2007 |
12 | EE | Steven B. Lipner:
Assurance and evaluation: what next?
ACM Conference on Computer and Communications Security 2007: 1 |
2006 |
11 | EE | Virgil D. Gligor,
Thomas Haigh,
Dick Kemmerer,
Carl E. Landwehr,
Steven B. Lipner,
John D. McLean:
Information Assurance Technology Forecast 2005.
IEEE Security & Privacy 4(1): 62-69 (2006) |
2005 |
10 | | Steven B. Lipner:
Building More Secure Commercial Software: The Trustworthy Computing Security Development Lifecycle.
GI Jahrestagung (1) 2005: 21-28 |
2004 |
9 | EE | Steven B. Lipner:
The Trustworthy Computing Security Development Lifecycle.
ACSAC 2004: 2-13 |
2003 |
8 | EE | Steven B. Lipner:
The Journey Toward Secure Systems: Achieving Assurance.
RE 2003: 5 |
2000 |
7 | EE | Steven B. Lipner:
Security and Source Code Access: Issues and Realities.
IEEE Symposium on Security and Privacy 2000: 124-125 |
1999 |
6 | EE | Steven B. Lipner:
Twenty Years of Evaluation Criteria and Commercial Technology.
IEEE Symposium on Security and Privacy 1999: 111-112 |
1997 |
5 | | James P. Anderson,
Sheila Brand,
Li Gong,
Thomas Haigh,
Steven B. Lipner,
Teresa F. Lunt,
Ruth Nelson,
William Neugent,
Hilarie K. Orman,
Marcus J. Ranum,
Roger R. Schell,
Eugene H. Spafford:
Firewalls: An Expert Roundtable.
IEEE Software 14(5): 60-66 (1997) |
1996 |
4 | | Stephen T. Walker,
Steven B. Lipner,
Carl M. Ellison,
David M. Balenson:
Commercial Key Recovery.
Commun. ACM 39(3): 41-47 (1996) |
1990 |
3 | EE | Thomas A. Berson,
Steven B. Lipner:
Guest Editors' Introduction Security and Privacy.
IEEE Trans. Software Eng. 16(6): 561-562 (1990) |
1982 |
2 | | Steven B. Lipner:
Non-Discretionary Controls for Commercial Applications.
IEEE Symposium on Security and Privacy 1982: 2-10 |
1975 |
1 | | Steven B. Lipner:
A Comment on the Confinement Problem.
SOSP 1975: 192-196 |