2009 |
31 | EE | Timothy E. Levin,
Cynthia E. Irvine,
Terry Benzel,
Thuy D. Nguyen,
Paul C. Clark,
Ganesha Bhaskara:
Idea: Trusted Emergency Management.
ESSoS 2009: 32-36 |
30 | EE | Timothy E. Levin,
Jeffrey S. Dwoskin,
Ganesha Bhaskara,
Thuy D. Nguyen,
Paul C. Clark,
Ruby B. Lee,
Cynthia E. Irvine,
Terry Benzel:
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture.
TRUST 2009: 133-152 |
2008 |
29 | EE | Mark E. Orwat,
Timothy E. Levin,
Cynthia E. Irvine:
An Ontological Approach to Secure MANET Management.
ARES 2008: 787-794 |
28 | EE | Cynthia E. Irvine,
Timothy E. Levin,
Paul C. Clark,
Thuy D. Nguyen:
A security architecture for transient trust.
CSAW 2008: 1-8 |
27 | EE | Ted Huffmire,
Jonathan Valamehr,
Timothy Sherwood,
Ryan Kastner,
Timothy E. Levin,
Thuy D. Nguyen,
Cynthia E. Irvine:
Trustworthy System Security through 3-D Integrated Hardware.
HOST 2008: 91-92 |
26 | EE | Alan B. Shaffer,
Mikhail Auguston,
Cynthia E. Irvine,
Timothy E. Levin:
A security domain model to assess software for exploitable covert channels.
PLAS 2008: 45-56 |
25 | EE | Ted Huffmire,
Timothy Sherwood,
Ryan Kastner,
Timothy E. Levin:
Enforcing memory policy specifications in reconfigurable hardware.
Computers & Security 27(5-6): 197-215 (2008) |
2007 |
24 | EE | Rance J. DeLong,
Thuy D. Nguyen,
Cynthia E. Irvine,
Timothy E. Levin:
Toward a Medium-Robustness Separation Kernel Protection Profile.
ACSAC 2007: 40-51 |
23 | EE | Timothy E. Levin,
Cynthia E. Irvine,
Clark Weissman,
Thuy D. Nguyen:
Analysis of three multilevel security architectures.
CSAW 2007: 37-46 |
22 | EE | Ted Huffmire,
Brett Brotherton,
Gang Wang,
Timothy Sherwood,
Ryan Kastner,
Timothy E. Levin,
Thuy D. Nguyen,
Cynthia E. Irvine:
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems.
IEEE Symposium on Security and Privacy 2007: 281-295 |
2006 |
21 | EE | Francis B. Afinidad,
Timothy E. Levin,
Cynthia E. Irvine,
Thuy D. Nguyen:
A Model for Temporal Interval Authorizations.
HICSS 2006 |
20 | EE | Thuy D. Nguyen,
Timothy E. Levin,
Cynthia E. Irvine:
High Robustness Requirements in a Common Criteria Protection Profile.
IWIA 2006: 66-78 |
19 | | Timothy E. Levin,
Cynthia E. Irvine,
Thuy D. Nguyen:
Least Privilege in Separation Kernels.
SECRYPT 2006: 355-362 |
18 | EE | Jong-Kook Kim,
Debra A. Hensgen,
Taylor Kidd,
Howard Jay Siegel,
David St. John,
Cynthia E. Irvine,
Timothy E. Levin,
N. Wayne Porter,
Viktor K. Prasanna,
Richard F. Freund:
A flexible multi-dimensional QoS performance measure framework for distributed heterogeneous systems.
Cluster Computing 9(3): 281-296 (2006) |
2005 |
17 | EE | Francis B. Afinidad,
Timothy E. Levin,
Cynthia E. Irvine,
Thuy D. Nguyen:
Foundation for a Time Interval Access Control Model.
MMM-ACNS 2005: 406-411 |
2004 |
16 | | Cynthia E. Irvine,
Timothy E. Levin:
A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach.
International Information Security Workshops 2004: 173-180 |
2003 |
15 | EE | Raj Mohan,
Timothy E. Levin,
Cynthia E. Irvine:
An Editor for Adaptive XML-Based Policy Management of IPsec.
ACSAC 2003: 276-285 |
14 | EE | Cynthia E. Irvine,
David J. Shifflett,
Paul C. Clark,
Timothy E. Levin,
George W. Dinolt:
MYSEA Technology Demonstration.
DISCEX (2) 2003: 10-12 |
13 | EE | Cynthia E. Irvine,
David J. Shifflett,
Paul C. Clark,
Timothy E. Levin,
George W. Dinolt:
Monterey Security Enhanced Architecture Project.
DISCEX (2) 2003: 176-181 |
12 | | Craig W. Rasmussen,
Cynthia E. Irvine,
George W. Dinolt,
Timothy E. Levin,
Karen L. Burke:
A Program for Education in Certification and Accreditation.
World Conference on Information Security Education 2003: 131-149 |
2002 |
11 | EE | Geoffrey G. Xie,
Cynthia E. Irvine,
Timothy E. Levin:
Quantifying Effect of Network Latency and Clock Drift on Time-Driven Key Sequencing.
ICDCS Workshops 2002: 35-42 |
10 | EE | Cynthia E. Irvine,
Timothy E. Levin,
Jeffery D. Wilson,
David J. Shifflett,
Barbara Pereira:
An Approach to Security Requirements Engineering for a High Assurance System.
Requir. Eng. 7(4): 192-206 (2002) |
2001 |
9 | EE | Cynthia E. Irvine,
Timothy E. Levin,
E. Spyropoulou,
Bruce Allen:
Security as a Dimension of Quality of Service in Active Service Environments.
Active Middleware Services 2001: 87- |
8 | | Cynthia E. Irvine,
Timothy E. Levin:
A cautionary note regarding the data integrity capacity of certain secure systems.
IICIS 2001: 3-26 |
7 | | Jong-Kook Kim,
Taylor Kidd,
Howard Jay Siegel,
Cynthia E. Irvine,
Timothy E. Levin,
Debra A. Hensgen,
David St. John,
Viktor K. Prasanna,
Richard F. Freund,
N. Wayne Porter:
Collective Value of QoS: A Performance Measure Framework for Distributed Heterogeneous Networks.
IPDPS 2001: 84 |
2000 |
6 | EE | E. Spyropoulou,
Timothy E. Levin,
Cynthia E. Irvine:
Calculating Costs for Quality of Security Service.
ACSAC 2000: 334-343 |
5 | EE | Cynthia E. Irvine,
Timothy E. Levin:
Toward Quality of Security Service in a Resource Management System Benefit Function.
Heterogeneous Computing Workshop 2000: 133-139 |
4 | EE | Cynthia E. Irvine,
Timothy E. Levin:
Is Electronic Privacy Achievable?
IEEE Symposium on Security and Privacy 2000: 76-77 |
1999 |
3 | EE | Cynthia E. Irvine,
Timothy E. Levin:
Toward a Taxonomy and Costing Method for Security Services.
ACSAC 1999: 183-188 |
2 | EE | Debra A. Hensgen,
Taylor Kidd,
David St. John,
Matthew C. Schnaidt,
Howard Jay Siegel,
Tracy D. Braun,
Muthucumaru Maheswaran,
Shoukat Ali,
Jong-Kook Kim,
Cynthia E. Irvine,
Timothy E. Levin,
Richard F. Freund,
Matt Kussow,
Michael W. Godfrey,
Alpay Duman,
Paul Carff,
Shirley Kidd,
Viktor K. Prasanna,
Prashanth B. Bhat,
Ammar H. Alhusaini:
An Overview of MSHN: The Management System for Heterogeneous Networks.
Heterogeneous Computing Workshop 1999: 184-198 |
1989 |
1 | | Timothy E. Levin,
S. J. Padilla,
Cynthia E. Irvine:
A Formal Model for UNIX Setuid.
IEEE Symposium on Security and Privacy 1989: 73-83 |