Steven B. Lipner

Orcid: 0000-0002-6476-462X

Affiliations:
  • Carnegie Mellon University, Pittsburgh, PA, USA


According to our database1, Steven B. Lipner authored at least 24 papers between 1969 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Updates, Threats, and Risk Management.
Commun. ACM, May, 2023

Inside the Windows Security Push: A Twenty-Year Retrospective.
IEEE Secur. Priv., 2023

2015
Security assurance.
Commun. ACM, 2015

The Birth and Death of the Orange Book.
IEEE Ann. Hist. Comput., 2015

2014
An Effective Approach for Assessing the Risk of Acquired IT Products.
Proceedings of the ISSE 2014, 2014

2013
Crossing the Great Divide: Transferring Security Technology from Research to the Market.
IEEE Secur. Priv., 2013

2012
Lessons from VAX/SVS for High-Assurance VM Systems.
IEEE Secur. Priv., 2012

Prescriptive vs. Descriptive Security - Observations on a growing paradigm shift in development security practices.
Datenschutz und Datensicherheit, 2012

2010
Security development lifecycle - Security considerations for client and cloud Applications.
Datenschutz und Datensicherheit, 2010

2007
Assurance and evaluation: what next?
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Information Assurance Technology Forecast 2005.
IEEE Secur. Priv., 2006

2005
Building More Secure Commercial Software: The Trustworthy Computing Security Development Lifecycle.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005

2004
The Trustworthy Computing Security Development Lifecycle.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Inside the Windows Security Push.
IEEE Secur. Priv., 2003

The Journey Toward Secure Systems: Achieving Assurance.
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), 2003

2000
Security and Source Code Access: Issues and Realities.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

1999
Twenty Years of Evaluation Criteria and Commercial Technology.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

1997
Firewalls: An Expert Roundtable.
IEEE Softw., 1997

1996
Commercial Key Recovery.
Commun. ACM, 1996

1990
Guest Editors' Introduction Security and Privacy.
IEEE Trans. Software Eng., 1990

1982
Non-Discretionery Controls for Commercial Applications.
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982

1975
A Comment on the Confinement Problem.
Proceedings of the Fifth Symposium on Operating System Principles, 1975

1974
Security kernels.
Proceedings of the American Federation of Information Processing Societies: 1974 National Computer Conference, 1974

1969
Requirements for the development of computer-based urban information systems.
Proceedings of the American Federation of Information Processing Societies: AFIPS Conference Proceedings: 1969 Spring Joint Computer Conference, 1969


  Loading...