default search action
Carl E. Landwehr
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j40]Carl E. Landwehr, Michael K. Reiter, Laurie A. Williams, Gene Tsudik, Trent Jaeger, Tadayoshi Kohno, Apu Kapadia:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. IEEE Secur. Priv. 21(2): 32-42 (2023) - 2021
- [j39]Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael:
Perspectives on the SolarWinds Incident. IEEE Secur. Priv. 19(2): 7-13 (2021) - 2020
- [j38]Jaynarayan H. Lala, Carl E. Landwehr, John F. Meyer:
Autonomous vehicle safety: lessons from aviation. Commun. ACM 63(9): 28-31 (2020) - [i1]Wayne P. Burleson, Kevin Fu, Denise L. Anthony, Jorge Guajardo, Carl A. Gunter, Kyle Ingols, Jean-Baptiste Jeannin, Farinaz Koushanfar, Carl E. Landwehr, Susan Squires:
Grand Challenges for Embedded Security Research in a Connected World. CoRR abs/2005.06585 (2020)
2010 – 2019
- 2019
- [j37]Carl E. Landwehr:
2018: a big year for privacy. Commun. ACM 62(2): 20-22 (2019) - [e9]Joshua D. Guttman, Carl E. Landwehr, José Meseguer, Dusko Pavlovic:
Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows. Lecture Notes in Computer Science 11565, Springer 2019, ISBN 978-3-030-19051-4 [contents] - 2017
- [j36]Carl E. Landwehr, Jochen Ludewig, Robert Meersman, David Lorge Parnas, Peretz Shoval, Yair Wand, David M. Weiss, Elaine J. Weyuker:
Software Systems Engineering programmes a capability approach. J. Syst. Softw. 125: 354-364 (2017) - [c28]Aparna Das, David Voorhees, Cynthia Choi, Carl E. Landwehr:
Cybersecurity for Future Presidents: An Interdisciplinary Non-majors Course. SIGCSE 2017: 141-146 - 2016
- [j35]Carl E. Landwehr:
Privacy research directions. Commun. ACM 59(2): 29-31 (2016) - [c27]Carl E. Landwehr:
How Can We Enable Privacy in an Age of Big Data Analytics? IWSPA@CODASPY 2016: 47 - 2015
- [j34]Carl E. Landwehr:
We need a building code for building code. Commun. ACM 58(2): 24-26 (2015) - 2014
- [j33]Luanne Goldrich, Carl E. Landwehr:
Moving Target [Guest editors' introduction]. IEEE Secur. Priv. 12(2): 14-15 (2014) - 2013
- [c26]Carl E. Landwehr:
A building code for building code: putting what we know works to work. ACSAC 2013: 139-147 - 2012
- [j32]George Cybenko, Carl E. Landwehr:
Security Analytics and Measurements. IEEE Secur. Priv. 10(3): 5-8 (2012) - [j31]Carl E. Landwehr:
Prolog to the Section on Privacy and Cybersecurity. Proc. IEEE 100(Centennial-Issue): 1657-1658 (2012) - [j30]Carl E. Landwehr, Dan Boneh, John C. Mitchell, Steven M. Bellovin, Susan Landau, Michael E. Lesk:
Privacy and Cybersecurity: The Next 100 Years. Proc. IEEE 100(Centennial-Issue): 1659-1673 (2012) - 2010
- [j29]Carl E. Landwehr:
Drawing the Line. IEEE Secur. Priv. 8(1): 3-4 (2010) - [j28]Carl E. Landwehr:
Sailing Away! IEEE Secur. Priv. 8(6): 3-4 (2010) - [c25]Carl E. Landwehr:
History of US Government Investments in Cybersecurity Research: A Personal Perspective. IEEE Symposium on Security and Privacy 2010: 14-20
2000 – 2009
- 2009
- [j27]Carl E. Landwehr:
A National Goal for Cyberspace: Create an Open, Accountable Internet. IEEE Secur. Priv. 7(3): 3-4 (2009) - 2008
- [j26]Carl E. Landwehr:
Up Scope. IEEE Secur. Priv. 6(3): 3-4 (2008) - [j25]Carl E. Landwehr:
Cybersecurity and Artificial Intelligence: From Fixing the Plumbing to Smart Water. IEEE Secur. Priv. 6(5): 3-4 (2008) - [c24]Carl E. Landwehr:
Cyber security and artificial intelligence: from fixing the plumbing to smart water. AISec 2008: 51-52 - [c23]Carl E. Landwehr:
Results of Workshops on Privacy Protection Technologies. ISIPS 2008: 45-56 - 2007
- [j24]Carl E. Landwehr:
New Challenges for the New Year. IEEE Secur. Priv. 5(1): 3-4 (2007) - [j23]Carl E. Landwehr:
Food for Thought: Improving the Market for Assurance. IEEE Secur. Priv. 5(3): 3-4 (2007) - [j22]Carl E. Landwehr:
Revolution through Competition? IEEE Secur. Priv. 5(6): 3-4 (2007) - 2006
- [j21]Virgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean:
Information Assurance Technology Forecast 2005. IEEE Secur. Priv. 4(1): 62-69 (2006) - [j20]Carl E. Landwehr:
Speaking of Privacy. IEEE Secur. Priv. 4(4): 4-5 (2006) - 2005
- [j19]Carl E. Landwehr:
Changing the Puzzle Pieces. IEEE Secur. Priv. 3(1): 3-4 (2005) - [j18]Susan Landau, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider:
Overview of Cyber Security: A Crisis of Prioritization. IEEE Secur. Priv. 3(3): 9-11 (2005) - [j17]Carl E. Landwehr:
Green Computing. IEEE Secur. Priv. 3(6): 3 (2005) - 2004
- [j16]Algirdas Avizienis, Jean-Claude Laprie, Brian Randell, Carl E. Landwehr:
Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Trans. Dependable Secur. Comput. 1(1): 11-33 (2004) - [c22]Carl E. Landwehr:
Trusting strangers: Open source software and security. IFIP Congress Topical Sessions 2004: 679-683 - [p1]Carl E. Landwehr:
Improving Information Flow in the Information Security Market - DoD Experience and Future Directions. Economics of Information Security 2004: 155-163 - 2003
- [j15]Carl E. Landwehr:
From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion. IEEE Secur. Priv. 1(5): 5 (2003) - [c21]Stephen S. Yau, Carl E. Landwehr, Jeffrey M. Voas, Thomas J. Weigert:
Challenges and Recent Advances in Developing Trustworthy Software-Based Systems. COMPSAC 2003: 208- - [c20]Carl E. Landwehr:
NSF Activities in Cyber Trust. NCA 2003: 85-88 - 2002
- [c19]Carl E. Landwehr, Steven M. Bellovin:
Intrusion Tolerant Systems Workshop. DSN 2002: 785-786 - 2001
- [j14]Carl E. Landwehr:
Computer security. Int. J. Inf. Sec. 1(1): 3-13 (2001) - [j13]Brian Witten, Carl E. Landwehr, Michael A. Caloyannides:
Does Open Source Improve System Security? IEEE Softw. 18(5): 57-61 (2001) - [c18]Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean:
A Security Model for Military Message Systems: Retrospective. ACSAC 2001: 174-190 - [c17]Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr:
Panel: The next generation of acess control models (panel session): do we need them and what should they be? SACMAT 2001: 53 - 2000
- [c16]Paul F. Syverson, Gene Tsudik, Michael G. Reed, Carl E. Landwehr:
Towards an Analysis of Onion Routing Security. Workshop on Design Issues in Anonymity and Unobservability 2000: 96-114
1990 – 1999
- 1997
- [j12]Carl E. Landwehr, David M. Goldschlag:
Security issues in networks with Internet access. Proc. IEEE 85(12): 2034-2051 (1997) - [c15]Carl E. Landwehr:
Protecting Unattended Computers Without Software. ACSAC 1997: 274- - [r1]Carl E. Landwehr:
Protection (Security) Models and Policy. The Computer Science and Engineering Handbook 1997: 1914-1928 - 1994
- [j11]Carl E. Landwehr, Alan R. Bull, John P. McDermott, William S. Choi:
A Taxonomy of Computer Program Security Flaws. ACM Comput. Surv. 26(3): 211-254 (1994) - [c14]Judith N. Froscher, Myong H. Kang, John P. McDermott, Oliver Costich, Carl E. Landwehr:
A practical approach to high assurance multilevel secure computing service. ACSAC 1994: 2-11 - [c13]Matthew Morgenstern, Joachim Biskup, Klaus R. Dittrich, Carl E. Landwehr, Marvin Schaefer:
Perspectives on Database Security - Panel Summary. DBSec 1994: 377-390 - [c12]Carl E. Landwehr:
Hidden Safety Requirements in Large-Scale Systems. IFIP Congress (3) 1994: 295-302 - [e8]Thomas F. Keefe, Carl E. Landwehr:
Database Security, VII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Lake Guntersville, Alabama, USA, 12-15 September, 1993. IFIP Transactions A-47, North-Holland 1994, ISBN 0-444-81833-2 [contents] - [e7]Joachim Biskup, Matthew Morgenstern, Carl E. Landwehr:
Database Security, VIII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994. IFIP Transactions A-60, North-Holland 1994, ISBN 0-444-81976-2 [contents] - 1993
- [c11]Carl E. Landwehr:
How Far Can You Trust A Computer? SAFECOMP 1993: 313-325 - [e6]Bhavani Thuraisingham, Carl E. Landwehr:
Database Security, VI: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August 1992. IFIP Transactions A-21, North-Holland 1993, ISBN 0-444-89889-1 [contents] - 1992
- [c10]Carl E. Landwehr:
IFIP WG 11.3 Database Security: Research Questions of Current Significance. DBSec 1992: 397- - [e5]Carl E. Landwehr, Sushil Jajodia:
Database Security, V: Status and Prospects, Results of the IFIP WG 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991. IFIP Transactions A-6, North-Holland 1992, ISBN 0-444-89518-3 [contents] - 1991
- [e4]Sushil Jajodia, Carl E. Landwehr:
Database Security, IV: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Halifax, UK, September 18-21, 1990. North-Holland 1991, ISBN 0-444-89076-9 [contents] - 1990
- [c9]Carl E. Landwehr:
Research Question List. DBSec 1990: 405- - [e3]David L. Spooner, Carl E. Landwehr:
Database Security, III: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Monterey, California, USA, September 5-7, 1989. North-Holland 1990, ISBN 0-444-88701-6 [contents]
1980 – 1989
- 1989
- [c8]Carl E. Landwehr:
Research Question List, Answers, and Revision. DBSec 1989: 377-394 - [e2]Carl E. Landwehr:
Database Security, II: Status and Prospects. Result of the IFIP WG 11.3 Workshop on Database Security, Kingston, Ontario, Canada, October 5-7, 1988. North-Holland 1989, ISBN 0-444-87483-6 [contents] - 1988
- [c7]D. J. Thomsen, J. Thomas Haigh, Carl E. Landwehr:
Discussion Notes and Research Question List. DBSec 1988: 263-280 - [e1]Carl E. Landwehr:
Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, Annapolis, Maryland, USA, October 1987. North-Holland 1988, ISBN 0-444-70479-5 [contents] - 1987
- [j10]Richard Y. Kain, Carl E. Landwehr:
On Access Checking in Capability-Based Systems. IEEE Trans. Software Eng. 13(2): 202-207 (1987) - [c6]Carl E. Landwehr:
Database Security: Where are We? DBSec 1987: 1-9 - 1986
- [j9]Carl E. Landwehr, Susan L. Gerhart, John D. McLean, Donald I. Good, Nancy Leveson:
NRL invitational workshop on testing and proving: two approaches to assurance. ACM SIGSOFT Softw. Eng. Notes 11(5): 63-85 (1986) - [c5]Richard Y. Kain, Carl E. Landwehr:
On Access Checking in Capability-Based Systems. S&P 1986: 95-101 - 1985
- [j8]Carl E. Landwehr:
Does program verification help?: how much? ACM SIGSOFT Softw. Eng. Notes 10(4): 107 (1985) - [j7]Carl E. Landwehr:
Some lessons from formalizing a security model. ACM SIGSOFT Softw. Eng. Notes 10(4): 111-112 (1985) - 1984
- [j6]Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean:
A Security Model for Military Message Systems. ACM Trans. Comput. Syst. 2(3): 198-222 (1984) - [c4]Carl E. Landwehr, John M. Carroll:
Hardware Requirements for Secure Computer Systems: A Framework. S&P 1984: 34-40 - [c3]John D. McLean, Carl E. Landwehr, Constance L. Heitmeyer:
A Formal Statement of the MMS Security Model. S&P 1984: 188-194 - 1983
- [j5]Carl E. Landwehr:
The Best Available Technologies for Computer Security. Computer 16(7): 86-100 (1983) - 1982
- [c2]Connie Heitmeyer, Carl E. Landwehr, M. Cornwell:
The use of quick prototypes in the secure military message systems project. Rapid Prototyping 1982: 85-87 - 1981
- [j4]Carl E. Landwehr:
Formal Models for Computer Security. ACM Comput. Surv. 13(3): 247-278 (1981) - 1980
- [j3]Carl E. Landwehr:
An Abstract Type for Statistics Collection in Simula. ACM Trans. Program. Lang. Syst. 2(4): 544-563 (1980)
1970 – 1979
- 1976
- [j2]Carl E. Landwehr:
An Endogenous Priority Model for Load Control in Combined Batch-Interactive Computer Systems. Acta Informatica 7: 153-166 (1976) - [c1]Carl E. Landwehr:
An endogenous priority model for load control in combined batch - interactive computer systems. SIGMETRICS 1976: 282-295 - 1975
- [j1]Carl E. Landwehr:
Usage statistics for MTS. SIGMETRICS Perform. Evaluation Rev. 4(2): 13-23 (1975) - 1974
- [b1]Carl E. Landwehr:
Load Sharing In Computer Networks: A Queueing Model. University of Michigan, USA, 1974
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-06 02:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint