Carl E. Landwehr

According to our database1, Carl E. Landwehr
  • authored at least 58 papers between 1976 and 2017.
  • has a "Dijkstra number"2 of three.



In proceedings 
PhD thesis 





Cybersecurity for Future Presidents: An Interdisciplinary Non-majors Course.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Privacy research directions.
Commun. ACM, 2016

How Can We Enable Privacy in an Age of Big Data Analytics?
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

We need a building code for building code.
Commun. ACM, 2015

Moving Target [Guest editors' introduction].
IEEE Security & Privacy, 2014

A building code for building code: putting what we know works to work.
Proceedings of the Annual Computer Security Applications Conference, 2013

Privacy and Cybersecurity: The Next 100 Years.
Proceedings of the IEEE, 2012

Prolog to the Section on Privacy and Cybersecurity.
Proceedings of the IEEE, 2012

Security Analytics and Measurements.
IEEE Security & Privacy, 2012

Sailing Away!
IEEE Security & Privacy, 2010

Drawing the Line.
IEEE Security & Privacy, 2010

History of US Government Investments in Cybersecurity Research: A Personal Perspective.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

A National Goal for Cyberspace: Create an Open, Accountable Internet.
IEEE Security & Privacy, 2009

Cybersecurity and Artificial Intelligence: From Fixing the Plumbing to Smart Water.
IEEE Security & Privacy, 2008

Up Scope.
IEEE Security & Privacy, 2008

Results of Workshops on Privacy Protection Technologies.
Proceedings of the Protecting Persons While Protecting the People, 2008

Cyber security and artificial intelligence: from fixing the plumbing to smart water.
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008

Revolution through Competition?
IEEE Security & Privacy, 2007

Food for Thought: Improving the Market for Assurance.
IEEE Security & Privacy, 2007

New Challenges for the New Year.
IEEE Security & Privacy, 2007

Speaking of Privacy.
IEEE Security & Privacy, 2006

Information Assurance Technology Forecast 2005.
IEEE Security & Privacy, 2006

Green Computing.
IEEE Security & Privacy, 2005

Changing the Puzzle Pieces.
IEEE Security & Privacy, 2005

Overview of Cyber Security: A Crisis of Prioritization.
IEEE Security & Privacy, 2005

Improving Information Flow in the Information Security Market - DoD Experience and Future Directions.
Proceedings of the Economics of Information Security, 2004

Basic Concepts and Taxonomy of Dependable and Secure Computing.
IEEE Trans. Dependable Sec. Comput., 2004

Trusting strangers: Open source software and security.
Proceedings of the Building the Information Society, 2004

From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion.
IEEE Security & Privacy, 2003

NSF Activities in Cyber Trust.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

Challenges and Recent Advances in Developing Trustworthy Software-Based Systems.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

Intrusion Tolerant Systems Workshop.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

Does Open Source Improve System Security?
IEEE Software, 2001

Computer security.
Int. J. Inf. Sec., 2001

Panel: The next generation of acess control models (panel session): do we need them and what should they be?
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

A Security Model for Military Message Systems: Retrospective.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

Towards an Analysis of Onion Routing Security.
Proceedings of the Designing Privacy Enhancing Technologies, 2000

Protecting Unattended Computers Without Software.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

Protection (Security) Models and Policy.
Proceedings of the Computer Science and Engineering Handbook, 1997

A Taxonomy of Computer Program Security Flaws.
ACM Comput. Surv., 1994

Hidden Safety Requirements in Large-Scale Systems.
Proceedings of the Linkage and Developing Countries, Information Processing '94, Volume 3, Proceedings of the IFIP 13th World Computer Congress, Hamburg, Germany, 28 August, 1994

Perspectives on Database Security - Panel Summary.
Proceedings of the Database Security, 1994

A practical approach to high assurance multilevel secure computing service.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

IFIP WG 11.3 Database Security: Research Questions of Current Significance.
Proceedings of the Database Security, 1992

Research Question List.
Proceedings of the Database Security, 1990

Research Question List, Answers, and Revision.
Proceedings of the Database Security, 1989

Discussion Notes and Research Question List.
Proceedings of the Database Security, 1988

On Access Checking in Capability-Based Systems.
IEEE Trans. Software Eng., 1987

Database Security: Where are We?
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987

On Access Checking in Capability-Based Systems.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986

A Security Model for Military Message Systems
ACM Trans. Comput. Syst., 1984

A Formal Statement of the MMS Security Model.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

Hardware Requirements for Secure Computer Systems: A Framework.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

The Best Available Technologies for Computer Security.
IEEE Computer, 1983

Formal Models for Computer Security.
ACM Comput. Surv., 1981

An Abstract Type for Statistics Collection in Simula.
ACM Trans. Program. Lang. Syst., 1980

An Endogenous Priority Model for Load Control in Combined Batch-Interactive Computer Systems.
Acta Inf., 1976

An endogenous priority model for load control in combined batch - interactive computer systems.
Proceedings of the Joint International Conference on Measurements and Modeling of Computer Systems, 1976