Carl E. Landwehr
Carl E. Landwehr
University of Michigan, George Washington University and Independent Consultant
Verified email at gwu.edu - Homepage
Title
Cited by
Cited by
Year
Basic concepts and taxonomy of dependable and secure computing
A Avizienis, JC Laprie, B Randell, C Landwehr
IEEE transactions on dependable and secure computing 1 (1), 11-33, 2004
67242004
Basic concepts and taxonomy of dependable and secure computing
A Avizienis, JC Laprie, B Randell, C Landwehr
IEEE transactions on dependable and secure computing 1 (1), 11-33, 2004
67212004
A taxonomy of computer program security flaws
CE Landwehr, AR Bull, JP McDermott, WS Choi
ACM Computing Surveys (CSUR) 26 (3), 211-254, 1994
7831994
Formal models for computer security
CE Landwehr
ACM Computing Surveys (CSUR) 13 (3), 247-278, 1981
7291981
Towards an analysis of onion routing security
P Syverson, G Tsudik, M Reed, C Landwehr
Designing Privacy Enhancing Technologies, 96-114, 2001
4742001
A security model for military message systems
CE Landwehr, CL Heitmeyer, J McLean
ACM Transactions on Computer Systems (TOCS) 2 (3), 198-222, 1984
2451984
Computer security
CE Landwehr
International journal of information security 1 (1), 3-13, 2001
2052001
Who should test whom?
S McDonald, HM Edwards
Communications of the ACM 50 (1), 66-71, 2007
116*2007
The best available technologies for computer security
C Landwehr
IEEE Annals of the History of Computing 16 (07), 86-100, 1983
1081983
On access checking in capability-based systems
RY Kain, CE Landwehr
IEEE Transactions on Software Engineering, 202-207, 1987
871987
On access checking in capability-based systems
RY Kain, CE Landwehr
IEEE Transactions on Software Engineering, 202-207, 1987
871987
Security issues in networks with Internet access
CE Landwehr, DM Goldschlag
Proceedings of the IEEE 85 (12), 2034-2051, 1997
831997
Does open source improve system security?
B Witten, C Landwehr, M Caloyannides
IEEE Software 18 (5), 57-61, 2001
802001
Avoiding the top 10 software security design flaws
I Arce, K Clark-Fisher, N Daswani, J DelGrosso, D Dhillon, C Kern, ...
IEEE Computer Society Center for Secure Design (CSD), Tech. Rep, 2014
562014
User group structures in object-oriented database authorization
EB Fernandez, J Wu, MH Fernandez
Proceedings of the IFIP WG11. 3 Working Conference on Database Security VII …, 1994
491994
Privacy and cybersecurity: The next 100 years
C Landwehr, D Boneh, JC Mitchell, SM Bellovin, S Landau, ME Lesk
Proceedings of the IEEE 100 (Special Centennial Issue), 1659-1673, 2012
382012
A taxonomy of computer program security flaws, with examples
CE Landwehr, AR Bull, JP McDermott, WS Choi
NAVAL RESEARCH LAB WASHINGTON DC, 1993
381993
Security analytics and measurements
G Cybenko, CE Landwehr
IEEE Security & Privacy 10 (3), 5-8, 2012
342012
Protecting unattended computers without software
CE Landwehr
Proceedings 13th Annual Computer Security Applications Conference, 274-283, 1997
321997
Ætherflow: Principled wireless support in SDN
M Yan, J Casey, P Shome, A Sprintson, A Sutton
2015 IEEE 23rd International Conference on Network Protocols (ICNP), 432-437, 2015
312015
The system can't perform the operation now. Try again later.
Articles 1–20