dblp.uni-trier.dewww.uni-trier.de

Timothy E. Levin Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
32EETimothy E. Levin, Cynthia E. Irvine, Terry Benzel, Thuy D. Nguyen, Paul C. Clark, Ganesha Bhaskara: Idea: Trusted Emergency Management. ESSoS 2009: 32-36
31EETimothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhaskara, Thuy D. Nguyen, Paul C. Clark, Ruby B. Lee, Cynthia E. Irvine, Terry Benzel: Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture. TRUST 2009: 133-152
2008
30EEMark E. Orwat, Timothy E. Levin, Cynthia E. Irvine: An Ontological Approach to Secure MANET Management. ARES 2008: 787-794
29EECynthia E. Irvine, Timothy E. Levin, Paul C. Clark, Thuy D. Nguyen: A security architecture for transient trust. CSAW 2008: 1-8
28EETed Huffmire, Jonathan Valamehr, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine: Trustworthy System Security through 3-D Integrated Hardware. HOST 2008: 91-92
27EEAlan B. Shaffer, Mikhail Auguston, Cynthia E. Irvine, Timothy E. Levin: A security domain model to assess software for exploitable covert channels. PLAS 2008: 45-56
26EETed Huffmire, Timothy Sherwood, Ryan Kastner, Timothy E. Levin: Enforcing memory policy specifications in reconfigurable hardware. Computers & Security 27(5-6): 197-215 (2008)
25EETed Huffmire, Brett Brotherton, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine: Managing Security in FPGA-Based Embedded Systems. IEEE Design & Test of Computers 25(6): 590-598 (2008)
2007
24EERance J. DeLong, Thuy D. Nguyen, Cynthia E. Irvine, Timothy E. Levin: Toward a Medium-Robustness Separation Kernel Protection Profile. ACSAC 2007: 40-51
23EETimothy E. Levin, Cynthia E. Irvine, Clark Weissman, Thuy D. Nguyen: Analysis of three multilevel security architectures. CSAW 2007: 37-46
22EETed Huffmire, Brett Brotherton, Gang Wang, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine: Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems. IEEE Symposium on Security and Privacy 2007: 281-295
2006
21EEFrancis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen: A Model for Temporal Interval Authorizations. HICSS 2006
20EEThuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine: High Robustness Requirements in a Common Criteria Protection Profile. IWIA 2006: 66-78
19 Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen: Least Privilege in Separation Kernels. SECRYPT 2006: 355-362
18EEJong-Kook Kim, Debra A. Hensgen, Taylor Kidd, Howard Jay Siegel, David St. John, Cynthia E. Irvine, Timothy E. Levin, N. Wayne Porter, Viktor K. Prasanna, Richard F. Freund: A flexible multi-dimensional QoS performance measure framework for distributed heterogeneous systems. Cluster Computing 9(3): 281-296 (2006)
2005
17EEFrancis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen: Foundation for a Time Interval Access Control Model. MMM-ACNS 2005: 406-411
2004
16 Cynthia E. Irvine, Timothy E. Levin: A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach. International Information Security Workshops 2004: 173-180
2003
15EERaj Mohan, Timothy E. Levin, Cynthia E. Irvine: An Editor for Adaptive XML-Based Policy Management of IPsec. ACSAC 2003: 276-285
14EECynthia E. Irvine, David J. Shifflett, Paul C. Clark, Timothy E. Levin, George W. Dinolt: MYSEA Technology Demonstration. DISCEX (2) 2003: 10-12
13EECynthia E. Irvine, David J. Shifflett, Paul C. Clark, Timothy E. Levin, George W. Dinolt: Monterey Security Enhanced Architecture Project. DISCEX (2) 2003: 176-181
12 Craig W. Rasmussen, Cynthia E. Irvine, George W. Dinolt, Timothy E. Levin, Karen L. Burke: A Program for Education in Certification and Accreditation. World Conference on Information Security Education 2003: 131-149
2002
11EEGeoffrey G. Xie, Cynthia E. Irvine, Timothy E. Levin: Quantifying Effect of Network Latency and Clock Drift on Time-Driven Key Sequencing. ICDCS Workshops 2002: 35-42
10EECynthia E. Irvine, Timothy E. Levin, Jeffery D. Wilson, David J. Shifflett, Barbara Pereira: An Approach to Security Requirements Engineering for a High Assurance System. Requir. Eng. 7(4): 192-206 (2002)
2001
9EECynthia E. Irvine, Timothy E. Levin, E. Spyropoulou, Bruce Allen: Security as a Dimension of Quality of Service in Active Service Environments. Active Middleware Services 2001: 87-
8 Cynthia E. Irvine, Timothy E. Levin: A cautionary note regarding the data integrity capacity of certain secure systems. IICIS 2001: 3-26
7 Jong-Kook Kim, Taylor Kidd, Howard Jay Siegel, Cynthia E. Irvine, Timothy E. Levin, Debra A. Hensgen, David St. John, Viktor K. Prasanna, Richard F. Freund, N. Wayne Porter: Collective Value of QoS: A Performance Measure Framework for Distributed Heterogeneous Networks. IPDPS 2001: 84
2000
6EEE. Spyropoulou, Timothy E. Levin, Cynthia E. Irvine: Calculating Costs for Quality of Security Service. ACSAC 2000: 334-343
5EECynthia E. Irvine, Timothy E. Levin: Toward Quality of Security Service in a Resource Management System Benefit Function. Heterogeneous Computing Workshop 2000: 133-139
4EECynthia E. Irvine, Timothy E. Levin: Is Electronic Privacy Achievable? IEEE Symposium on Security and Privacy 2000: 76-77
1999
3EECynthia E. Irvine, Timothy E. Levin: Toward a Taxonomy and Costing Method for Security Services. ACSAC 1999: 183-188
2EEDebra A. Hensgen, Taylor Kidd, David St. John, Matthew C. Schnaidt, Howard Jay Siegel, Tracy D. Braun, Muthucumaru Maheswaran, Shoukat Ali, Jong-Kook Kim, Cynthia E. Irvine, Timothy E. Levin, Richard F. Freund, Matt Kussow, Michael W. Godfrey, Alpay Duman, Paul Carff, Shirley Kidd, Viktor K. Prasanna, Prashanth B. Bhat, Ammar H. Alhusaini: An Overview of MSHN: The Management System for Heterogeneous Networks. Heterogeneous Computing Workshop 1999: 184-198
1989
1 Timothy E. Levin, S. J. Padilla, Cynthia E. Irvine: A Formal Model for UNIX Setuid. IEEE Symposium on Security and Privacy 1989: 73-83

Coauthor Index

1Francis B. Afinidad [17] [21]
2Ammar H. Alhusaini [2]
3Shoukat Ali [2]
4Bruce Allen [9]
5Mikhail Auguston [27]
6Terry Benzel [31] [32]
7Ganesha Bhaskara [31] [32]
8Prashanth B. Bhat [2]
9Tracy D. Braun [2]
10Brett Brotherton [22] [25]
11Karen L. Burke [12]
12Paul Carff [2]
13Paul C. Clark [13] [14] [29] [31] [32]
14Rance J. DeLong [24]
15George W. Dinolt [12] [13] [14]
16Alpay Duman [2]
17Jeffrey S. Dwoskin [31]
18Richard F. Freund [2] [7] [18]
19Michael W. Godfrey [2]
20Debra A. Hensgen [2] [7] [18]
21Ted Huffmire [22] [25] [26] [28]
22Cynthia E. Irvine [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [27] [28] [29] [30] [31] [32]
23David St. John [2] [7] [18]
24Ryan Kastner [22] [25] [26] [28]
25Shirley Kidd [2]
26Taylor Kidd [2] [7] [18]
27Jong-Kook Kim [2] [7] [18]
28Matt Kussow [2]
29Ruby B. Lee [31]
30Muthucumaru Maheswaran [2]
31Raj Mohan [15]
32Thuy D. Nguyen [17] [19] [20] [21] [22] [23] [24] [25] [28] [29] [31] [32]
33Mark E. Orwat [30]
34S. J. Padilla [1]
35Barbara Pereira [10]
36N. Wayne Porter [7] [18]
37Viktor K. Prasanna (V. K. Prasanna Kumar) [2] [7] [18]
38Craig W. Rasmussen [12]
39Matthew C. Schnaidt [2]
40Alan B. Shaffer [27]
41Timothy Sherwood [22] [25] [26] [28]
42David J. Shifflett [10] [13] [14]
43Howard Jay Siegel [2] [7] [18]
44E. Spyropoulou [6] [9]
45Jonathan Valamehr [28]
46Gang Wang [22]
47Clark Weissman [23]
48Jeffery D. Wilson [10]
49Geoffrey G. Xie [11]

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)