Search For:

Displaying 1-25 out of 25 total
Technical Correspondence: On Landwehr's “An Abstract Type for Statistics Collection”
Found in: ACM Transactions on Programming Languages and Systems (TOPLAS)
By Carl E. Landwehr, Jakob Nielsen
Issue Date:April 1981
pp. 207
In this work we propose a new algorithm to evaluate the basis functions of the Argyris finite element and their derivatives. The main novelty here is an efficient way to calculate the matrix which gives the change of coordinates between the bases of the Ar...
     
Speaking of Privacy
Found in: IEEE Security and Privacy
By Carl E. Landwehr
Issue Date:July 2006
pp. 4-5
When Plato, quoting Socrates, said
 
New Challenges for the New Year
Found in: IEEE Security and Privacy
By Carl E. Landwehr
Issue Date:January 2007
pp. 3-4
You've heard from me in this space before, but this is my first column as IEEE Security & Privacy's editor in chief. I feel both honored and privileged to have the opportunity to assume this responsibility. George Cybenko, as both the driving force beh...
 
Up Scope
Found in: IEEE Security and Privacy
By Carl E. Landwehr
Issue Date:May 2008
pp. 3-4
The scope of the magazine is being expanded to incorporate reliability and dependability concerns and its readership will include members of the IEEE Reliability Society. This expansion is appropriate because the requirements for a system to be reliable, s...
 
History of US Government Investments in Cybersecurity Research: A Personal Perspective
Found in: Security and Privacy, IEEE Symposium on
By Carl E. Landwehr
Issue Date:May 2010
pp. 14-20
This paper traces the history of cyber security research funding by the U.S. government. Difficulties in accurately measuring the level of U.S. government research funding for cyber security are first described. Some of the legislative and bureaucratic mec...
 
A Formal Statement of the MMS Security Model
Found in: Security and Privacy, IEEE Symposium on
By John McLean, Carl E. Landwehr, Constance L. Heitmeyer
Issue Date:May 1984
pp. 188
To provide a firm foundation for proofs about the security properties of a system specification or implementation, a formal statement of its security model is needed. This paper presents a formal model that corresponds to an informal, application-based sec...
 
Security Analytics and Measurements
Found in: IEEE Security & Privacy
By George Cybenko,Carl E. Landwehr
Issue Date:May 2012
pp. 5-8
The magazine's founding editor in chief, George Cybenko, and his first successor, Carl E. Landwehr, provide perspectives on the need for measuring security and the meaning of those measurements in the context of adversarial dynamics.
 
Sailing Away!
Found in: IEEE Security and Privacy
By Carl E. Landwehr
Issue Date:November 2010
pp. 3-4
Outgoing IEEE Security & Privacy editor in chief, Carl E. Landwehr, looks at how far we have come in four years in terms of security and privacy and policy.
 
In Memoriam: Paul Karger
Found in: IEEE Security and Privacy
By Roger Schell, Steve Lipner, Mary Ellen Zurko, Elaine R. Palmer, David Safford, Charles C. Palmer, Carl E. Landwehr
Issue Date:November 2010
pp. 5
Paul Karger, a great friend to all and a thought leader in security, passed away in September 2010.
 
Drawing the Line
Found in: IEEE Security and Privacy
By Carl E. Landwehr
Issue Date:January 2010
pp. 3-4
Cybersecurity research and development raises questions of ethics in many areas. The essay lists several areas where ethics considerations may confront researchers and practitioners and considers in more detail the ethics of data collection and human subje...
 
A National Goal for Cyberspace: Create an Open, Accountable Internet
Found in: IEEE Security and Privacy
By Carl E. Landwehr
Issue Date:May 2009
pp. 3-4
Today's Internet has proven to be such a valuable resource, so useful in enabling creative new forms of communication and commerce, that it has become a critical infrastructure underlying much of our economy and society. Unfortunately, today's Internet and...
 
Cybersecurity and Artificial Intelligence: From Fixing the Plumbing to Smart Water
Found in: IEEE Security and Privacy
By Carl E. Landwehr
Issue Date:September 2008
pp. 3-4
Ray Kurzweil predicts that by 2040 or 2050, machine intelligence will exceed human intelligence—an event he and others have dubbed the
   
Revolution through Competition?
Found in: IEEE Security and Privacy
By Carl E. Landwehr
Issue Date:November 2007
pp. 3-4
Competition, in the form of survival of the fittest, has been around far longer than humans, but humans are unique in setting up artificial competitions and awarding prizes for success. The Olympic Games is perhaps the oldest competition that continues to ...
 
Food for Thought: Improving the Market for Assurance
Found in: IEEE Security and Privacy
By Carl E. Landwehr
Issue Date:May 2007
pp. 3-4
Better information can improve a marketplace. An evaluation/certification process that leveraged modern programming languages and analytic tools could accelerate both the development and the adoption of less vulnerable and more effective programming practi...
 
Green Computing
Found in: IEEE Security and Privacy
By Carl E. Landwehr
Issue Date:November 2005
pp. 3
We need computing and networking environments that support many forms of accountability, but we also need to understand how to construct systems with interfaces simple enough to be usable, yet capable of supporting the kinds of security policies we employ ...
 
Overview of Cyber Security: A Crisis of Prioritization
Found in: IEEE Security and Privacy
By Susan Landau, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider
Issue Date:May 2005
pp. 9-11
An overview of PITAC?s response to cybersecurity issues, from Cyber Security: A Crisis of Prioritization.
 
From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion
Found in: IEEE Security and Privacy
By Carl E. Landwehr
Issue Date:September 2003
pp. 5
<p></p>
 
NSF Activities in Cyber Trust
Found in: Network Computing and Applications, IEEE International Symposium on
By Carl E. Landwehr
Issue Date:April 2003
pp. 85
No summary available.
   
Intrusion Tolerant Systems Workshop
Found in: Dependable Systems and Networks, International Conference on
By Carl E. Landwehr, Steven M. Bellovin
Issue Date:June 2002
pp. 785
No summary available.
   
On Access Checking in Capability-Based Systems
Found in: Security and Privacy, IEEE Symposium on
By Richard Y. Kain, Carl E. Landwehr
Issue Date:April 1986
pp. 95
Public descriptions of capability-based system designs often do not clarify the necessary details concerning the propagation of access rights within the systems. A casual reader may assume that it is adequate for capabilities to be psssed in accordance wit...
 
Hardware Requirements for Secure Computer Systems: A Framework
Found in: Security and Privacy, IEEE Symposium on
By Carl E. Landwehr, John M. Carroll
Issue Date:May 1984
pp. 34
This report develops a new set of criteria for evaluating computer architectures that are to support systems with security requirements. Central to these criteria is the concept of a <i><b>domain</b></i>, here interpreted as a set o...
 
A building code for building code: putting what we know works to work
Found in: Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC '13)
By Carl E. Landwehr
Issue Date:December 2013
pp. 139-147
Systems of programs control more and more of our critical infrastructures. Forty years of system development and research have taught us many lessons in how to build software that is reliable, relatively free of vulnerabilities, and can enforce security po...
     
A taxonomy of computer program security flaws
Found in: ACM Computing Surveys (CSUR)
By Alan R. Bull, Carl E. Landwehr, John P. McDermott, William S. Choi
Issue Date:March 1988
pp. 211-254
An organized record of actual flaws can be useful to computer system designers, programmers, analysts, administrators, and users. This survey provides a taxonomy for computer program security flaws, with an Appendix that documents 50 actual security flaws....
     
An Abstract Type for Statistics Collection in Simula
Found in: ACM Transactions on Programming Languages and Systems (TOPLAS)
By Carl E. Landwehr
Issue Date:October 1980
pp. 544-563
Although the use of abstract types has been widely advocated as a specification and implementation technique, their use has often been associated with programming languages that are not widely available, and examples published to date are rarely taken from...
     
An endogenous priority model for load control in combined batch - interactive computer systems
Found in: Proceedings of the 1976 ACM SIGMETRICS conference on Computer performance modeling measurement and evaluation (SIGMETRICS '76)
By Carl E. Landwehr
Issue Date:March 1976
pp. 282-295
A relatively high level analytical model for computer systems serving both batch and interactive users is presented. The model is unusual in its employment of an endogenous priority scheme to represent a class of strategies for controlling service to the t...
     
 1