Carl E. Landwehr

According to our database1, Carl E. Landwehr
  • authored at least 58 papers between 1976 and 2017.
  • has a "Dijkstra number"2 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
Cybersecurity for Future Presidents: An Interdisciplinary Non-majors Course.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

2016
Privacy research directions.
Commun. ACM, 2016

How Can We Enable Privacy in an Age of Big Data Analytics?
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

2015
We need a building code for building code.
Commun. ACM, 2015

2014
Moving Target [Guest editors' introduction].
IEEE Security & Privacy, 2014

2013
A building code for building code: putting what we know works to work.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Privacy and Cybersecurity: The Next 100 Years.
Proceedings of the IEEE, 2012

Prolog to the Section on Privacy and Cybersecurity.
Proceedings of the IEEE, 2012

Security Analytics and Measurements.
IEEE Security & Privacy, 2012

2010
Sailing Away!
IEEE Security & Privacy, 2010

Drawing the Line.
IEEE Security & Privacy, 2010

History of US Government Investments in Cybersecurity Research: A Personal Perspective.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

2009
A National Goal for Cyberspace: Create an Open, Accountable Internet.
IEEE Security & Privacy, 2009

2008
Cybersecurity and Artificial Intelligence: From Fixing the Plumbing to Smart Water.
IEEE Security & Privacy, 2008

Up Scope.
IEEE Security & Privacy, 2008

Results of Workshops on Privacy Protection Technologies.
Proceedings of the Protecting Persons While Protecting the People, 2008

Cyber security and artificial intelligence: from fixing the plumbing to smart water.
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008

2007
Revolution through Competition?
IEEE Security & Privacy, 2007

Food for Thought: Improving the Market for Assurance.
IEEE Security & Privacy, 2007

New Challenges for the New Year.
IEEE Security & Privacy, 2007

2006
Speaking of Privacy.
IEEE Security & Privacy, 2006

Information Assurance Technology Forecast 2005.
IEEE Security & Privacy, 2006

2005
Green Computing.
IEEE Security & Privacy, 2005

Changing the Puzzle Pieces.
IEEE Security & Privacy, 2005

Overview of Cyber Security: A Crisis of Prioritization.
IEEE Security & Privacy, 2005

2004
Improving Information Flow in the Information Security Market - DoD Experience and Future Directions.
Proceedings of the Economics of Information Security, 2004

Basic Concepts and Taxonomy of Dependable and Secure Computing.
IEEE Trans. Dependable Sec. Comput., 2004

Trusting strangers: Open source software and security.
Proceedings of the Building the Information Society, 2004

2003
From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion.
IEEE Security & Privacy, 2003

NSF Activities in Cyber Trust.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

Challenges and Recent Advances in Developing Trustworthy Software-Based Systems.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
Intrusion Tolerant Systems Workshop.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Does Open Source Improve System Security?
IEEE Software, 2001

Computer security.
Int. J. Inf. Sec., 2001

Panel: The next generation of acess control models (panel session): do we need them and what should they be?
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

A Security Model for Military Message Systems: Retrospective.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Towards an Analysis of Onion Routing Security.
Proceedings of the Designing Privacy Enhancing Technologies, 2000

1997
Protecting Unattended Computers Without Software.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

Protection (Security) Models and Policy.
Proceedings of the Computer Science and Engineering Handbook, 1997

1994
A Taxonomy of Computer Program Security Flaws.
ACM Comput. Surv., 1994

Hidden Safety Requirements in Large-Scale Systems.
Proceedings of the Linkage and Developing Countries, Information Processing '94, Volume 3, Proceedings of the IFIP 13th World Computer Congress, Hamburg, Germany, 28 August, 1994

Perspectives on Database Security - Panel Summary.
Proceedings of the Database Security, 1994

A practical approach to high assurance multilevel secure computing service.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1992
IFIP WG 11.3 Database Security: Research Questions of Current Significance.
Proceedings of the Database Security, 1992

1990
Research Question List.
Proceedings of the Database Security, 1990

1989
Research Question List, Answers, and Revision.
Proceedings of the Database Security, 1989

1988
Discussion Notes and Research Question List.
Proceedings of the Database Security, 1988

1987
On Access Checking in Capability-Based Systems.
IEEE Trans. Software Eng., 1987

Database Security: Where are We?
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987

1986
On Access Checking in Capability-Based Systems.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986

1984
A Security Model for Military Message Systems
ACM Trans. Comput. Syst., 1984

A Formal Statement of the MMS Security Model.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

Hardware Requirements for Secure Computer Systems: A Framework.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

1983
The Best Available Technologies for Computer Security.
IEEE Computer, 1983

1981
Formal Models for Computer Security.
ACM Comput. Surv., 1981

1980
An Abstract Type for Statistics Collection in Simula.
ACM Trans. Program. Lang. Syst., 1980

1976
An Endogenous Priority Model for Load Control in Combined Batch-Interactive Computer Systems.
Acta Inf., 1976

An endogenous priority model for load control in combined batch - interactive computer systems.
Proceedings of the Joint International Conference on Measurements and Modeling of Computer Systems, 1976


  Loading...