dblp.uni-trier.dewww.uni-trier.de

Carl E. Landwehr

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
41EECarl E. Landwehr: Cyber security and artificial intelligence: from fixing the plumbing to smart water. AISec 2008: 51-52
2006
40EEVirgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean: Information Assurance Technology Forecast 2005. IEEE Security & Privacy 4(1): 62-69 (2006)
2005
39EECarl E. Landwehr: Changing the Puzzle Pieces. IEEE Security & Privacy 3(1): 3-4 (2005)
38EESusan Landau, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider: Overview of Cyber Security: A Crisis of Prioritization. IEEE Security & Privacy 3(3): 9-11 (2005)
37EECarl E. Landwehr: Green Computing. IEEE Security & Privacy 3(6): 3 (2005)
2004
36 Carl E. Landwehr: Trusting strangers: Open source software and security. IFIP Congress Topical Sessions 2004: 679-684
35EEAlgirdas Avizienis, Jean-Claude Laprie, Brian Randell, Carl E. Landwehr: Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Trans. Dependable Sec. Comput. 1(1): 11-33 (2004)
2003
34EEStephen S. Yau, Carl E. Landwehr, Jeffrey M. Voas, Thomas J. Weigert: Challenges and Recent Advances in Developing Trustworthy Software-Based Systems. COMPSAC 2003: 208-
33EECarl E. Landwehr: NSF Activities in Cyber Trust. NCA 2003: 85-
32EECarl E. Landwehr: From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion. IEEE Security & Privacy 1(5): 5 (2003)
2002
31EECarl E. Landwehr, Steven M. Bellovin: Intrusion Tolerant Systems Workshop. DSN 2002: 785-786
2001
30EECarl E. Landwehr, Constance L. Heitmeyer, John D. McLean: A Security Model for Military Message Systems: Retrospective. ACSAC 2001: 174-190
29EERavi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr: Panel: The next generation of acess control models (panel session): do we need them and what should they be? SACMAT 2001: 53
28EEBrian Witten, Carl E. Landwehr, Michael Caloyannides: Does Open Source Improve System Security? IEEE Software 18(5): 57-61 (2001)
27EECarl E. Landwehr: Computer security. Int. J. Inf. Sec. 1(1): 3-13 (2001)
2000
26EEPaul F. Syverson, Gene Tsudik, Michael G. Reed, Carl E. Landwehr: Towards an Analysis of Onion Routing Security. Workshop on Design Issues in Anonymity and Unobservability 2000: 96-114
1997
25EECarl E. Landwehr: Protecting Unattended Computers Without Software. ACSAC 1997: 274-
24 Carl E. Landwehr: Protection (Security) Models and Policy. The Computer Science and Engineering Handbook 1997: 1914-1928
1994
23 Thomas F. Keefe, Carl E. Landwehr: Database Security, VII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Lake Guntersville, Alabama, USA, 12-15 September, 1993 North-Holland 1994
22 Joachim Biskup, Matthew Morgenstern, Carl E. Landwehr: Database Security, VIII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994 North-Holland 1994
21 Matthew Morgenstern, Joachim Biskup, Klaus R. Dittrich, Carl E. Landwehr, Marvin Schaefer: Perspectives on Database Security - Panel Summary. DBSec 1994: 377-390
20 Carl E. Landwehr: Hidden Safety Requirements in Large-Scale Systems. IFIP Congress (3) 1994: 295-302
19 Carl E. Landwehr, Alan R. Bull, John P. McDermott, William S. Choi: A Taxonomy of Computer Program Security Flaws. ACM Comput. Surv. 26(3): 211-254 (1994)
1993
18 Bhavani M. Thuraisingham, Carl E. Landwehr: Database Security, VI: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August 1992 North-Holland 1993
1992
17 Carl E. Landwehr, Sushil Jajodia: Database Security, V: Status and Prospects, Results of the IFIP WG 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991 North-Holland 1992
16 Carl E. Landwehr: IFIP WG 11.3 Database Security: Research Questions of Current Significance. DBSec 1992: 397-
1990
15 Carl E. Landwehr: Research Question List. DBSec 1990: 405-
1989
14 Carl E. Landwehr: Database Security, II: Status and Prospects, Result of the IFIP WG 11.3 Workshop on Database Security, Kingston, Ontario, Canada, 5-7 October, 1988 North-Holland 1989
13 Carl E. Landwehr: Research Question List, Answers, and Revision. DBSec 1989: 377-394
1988
12 Carl E. Landwehr: Database Security: Status and Prospects, Results of the IFIP WG 11.3 Initial Meeting, Annapolis, Maryland, October 1987 North-Holland 1988
11 D. J. Thomsen, J. Thomas Haigh, Carl E. Landwehr: Discussion Notes and Research Question List. DBSec 1988: 263-280
1987
10 Carl E. Landwehr: Database Security: Where are We? DBSec 1987: 1-9
9 Richard Y. Kain, Carl E. Landwehr: On Access Checking in Capability-Based Systems. IEEE Trans. Software Eng. 13(2): 202-207 (1987)
1986
8 Richard Y. Kain, Carl E. Landwehr: On Access Checking in Capability-Based Systems. IEEE Symposium on Security and Privacy 1986: 95-101
1984
7 John D. McLean, Carl E. Landwehr, Constance L. Heitmeyer: A Formal Statement of the MMS Security Model. IEEE Symposium on Security and Privacy 1984: 188-194
6 Carl E. Landwehr, John M. Carroll: Hardware Requirements for Secure Computer Systems: A Framework. IEEE Symposium on Security and Privacy 1984: 34-40
5EECarl E. Landwehr, Constance L. Heitmeyer, John D. McLean: A Security Model for Military Message Systems ACM Trans. Comput. Syst. 2(3): 198-222 (1984)
1981
4 Carl E. Landwehr: Formal Models for Computer Security. ACM Comput. Surv. 13(3): 247-278 (1981)
1980
3EECarl E. Landwehr: An Abstract Type for Statistics Collection in Simula. ACM Trans. Program. Lang. Syst. 2(4): 544-563 (1980)
1976
2EECarl E. Landwehr: An endogenous priority model for load control in combined batch - interactive computer systems. SIGMETRICS 1976: 282-295
1 Carl E. Landwehr: An Endogenous Priority Model for Load Control in Combined Batch-Interactive Computer Systems Acta Inf. 7: 153-166 (1976)

Coauthor Index

1Algirdas Avizienis [35]
2Steven M. Bellovin [31]
3Elisa Bertino [29]
4Joachim Biskup [21] [22]
5Alan R. Bull [19]
6Michael Caloyannides [28]
7John M. Carroll [6]
8William S. Choi [19]
9Klaus R. Dittrich [21]
10Virgil D. Gligor [40]
11J. Thomas Haigh [11]
12Thomas Haigh [40]
13Constance L. Heitmeyer (Connie Heitmeyer) [5] [7] [30]
14Trent Jaeger [29]
15Sushil Jajodia [17]
16Richard Y. Kain [8] [9]
17Thomas F. Keefe [23]
18Dick Kemmerer [40]
19D. Richard Kuhn [29]
20Susan Landau [38]
21Jean-Claude Laprie [35]
22Steven B. Lipner [40]
23John P. McDermott [19]
24John D. McLean [5] [7] [30] [40]
25Matthew Morgenstern [21] [22]
26Brian Randell [35]
27Michael G. Reed [26]
28Ravi S. Sandhu [29]
29Marvin Schaefer [21]
30Fred B. Schneider [38]
31Martin R. Stytz [38]
32Paul F. Syverson [26]
33D. J. Thomsen [11]
34Bhavani M. Thuraisingham [18]
35Gene Tsudik [26]
36Jeffrey M. Voas [34]
37Thomas J. Weigert [34]
38Brian Witten [28]
39Stephen S. Yau [34]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)