| 2009 |
49 | | Carl E. Landwehr:
A National Goal for Cyberspace: Create an Open, Accountable Internet.
IEEE Security & Privacy 7(3): 3-4 (2009) |
| 2008 |
48 | | Carl E. Landwehr:
Cyber security and artificial intelligence: from fixing the plumbing to smart water.
AISec 2008: 51-52 |
47 | | Carl E. Landwehr:
Results of Workshops on Privacy Protection Technologies.
ISIPS 2008: 45-56 |
46 | | Carl E. Landwehr:
Up Scope.
IEEE Security & Privacy 6(3): 3-4 (2008) |
45 | | Carl E. Landwehr:
Cybersecurity and Artificial Intelligence: From Fixing the Plumbing to Smart Water.
IEEE Security & Privacy 6(5): 3-4 (2008) |
| 2007 |
44 | | Carl E. Landwehr:
New Challenges for the New Year.
IEEE Security & Privacy 5(1): 3-4 (2007) |
43 | | Carl E. Landwehr:
Food for Thought: Improving the Market for Assurance.
IEEE Security & Privacy 5(3): 3-4 (2007) |
42 | | Carl E. Landwehr:
Revolution through Competition?
IEEE Security & Privacy 5(6): 3-4 (2007) |
| 2006 |
41 | | Virgil D. Gligor,
Thomas Haigh,
Dick Kemmerer,
Carl E. Landwehr,
Steven B. Lipner,
John D. McLean:
Information Assurance Technology Forecast 2005.
IEEE Security & Privacy 4(1): 62-69 (2006) |
40 | | Carl E. Landwehr:
Speaking of Privacy.
IEEE Security & Privacy 4(4): 4-5 (2006) |
| 2005 |
39 | | Carl E. Landwehr:
Changing the Puzzle Pieces.
IEEE Security & Privacy 3(1): 3-4 (2005) |
38 | | Susan Landau,
Martin R. Stytz,
Carl E. Landwehr,
Fred B. Schneider:
Overview of Cyber Security: A Crisis of Prioritization.
IEEE Security & Privacy 3(3): 9-11 (2005) |
37 | | Carl E. Landwehr:
Green Computing.
IEEE Security & Privacy 3(6): 3 (2005) |
| 2004 |
36 | | Carl E. Landwehr:
Trusting strangers: Open source software and security.
IFIP Congress Topical Sessions 2004: 679-684 |
35 | | Algirdas Avizienis,
Jean-Claude Laprie,
Brian Randell,
Carl E. Landwehr:
Basic Concepts and Taxonomy of Dependable and Secure Computing.
IEEE Trans. Dependable Sec. Comput. 1(1): 11-33 (2004) |
| 2003 |
34 | | Stephen S. Yau,
Carl E. Landwehr,
Jeffrey M. Voas,
Thomas J. Weigert:
Challenges and Recent Advances in Developing Trustworthy Software-Based Systems.
COMPSAC 2003: 208- |
33 | | Carl E. Landwehr:
NSF Activities in Cyber Trust.
NCA 2003: 85- |
32 | | Carl E. Landwehr:
From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion.
IEEE Security & Privacy 1(5): 5 (2003) |
| 2002 |
31 | | Carl E. Landwehr,
Steven M. Bellovin:
Intrusion Tolerant Systems Workshop.
DSN 2002: 785-786 |
| 2001 |
30 | | Carl E. Landwehr,
Constance L. Heitmeyer,
John D. McLean:
A Security Model for Military Message Systems: Retrospective.
ACSAC 2001: 174-190 |
29 | | Ravi S. Sandhu,
Elisa Bertino,
Trent Jaeger,
D. Richard Kuhn,
Carl E. Landwehr:
Panel: The next generation of acess control models (panel session): do we need them and what should they be?
SACMAT 2001: 53 |
28 | | Brian Witten,
Carl E. Landwehr,
Michael A. Caloyannides:
Does Open Source Improve System Security?
IEEE Software 18(5): 57-61 (2001) |
27 | | Carl E. Landwehr:
Computer security.
Int. J. Inf. Sec. 1(1): 3-13 (2001) |
| 2000 |
26 | | Paul F. Syverson,
Gene Tsudik,
Michael G. Reed,
Carl E. Landwehr:
Towards an Analysis of Onion Routing Security.
Workshop on Design Issues in Anonymity and Unobservability 2000: 96-114 |
| 1997 |
25 | | Carl E. Landwehr:
Protecting Unattended Computers Without Software.
ACSAC 1997: 274- |
24 | | Carl E. Landwehr:
Protection (Security) Models and Policy.
The Computer Science and Engineering Handbook 1997: 1914-1928 |
| 1994 |
23 | | Thomas F. Keefe,
Carl E. Landwehr:
Database Security, VII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Lake Guntersville, Alabama, USA, 12-15 September, 1993
North-Holland 1994 |
22 | | Joachim Biskup,
Matthew Morgenstern,
Carl E. Landwehr:
Database Security, VIII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994
North-Holland 1994 |
21 | | Matthew Morgenstern,
Joachim Biskup,
Klaus R. Dittrich,
Carl E. Landwehr,
Marvin Schaefer:
Perspectives on Database Security - Panel Summary.
DBSec 1994: 377-390 |
20 | | Carl E. Landwehr:
Hidden Safety Requirements in Large-Scale Systems.
IFIP Congress (3) 1994: 295-302 |
19 | | Carl E. Landwehr,
Alan R. Bull,
John P. McDermott,
William S. Choi:
A Taxonomy of Computer Program Security Flaws.
ACM Comput. Surv. 26(3): 211-254 (1994) |
| 1993 |
18 | | Bhavani M. Thuraisingham,
Carl E. Landwehr:
Database Security, VI: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August 1992
North-Holland 1993 |
| 1992 |
17 | | Carl E. Landwehr,
Sushil Jajodia:
Database Security, V: Status and Prospects, Results of the IFIP WG 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991
North-Holland 1992 |
16 | | Carl E. Landwehr:
IFIP WG 11.3 Database Security: Research Questions of Current Significance.
DBSec 1992: 397- |
| 1990 |
15 | | Carl E. Landwehr:
Research Question List.
DBSec 1990: 405- |
| 1989 |
14 | | Carl E. Landwehr:
Database Security, II: Status and Prospects, Result of the IFIP WG 11.3 Workshop on Database Security, Kingston, Ontario, Canada, 5-7 October, 1988
North-Holland 1989 |
13 | | Carl E. Landwehr:
Research Question List, Answers, and Revision.
DBSec 1989: 377-394 |
| 1988 |
12 | | Carl E. Landwehr:
Database Security: Status and Prospects, Results of the IFIP WG 11.3 Initial Meeting, Annapolis, Maryland, October 1987
North-Holland 1988 |
11 | | D. J. Thomsen,
J. Thomas Haigh,
Carl E. Landwehr:
Discussion Notes and Research Question List.
DBSec 1988: 263-280 |
| 1987 |
10 | | Carl E. Landwehr:
Database Security: Where are We?
DBSec 1987: 1-9 |
9 | | Richard Y. Kain,
Carl E. Landwehr:
On Access Checking in Capability-Based Systems.
IEEE Trans. Software Eng. 13(2): 202-207 (1987) |
| 1986 |
8 | | Richard Y. Kain,
Carl E. Landwehr:
On Access Checking in Capability-Based Systems.
IEEE Symposium on Security and Privacy 1986: 95-101 |
| 1984 |
7 | | John D. McLean,
Carl E. Landwehr,
Constance L. Heitmeyer:
A Formal Statement of the MMS Security Model.
IEEE Symposium on Security and Privacy 1984: 188-194 |
6 | | Carl E. Landwehr,
John M. Carroll:
Hardware Requirements for Secure Computer Systems: A Framework.
IEEE Symposium on Security and Privacy 1984: 34-40 |
5 | | Carl E. Landwehr,
Constance L. Heitmeyer,
John D. McLean:
A Security Model for Military Message Systems
ACM Trans. Comput. Syst. 2(3): 198-222 (1984) |
| 1981 |
4 | | Carl E. Landwehr:
Formal Models for Computer Security.
ACM Comput. Surv. 13(3): 247-278 (1981) |
| 1980 |
3 | | Carl E. Landwehr:
An Abstract Type for Statistics Collection in Simula.
ACM Trans. Program. Lang. Syst. 2(4): 544-563 (1980) |
| 1976 |
2 | | Carl E. Landwehr:
An endogenous priority model for load control in combined batch - interactive computer systems.
SIGMETRICS 1976: 282-295 |
1 | | Carl E. Landwehr:
An Endogenous Priority Model for Load Control in Combined Batch-Interactive Computer Systems
Acta Inf. 7: 153-166 (1976) |