dblp.uni-trier.dewww.uni-trier.de

Cynthia E. Irvine Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
48EETimothy E. Levin, Cynthia E. Irvine, Terry Benzel, Thuy D. Nguyen, Paul C. Clark, Ganesha Bhaskara: Idea: Trusted Emergency Management. ESSoS 2009: 32-36
47EETimothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhaskara, Thuy D. Nguyen, Paul C. Clark, Ruby B. Lee, Cynthia E. Irvine, Terry Benzel: Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture. TRUST 2009: 133-152
2008
46EEMark E. Orwat, Timothy E. Levin, Cynthia E. Irvine: An Ontological Approach to Secure MANET Management. ARES 2008: 787-794
45EECynthia E. Irvine, Timothy E. Levin, Paul C. Clark, Thuy D. Nguyen: A security architecture for transient trust. CSAW 2008: 1-8
44EETed Huffmire, Jonathan Valamehr, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine: Trustworthy System Security through 3-D Integrated Hardware. HOST 2008: 91-92
43EEAlan B. Shaffer, Mikhail Auguston, Cynthia E. Irvine, Timothy E. Levin: A security domain model to assess software for exploitable covert channels. PLAS 2008: 45-56
42EETed Huffmire, Brett Brotherton, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine: Managing Security in FPGA-Based Embedded Systems. IEEE Design & Test of Computers 25(6): 590-598 (2008)
2007
41EERance J. DeLong, Thuy D. Nguyen, Cynthia E. Irvine, Timothy E. Levin: Toward a Medium-Robustness Separation Kernel Protection Profile. ACSAC 2007: 40-51
40EETimothy E. Levin, Cynthia E. Irvine, Clark Weissman, Thuy D. Nguyen: Analysis of three multilevel security architectures. CSAW 2007: 37-46
39EECynthia E. Irvine, Karl N. Levitt: Trusted Hardware: Can It Be Trustworthy? DAC 2007: 1-4
38EETed Huffmire, Brett Brotherton, Gang Wang, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine: Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems. IEEE Symposium on Security and Privacy 2007: 281-295
37EEBenjamin D. Cone, Cynthia E. Irvine, Michael F. Thompson, Thuy D. Nguyen: A video game for cyber security training and awareness. Computers & Security 26(1): 63-72 (2007)
2006
36EEFrancis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen: A Model for Temporal Interval Authorizations. HICSS 2006
35EEThuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine: High Robustness Requirements in a Common Criteria Protection Profile. IWIA 2006: 66-78
34EEThuy D. Nguyen, Cynthia E. Irvine: Utilizing the Common Criteria for Advanced Student Research Projects. SEC 2006: 317-328
33EEBenjamin D. Cone, Michael F. Thompson, Cynthia E. Irvine, Thuy D. Nguyen: Cyber Security Training and Awareness Through Game Play. SEC 2006: 431-436
32 Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen: Least Privilege in Separation Kernels. SECRYPT 2006: 355-362
31EEJong-Kook Kim, Debra A. Hensgen, Taylor Kidd, Howard Jay Siegel, David St. John, Cynthia E. Irvine, Timothy E. Levin, N. Wayne Porter, Viktor K. Prasanna, Richard F. Freund: A flexible multi-dimensional QoS performance measure framework for distributed heterogeneous systems. Cluster Computing 9(3): 281-296 (2006)
2005
30EEFrancis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen: Foundation for a Time Interval Access Control Model. MMM-ACNS 2005: 406-411
29EECynthia E. Irvine, Michael F. Thompson, Ken Allen: CyberCIEGE: Gaming for Information Assurance. IEEE Security & Privacy 3(3): 61-64 (2005)
28EECatherine Dodge, Cynthia E. Irvine, Thuy D. Nguyen: A study of initialization in Linux and OpenBSD. Operating Systems Review 39(2): 79-93 (2005)
2004
27 Cynthia E. Irvine, Timothy E. Levin: A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach. International Information Security Workshops 2004: 173-180
2003
26 Cynthia E. Irvine, Helen L. Armstrong: Security Education and Critical Infrastructures, IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3), June 26-28, 2003, Monterey, California, USA Kluwer 2003
25EERaj Mohan, Timothy E. Levin, Cynthia E. Irvine: An Editor for Adaptive XML-Based Policy Management of IPsec. ACSAC 2003: 276-285
24EECynthia E. Irvine, David J. Shifflett, Paul C. Clark, Timothy E. Levin, George W. Dinolt: MYSEA Technology Demonstration. DISCEX (2) 2003: 10-12
23EECynthia E. Irvine, David J. Shifflett, Paul C. Clark, Timothy E. Levin, George W. Dinolt: Monterey Security Enhanced Architecture Project. DISCEX (2) 2003: 176-181
22 Craig W. Rasmussen, Cynthia E. Irvine, George W. Dinolt, Timothy E. Levin, Karen L. Burke: A Program for Education in Certification and Accreditation. World Conference on Information Security Education 2003: 131-149
21EECynthia E. Irvine: Teaching Constructive Security. IEEE Security & Privacy 1(6): 59-61 (2003)
2002
20EEGeoffrey G. Xie, Cynthia E. Irvine, Timothy E. Levin: Quantifying Effect of Network Latency and Clock Drift on Time-Driven Key Sequencing. ICDCS Workshops 2002: 35-42
19EEDawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David Wagner: Cool security trends. SACMAT 2002: 53
18EECynthia E. Irvine, Timothy E. Levin, Jeffery D. Wilson, David J. Shifflett, Barbara Pereira: An Approach to Security Requirements Engineering for a High Assurance System. Requir. Eng. 7(4): 192-206 (2002)
2001
17EECynthia E. Irvine, Timothy E. Levin, E. Spyropoulou, Bruce Allen: Security as a Dimension of Quality of Service in Active Service Environments. Active Middleware Services 2001: 87-
16 Cynthia E. Irvine, Timothy E. Levin: A cautionary note regarding the data integrity capacity of certain secure systems. IICIS 2001: 3-26
15 Jong-Kook Kim, Taylor Kidd, Howard Jay Siegel, Cynthia E. Irvine, Timothy E. Levin, Debra A. Hensgen, David St. John, Viktor K. Prasanna, Richard F. Freund, N. Wayne Porter: Collective Value of QoS: A Performance Measure Framework for Distributed Heterogeneous Networks. IPDPS 2001: 84
2000
14EEE. Spyropoulou, Timothy E. Levin, Cynthia E. Irvine: Calculating Costs for Quality of Security Service. ACSAC 2000: 334-343
13EECynthia E. Irvine, Timothy E. Levin: Toward Quality of Security Service in a Resource Management System Benefit Function. Heterogeneous Computing Workshop 2000: 133-139
12EECynthia E. Irvine, Timothy E. Levin: Is Electronic Privacy Achievable? IEEE Symposium on Security and Privacy 2000: 76-77
1999
11EECynthia E. Irvine, Timothy E. Levin: Toward a Taxonomy and Costing Method for Security Services. ACSAC 1999: 183-188
10EEBlaine Burnham, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Rayford B. Vaughn: Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). ACSAC 1999: 265-
9EEDebra A. Hensgen, Taylor Kidd, David St. John, Matthew C. Schnaidt, Howard Jay Siegel, Tracy D. Braun, Muthucumaru Maheswaran, Shoukat Ali, Jong-Kook Kim, Cynthia E. Irvine, Timothy E. Levin, Richard F. Freund, Matt Kussow, Michael W. Godfrey, Alpay Duman, Paul Carff, Shirley Kidd, Viktor K. Prasanna, Prashanth B. Bhat, Ammar H. Alhusaini: An Overview of MSHN: The Management System for Heterogeneous Networks. Heterogeneous Computing Workshop 1999: 184-198
8EEHaruna R. Isa, William R. Shockley, Cynthia E. Irvine: A Multi-Threading Architecture for Multilevel Secure Transaction Processing. IEEE Symposium on Security and Privacy 1999: 166-180
1998
7EERoger Wright, David J. Shifflett, Cynthia E. Irvine: Security Architecture for a Virtual Heterogeneous Machine. ACSAC 1998: 167-177
6 Cynthia E. Irvine, Shiu-Kai Chin, Deborah A. Frincke: Integrating Security into the Curriculum. IEEE Computer 31(12): 25-30 (1998)
1997
5EECynthia E. Irvine: Security in Innovative New Operating Systems. IEEE Symposium on Security and Privacy 1997: 202-203
4EEDennis M. Volpano, Cynthia E. Irvine: Secure flow typing. Computers & Security 16(2): 137-144 (1997)
1996
3EECynthia E. Irvine: Goals for Computer Security Education. IEEE Symposium on Security and Privacy 1996: 24-25
2 Dennis M. Volpano, Cynthia E. Irvine, Geoffrey Smith: A Sound Type System for Secure Flow Analysis. Journal of Computer Security 4(2/3): 167-188 (1996)
1989
1 Timothy E. Levin, S. J. Padilla, Cynthia E. Irvine: A Formal Model for UNIX Setuid. IEEE Symposium on Security and Privacy 1989: 73-83

Coauthor Index

1Francis B. Afinidad [30] [36]
2Ammar H. Alhusaini [9]
3Shoukat Ali [9]
4Bruce Allen [17]
5Ken Allen [29]
6Helen L. Armstrong [26]
7Mikhail Auguston [43]
8Terry Benzel [47] [48]
9Ganesha Bhaskara [47] [48]
10Prashanth B. Bhat [9]
11Tracy D. Braun [9]
12Brett Brotherton [38] [42]
13Karen L. Burke [22]
14Blaine Burnham [10]
15Paul Carff [9]
16Shiu-Kai Chin [6]
17Paul C. Clark [23] [24] [45] [47] [48]
18Benjamin D. Cone [33] [37]
19Rance J. DeLong [41]
20George W. Dinolt [22] [23] [24]
21Catherine Dodge [28]
22Alpay Duman [9]
23Jeffrey S. Dwoskin [47]
24Dawson R. Engler [19]
25Richard F. Freund [9] [15] [31]
26Deborah A. Frincke [6]
27Michael W. Godfrey [9]
28Debra A. Hensgen [9] [15] [31]
29Ted Huffmire [38] [42] [44]
30Haruna R. Isa [8]
31Trent Jaeger [19]
32David St. John [9] [15] [31]
33Ryan Kastner [38] [42] [44]
34Shirley Kidd [9]
35Taylor Kidd [9] [15] [31]
36Jong-Kook Kim [9] [15] [31]
37Matt Kussow [9]
38Ruby B. Lee [47]
39Timothy E. Levin [1] [9] [11] [12] [13] [14] [15] [16] [17] [18] [20] [22] [23] [24] [25] [27] [30] [31] [32] [35] [36] [38] [40] [41] [42] [43] [44] [45] [46] [47] [48]
40Karl N. Levitt [39]
41Muthucumaru Maheswaran [9]
42Raj Mohan [25]
43Thuy D. Nguyen [28] [30] [32] [33] [34] [35] [36] [37] [38] [40] [41] [42] [44] [45] [47] [48]
44Mark E. Orwat [46]
45S. J. Padilla [1]
46Barbara Pereira [18]
47N. Wayne Porter [15] [31]
48Viktor K. Prasanna (V. K. Prasanna Kumar) [9] [15] [31]
49Craig W. Rasmussen [22]
50Charles Reynolds [10]
51Ravi S. Sandhu [10]
52Matthew C. Schnaidt [9]
53Alan B. Shaffer [43]
54Timothy Sherwood [38] [42] [44]
55David J. Shifflett [7] [18] [23] [24]
56William R. Shockley [8]
57Howard Jay Siegel [9] [15] [31]
58Geoffrey Smith [2]
59E. Spyropoulou [14] [17]
60Michael F. Thompson [29] [33] [37]
61Jonathan Valamehr [44]
62Rayford B. Vaughn [10]
63Dennis M. Volpano [2] [4]
64David Wagner [19]
65Gang Wang [38]
66Clark Weissman [40]
67Jeffery D. Wilson [18]
68Roger Wright [7]
69Geoffrey G. Xie [20]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)