Carl E. Landwehr
Orcid: 0000-0002-5824-1697
According to our database1,
Carl E. Landwehr
authored at least 69 papers
between 1975 and 2023.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2013, "For contributions to cybersecurity".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on landwehr.org
On csauthors.net:
Bibliography
2023
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.
IEEE Secur. Priv., 2023
2021
2020
2019
2017
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017
2016
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016
2015
2014
2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
2010
History of US Government Investments in Cybersecurity Research: A Personal Perspective.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
2009
IEEE Secur. Priv., 2009
2008
IEEE Secur. Priv., 2008
Proceedings of the Protecting Persons While Protecting the People, 2008
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008
2007
2006
2005
2004
Improving Information Flow in the Information Security Market - DoD Experience and Future Directions.
Proceedings of the Economics of Information Security, 2004
IEEE Trans. Dependable Secur. Comput., 2004
Proceedings of the Building the Information Society, 2004
2003
IEEE Secur. Priv., 2003
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003
2002
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
2001
Panel: The next generation of acess control models (panel session): do we need them and what should they be?
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Proceedings of the Designing Privacy Enhancing Technologies, 2000
1997
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
Protection (Security) Models and Policy.
Proceedings of the Computer Science and Engineering Handbook, 1997
1994
Hidden Safety Requirements in Large-Scale Systems.
Proceedings of the Linkage and Developing Countries, Information Processing '94, Volume 3, Proceedings of the IFIP 13th World Computer Congress, Hamburg, Germany, 28 August, 1994
Perspectives on Database Security - Panel Summary.
Proceedings of the Database Security, 1994
Proceedings of the 10th Annual Computer Security Applications Conference, 1994
1993
Proceedings of the 12th International Conference on Computer Safety, 1993
1992
IFIP WG 11.3 Database Security: Research Questions of Current Significance.
Proceedings of the Database Security, 1992
1990
Research Question List.
Proceedings of the Database Security, 1990
1989
Research Question List, Answers, and Revision.
Proceedings of the Database Security, 1989
1988
Discussion Notes and Research Question List.
Proceedings of the Database Security, 1988
1987
Database Security: Where are We?
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987
1986
ACM SIGSOFT Softw. Eng. Notes, 1986
1985
1984
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984
1983
1982
Proceedings of the workshop on Rapid Prototyping, 1982
1981
1980
ACM Trans. Program. Lang. Syst., 1980
1976
An Endogenous Priority Model for Load Control in Combined Batch-Interactive Computer Systems.
Acta Informatica, 1976
1975