Search the dblp DataBase
Carl E. Landwehr :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Carl E. Landwehr Formal Models for Computer Security. [Citation Graph (13, 0)][DBLP ] ACM Comput. Surv., 1981, v:13, n:3, pp:247-278 [Journal ] Carl E. Landwehr , Constance L. Heitmeyer , John D. McLean A Security Model for Military Message Systems [Citation Graph (4, 0)][DBLP ] ACM Trans. Comput. Syst., 1984, v:2, n:3, pp:198-222 [Journal ] Carl E. Landwehr Protecting Unattended Computers Without Software. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:274-0 [Conf ] Carl E. Landwehr , Constance L. Heitmeyer , John D. McLean A Security Model for Military Message Systems: Retrospective. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:174-190 [Conf ] Stephen S. Yau , Carl E. Landwehr , Jeffrey M. Voas , Thomas J. Weigert Challenges and Recent Advances in Developing Trustworthy Software-Based Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2003, pp:208-0 [Conf ] Carl E. Landwehr Database Security: Where are We? [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:1-9 [Conf ] Carl E. Landwehr Research Question List, Answers, and Revision. [Citation Graph (0, 0)][DBLP ] DBSec, 1989, pp:377-394 [Conf ] Carl E. Landwehr Research Question List. [Citation Graph (0, 0)][DBLP ] DBSec, 1990, pp:405-0 [Conf ] Carl E. Landwehr IFIP WG 11.3 Database Security: Research Questions of Current Significance. [Citation Graph (0, 0)][DBLP ] DBSec, 1992, pp:397-0 [Conf ] Matthew Morgenstern , Joachim Biskup , Klaus R. Dittrich , Carl E. Landwehr , Marvin Schaefer Perspectives on Database Security - Panel Summary. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:377-390 [Conf ] D. J. Thomsen , J. Thomas Haigh , Carl E. Landwehr Discussion Notes and Research Question List. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:263-280 [Conf ] Paul F. Syverson , Gene Tsudik , Michael G. Reed , Carl E. Landwehr Towards an Analysis of Onion Routing Security. [Citation Graph (0, 0)][DBLP ] Workshop on Design Issues in Anonymity and Unobservability, 2000, pp:96-114 [Conf ] Carl E. Landwehr , Steven M. Bellovin Intrusion Tolerant Systems Workshop. [Citation Graph (0, 0)][DBLP ] DSN, 2002, pp:785-786 [Conf ] Carl E. Landwehr Trusting strangers: Open source software and security. [Citation Graph (0, 0)][DBLP ] IFIP Congress Topical Sessions, 2004, pp:679-684 [Conf ] Carl E. Landwehr Hidden Safety Requirements in Large-Scale Systems. [Citation Graph (0, 0)][DBLP ] IFIP Congress (3), 1994, pp:295-302 [Conf ] Carl E. Landwehr NSF Activities in Cyber Trust. [Citation Graph (0, 0)][DBLP ] NCA, 2003, pp:85-0 [Conf ] Ravi S. Sandhu , Elisa Bertino , Trent Jaeger , D. Richard Kuhn , Carl E. Landwehr Panel: The next generation of acess control models (panel session): do we need them and what should they be? [Citation Graph (0, 0)][DBLP ] SACMAT, 2001, pp:53- [Conf ] Carl E. Landwehr An endogenous priority model for load control in combined batch - interactive computer systems. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1976, pp:282-295 [Conf ] Richard Y. Kain , Carl E. Landwehr On Access Checking in Capability-Based Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:95-101 [Conf ] John D. McLean , Carl E. Landwehr , Constance L. Heitmeyer A Formal Statement of the MMS Security Model. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1984, pp:188-194 [Conf ] Carl E. Landwehr , John M. Carroll Hardware Requirements for Secure Computer Systems: A Framework. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1984, pp:34-40 [Conf ] Carl E. Landwehr An Endogenous Priority Model for Load Control in Combined Batch-Interactive Computer Systems [Citation Graph (0, 0)][DBLP ] Acta Inf., 1976, v:7, n:, pp:153-166 [Journal ] Carl E. Landwehr , Alan R. Bull , John P. McDermott , William S. Choi A Taxonomy of Computer Program Security Flaws. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1994, v:26, n:3, pp:211-254 [Journal ] Virgil D. Gligor , Thomas Haigh , Dick Kemmerer , Carl E. Landwehr , Steven B. Lipner , John D. McLean Information Assurance Technology Forecast 2005. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2006, v:4, n:1, pp:62-69 [Journal ] Susan Landau , Martin R. Stytz , Carl E. Landwehr , Fred B. Schneider Overview of Cyber Security: A Crisis of Prioritization. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:3, pp:9-11 [Journal ] Carl E. Landwehr From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:5, pp:5- [Journal ] Carl E. Landwehr Changing the Puzzle Pieces. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:3-4 [Journal ] Carl E. Landwehr Green Computing. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:6, pp:3- [Journal ] Carl E. Landwehr Computer security. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2001, v:1, n:1, pp:3-13 [Journal ] Brian Witten , Carl E. Landwehr , Michael Caloyannides Does Open Source Improve System Security? [Citation Graph (0, 0)][DBLP ] IEEE Software, 2001, v:18, n:5, pp:57-61 [Journal ] Algirdas Avizienis , Jean-Claude Laprie , Brian Randell , Carl E. Landwehr Basic Concepts and Taxonomy of Dependable and Secure Computing. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:1, pp:11-33 [Journal ] Carl E. Landwehr An Abstract Type for Statistics Collection in Simula. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1980, v:2, n:4, pp:544-563 [Journal ] Richard Y. Kain , Carl E. Landwehr On Access Checking in Capability-Based Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:202-207 [Journal ] Cyber security and artificial intelligence: from fixing the plumbing to smart water. [Citation Graph (, )][DBLP ] History of US Government Investments in Cybersecurity Research: A Personal Perspective. [Citation Graph (, )][DBLP ] Results of Workshops on Privacy Protection Technologies. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.008secs