Timothy E. Levin

According to our database1, Timothy E. Levin authored at least 46 papers between 1989 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A 3-D Split Manufacturing Approach to Trustworthy System Development.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2013

2012
Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Lessons Learned from Building a High-Assurance Crypto Gateway.
IEEE Secur. Priv., 2011

Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security.
Proceedings of the 38th International Symposium on Computer Architecture (ISCA 2011), 2011

Security Checkers: Detecting processor malicious inclusions at runtime.
Proceedings of the HOST 2011, 2011

2010
Security Primitives for Reconfigurable Hardware-Based Systems.
ACM Trans. Reconfigurable Technol. Syst., 2010

Hardware trust implications of 3-D integration.
Proceedings of the 5th Workshop on Embedded Systems Security, 2010

Hardware assistance for trustworthy systems through 3-D integration.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture.
Proceedings of the Trusted Computing, 2009

Idea: Trusted Emergency Management.
Proceedings of the Engineering Secure Software and Systems, 2009

MYSEA: the monterey security architecture.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

2008
Managing Security in FPGA-Based Embedded Systems.
IEEE Des. Test Comput., 2008

Enforcing memory policy specifications in reconfigurable hardware.
Comput. Secur., 2008

A security domain model to assess software for exploitable covert channels.
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008

A Security Domain Model for Implementing Trusted Subject Behaviors.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

Trustworthy System Security through 3-D Integrated Hardware.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008

A security architecture for transient trust.
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008

An Ontological Approach to Secure MANET Management.
Proceedings of the The Third International Conference on Availability, 2008

2007
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Analysis of three multilevel security architectures.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

Toward a Medium-Robustness Separation Kernel Protection Profile.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
A flexible multi-dimensional QoS performance measure framework for distributed heterogeneous systems.
Clust. Comput., 2006

High Robustness Requirements in a Common Criteria Protection Profile.
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006

Least Privilege in Separation Kernels.
Proceedings of the E-Business and Telecommunication Networks, 2006

A Model for Temporal Interval Authorizations.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2005
TCX project: high assurance for secure embedded systems.
SIGBED Rev., 2005

Foundation for a Time Interval Access Control Model.
Proceedings of the Computer Network Security, 2005

2004
A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach.
Proceedings of the Information Security Management, Education and Privacy, 2004

2003
A Program for Education in Certification and Accreditation.
Proceedings of the Security Education and Critical Infrastructures, 2003

Monterey Security Enhanced Architecture Project.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

MYSEA Technology Demonstration.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

An Editor for Adaptive XML-Based Policy Management of IPsec.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
An Approach to Security Requirements Engineering for a High Assurance System.
Requir. Eng., 2002

Quantifying Effect of Network Latency and Clock Drift on Time-Driven Key Sequencing.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002

2001
A cautionary note regarding the data integrity capacity of certain secure systems.
Proceedings of the Integrity, 2001

Collective Value of QoS: A Performance Measure Framework for Distributed Heterogeneous Networks.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

Security as a Dimension of Quality of Service in Active Service Environments.
Proceedings of the 3rd Annual International Workshop on Active Middleware Services (AMS 2001), 2001

2000
Is Electronic Privacy Achievable?
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

A QoS performance measure framework for distributed heterogeneous networks.
Proceedings of the Eight Euromicro Workshop on Parallel and Distributed Processing, 2000

Quality of security service.
Proceedings of the 2000 Workshop on New Security Paradigms, 2000

Toward Quality of Security Service in a Resource Management System Benefit Function.
Proceedings of the 9th Heterogeneous Computing Workshop, 2000

Calculating Costs for Quality of Security Service.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999

Toward a Taxonomy and Costing Method for Security Services.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1989
A Formal Model for UNIX Setuid.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989


  Loading...