Carl E. Landwehr

Orcid: 0000-0002-5824-1697

According to our database1, Carl E. Landwehr authored at least 69 papers between 1975 and 2023.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2013, "For contributions to cybersecurity".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.
IEEE Secur. Priv., 2023

2021
Perspectives on the SolarWinds Incident.
IEEE Secur. Priv., 2021

2020
Grand Challenges for Embedded Security Research in a Connected World.
CoRR, 2020

Autonomous vehicle safety: lessons from aviation.
Commun. ACM, 2020

2019
2018: a big year for privacy.
Commun. ACM, 2019

2017
Software Systems Engineering programmes a capability approach.
J. Syst. Softw., 2017

Cybersecurity for Future Presidents: An Interdisciplinary Non-majors Course.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

2016
Privacy research directions.
Commun. ACM, 2016

How Can We Enable Privacy in an Age of Big Data Analytics?
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

2015
We need a building code for building code.
Commun. ACM, 2015

2014
Moving Target [Guest editors' introduction].
IEEE Secur. Priv., 2014

2013
A building code for building code: putting what we know works to work.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Privacy and Cybersecurity: The Next 100 Years.
Proc. IEEE, 2012

Prolog to the Section on Privacy and Cybersecurity.
Proc. IEEE, 2012

Security Analytics and Measurements.
IEEE Secur. Priv., 2012

2010
Sailing Away!
IEEE Secur. Priv., 2010

Drawing the Line.
IEEE Secur. Priv., 2010

History of US Government Investments in Cybersecurity Research: A Personal Perspective.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

2009
A National Goal for Cyberspace: Create an Open, Accountable Internet.
IEEE Secur. Priv., 2009

2008
Cybersecurity and Artificial Intelligence: From Fixing the Plumbing to Smart Water.
IEEE Secur. Priv., 2008

Up Scope.
IEEE Secur. Priv., 2008

Results of Workshops on Privacy Protection Technologies.
Proceedings of the Protecting Persons While Protecting the People, 2008

Cyber security and artificial intelligence: from fixing the plumbing to smart water.
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008

2007
Revolution through Competition?
IEEE Secur. Priv., 2007

Food for Thought: Improving the Market for Assurance.
IEEE Secur. Priv., 2007

New Challenges for the New Year.
IEEE Secur. Priv., 2007

2006
Speaking of Privacy.
IEEE Secur. Priv., 2006

Information Assurance Technology Forecast 2005.
IEEE Secur. Priv., 2006

2005
Green Computing.
IEEE Secur. Priv., 2005

Changing the Puzzle Pieces.
IEEE Secur. Priv., 2005

Overview of Cyber Security: A Crisis of Prioritization.
IEEE Secur. Priv., 2005

2004
Improving Information Flow in the Information Security Market - DoD Experience and Future Directions.
Proceedings of the Economics of Information Security, 2004

Basic Concepts and Taxonomy of Dependable and Secure Computing.
IEEE Trans. Dependable Secur. Comput., 2004

Trusting strangers: Open source software and security.
Proceedings of the Building the Information Society, 2004

2003
From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion.
IEEE Secur. Priv., 2003

NSF Activities in Cyber Trust.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

Challenges and Recent Advances in Developing Trustworthy Software-Based Systems.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
Intrusion Tolerant Systems Workshop.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Does Open Source Improve System Security?
IEEE Softw., 2001

Computer security.
Int. J. Inf. Sec., 2001

Panel: The next generation of acess control models (panel session): do we need them and what should they be?
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

A Security Model for Military Message Systems: Retrospective.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Towards an Analysis of Onion Routing Security.
Proceedings of the Designing Privacy Enhancing Technologies, 2000

1997
Security issues in networks with Internet access.
Proc. IEEE, 1997

Protecting Unattended Computers Without Software.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

Protection (Security) Models and Policy.
Proceedings of the Computer Science and Engineering Handbook, 1997

1994
A Taxonomy of Computer Program Security Flaws.
ACM Comput. Surv., 1994

Hidden Safety Requirements in Large-Scale Systems.
Proceedings of the Linkage and Developing Countries, Information Processing '94, Volume 3, Proceedings of the IFIP 13th World Computer Congress, Hamburg, Germany, 28 August, 1994

Perspectives on Database Security - Panel Summary.
Proceedings of the Database Security, 1994

A practical approach to high assurance multilevel secure computing service.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
How Far Can You Trust A Computer?
Proceedings of the 12th International Conference on Computer Safety, 1993

1992
IFIP WG 11.3 Database Security: Research Questions of Current Significance.
Proceedings of the Database Security, 1992

1990
Research Question List.
Proceedings of the Database Security, 1990

1989
Research Question List, Answers, and Revision.
Proceedings of the Database Security, 1989

1988
Discussion Notes and Research Question List.
Proceedings of the Database Security, 1988

1987
On Access Checking in Capability-Based Systems.
IEEE Trans. Software Eng., 1987

Database Security: Where are We?
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987

1986
NRL invitational workshop on testing and proving: two approaches to assurance.
ACM SIGSOFT Softw. Eng. Notes, 1986

1985
Some lessons from formalizing a security model.
ACM SIGSOFT Softw. Eng. Notes, 1985

Does program verification help?: how much?
ACM SIGSOFT Softw. Eng. Notes, 1985

1984
A Security Model for Military Message Systems
ACM Trans. Comput. Syst., 1984

A Formal Statement of the MMS Security Model.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

Hardware Requirements for Secure Computer Systems: A Framework.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

1983
The Best Available Technologies for Computer Security.
Computer, 1983

1982
The use of quick prototypes in the secure military message systems project.
Proceedings of the workshop on Rapid Prototyping, 1982

1981
Formal Models for Computer Security.
ACM Comput. Surv., 1981

1980
An Abstract Type for Statistics Collection in Simula.
ACM Trans. Program. Lang. Syst., 1980

1976
An Endogenous Priority Model for Load Control in Combined Batch-Interactive Computer Systems.
Acta Informatica, 1976

1975
Usage statistics for MTS.
SIGMETRICS Perform. Evaluation Rev., 1975


  Loading...