Følg
Carl E. Landwehr
Carl E. Landwehr
University of Michigan, George Washington University and Independent Consultant
Verifisert e-postadresse på gwu.edu - Startside
Tittel
Sitert av
Sitert av
År
Basic concepts and taxonomy of dependable and secure computing
A Avizienis, JC Laprie, B Randell, C Landwehr
IEEE transactions on dependable and secure computing 1 (1), 11-33, 2004
80532004
A taxonomy of computer program security flaws
CE Landwehr, AR Bull, JP McDermott, WS Choi
ACM Computing Surveys (CSUR) 26 (3), 211-254, 1994
8591994
Formal models for computer security
CE Landwehr
ACM Computing Surveys (CSUR) 13 (3), 247-278, 1981
7891981
Towards an analysis of onion routing security
P Syverson, G Tsudik, M Reed, C Landwehr
Designing privacy enhancing technologies: International workshop on design …, 2001
5662001
A security model for military message systems
CE Landwehr, CL Heitmeyer, J McLean
ACM Transactions on Computer Systems (TOCS) 2 (3), 198-222, 1984
2661984
Computer security
CE Landwehr
International journal of information security 1 (1), 3-13, 2001
2412001
The best available technologies for computer security
CE Landwehr
Computer 16 (07), 86-100, 1983
1161983
On access checking in capability-based systems
RY Kain, CE Landwehr
IEEE Transactions on Software Engineering, 202-207, 1987
961987
Perspectives on the solarwinds incident
S Peisert, B Schneier, H Okhravi, F Massacci, T Benzel, C Landwehr, ...
IEEE Security & Privacy 19 (2), 7-13, 2021
902021
Does open source improve system security?
B Witten, C Landwehr, M Caloyannides
IEEE Software 18 (5), 57-61, 2001
902001
Security issues in networks with Internet access
CE Landwehr, DM Goldschlag
Proceedings of the IEEE 85 (12), 2034-2051, 1997
871997
Avoiding the top 10 software security design flaws
I Arce, K Clark-Fisher, N Daswani, J DelGrosso, D Dhillon, C Kern, ...
IEEE Computer Society Center for Secure Design (CSD), Tech. Rep, 2014
722014
Privacy and cybersecurity: The next 100 years
C Landwehr, D Boneh, JC Mitchell, SM Bellovin, S Landau, ME Lesk
Proceedings of the IEEE 100 (Special Centennial Issue), 1659-1673, 2012
482012
A taxonomy of computer program security flaws, with examples
CE Landwehr, AR Bull, JP McDermott, WS Choi
NRL Report (forthcoming), Naval Research Laboratory, Washington DC, 1993
461993
ÆtherFlow: Principled wireless support in SDN
M Yan, J Casey, P Shome, A Sprintson, A Sutton
2015 IEEE 23rd International Conference on Network Protocols (ICNP), 432-437, 2015
412015
Security analytics and measurements
G Cybenko, CE Landwehr
IEEE Security & Privacy 10 (3), 5-8, 2012
412012
Protecting unattended computers without software
CE Landwehr
Proceedings 13th Annual Computer Security Applications Conference, 274-283, 1997
321997
Update Semantics for a Multilevel Relational Database System.
TF Lunt, D Hsieh
DBSec, 281-296, 1990
311990
Up scope
CE Landwehr
ieee seCurity & PrivaCy 6 (3), 3-4, 2008
302008
Mandatory Controls for Database Integrity.
RS Sandhu
DBSec, 143-150, 1989
291989
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20