dblp.uni-trier.dewww.uni-trier.de

Thuy D. Nguyen

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
15EETimothy E. Levin, Cynthia E. Irvine, Terry Benzel, Thuy D. Nguyen, Paul C. Clark, Ganesha Bhaskara: Idea: Trusted Emergency Management. ESSoS 2009: 32-36
14EETimothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhaskara, Thuy D. Nguyen, Paul C. Clark, Ruby B. Lee, Cynthia E. Irvine, Terry Benzel: Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture. TRUST 2009: 133-152
2008
13EECynthia E. Irvine, Timothy E. Levin, Paul C. Clark, Thuy D. Nguyen: A security architecture for transient trust. CSAW 2008: 1-8
12EETed Huffmire, Jonathan Valamehr, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine: Trustworthy System Security through 3-D Integrated Hardware. HOST 2008: 91-92
2007
11EERance J. DeLong, Thuy D. Nguyen, Cynthia E. Irvine, Timothy E. Levin: Toward a Medium-Robustness Separation Kernel Protection Profile. ACSAC 2007: 40-51
10EETimothy E. Levin, Cynthia E. Irvine, Clark Weissman, Thuy D. Nguyen: Analysis of three multilevel security architectures. CSAW 2007: 37-46
9EETed Huffmire, Brett Brotherton, Gang Wang, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine: Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems. IEEE Symposium on Security and Privacy 2007: 281-295
8EEBenjamin D. Cone, Cynthia E. Irvine, Michael F. Thompson, Thuy D. Nguyen: A video game for cyber security training and awareness. Computers & Security 26(1): 63-72 (2007)
2006
7EEFrancis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen: A Model for Temporal Interval Authorizations. HICSS 2006
6EEThuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine: High Robustness Requirements in a Common Criteria Protection Profile. IWIA 2006: 66-78
5EEThuy D. Nguyen, Cynthia E. Irvine: Utilizing the Common Criteria for Advanced Student Research Projects. SEC 2006: 317-328
4EEBenjamin D. Cone, Michael F. Thompson, Cynthia E. Irvine, Thuy D. Nguyen: Cyber Security Training and Awareness Through Game Play. SEC 2006: 431-436
3 Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen: Least Privilege in Separation Kernels. SECRYPT 2006: 355-362
2005
2EEFrancis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen: Foundation for a Time Interval Access Control Model. MMM-ACNS 2005: 406-411
1EECatherine Dodge, Cynthia E. Irvine, Thuy D. Nguyen: A study of initialization in Linux and OpenBSD. Operating Systems Review 39(2): 79-93 (2005)

Coauthor Index

1Francis B. Afinidad [2] [7]
2Terry Benzel [14] [15]
3Ganesha Bhaskara [14] [15]
4Brett Brotherton [9]
5Paul C. Clark [13] [14] [15]
6Benjamin D. Cone [4] [8]
7Rance J. DeLong [11]
8Catherine Dodge [1]
9Jeffrey S. Dwoskin [14]
10Ted Huffmire [9] [12]
11Cynthia E. Irvine [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15]
12Ryan Kastner [9] [12]
13Ruby B. Lee [14]
14Timothy E. Levin [2] [3] [6] [7] [9] [10] [11] [12] [13] [14] [15]
15Timothy Sherwood [9] [12]
16Michael F. Thompson [4] [8]
17Jonathan Valamehr [12]
18Gang Wang [9]
19Clark Weissman [10]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)