privacy Protection Technologies. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002