Carl Landwehr
American academic
Carl Landwehr's AcademicInfluence.com Rankings

Download Badge
Computer Science
Carl Landwehr's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Carl Landwehr Influential?
(Suggest an Edit or Addition)According to Wikipedia, Carl E. Landwehr is an American computer scientist whose research focus is cybersecurity and trustworthy computing. His work has addressed the identification of software vulnerabilities toward high assurance software development, architectures for intrusion-tolerant and multilevel security systems, token-based authentication, and system evaluation and certification methods. In an invited essay for ACSAC 2013, he proposed the idea of developing building codes for building software that is used in critical infrastructures. He has organized an NSF funded workshop to develop a building code and research agenda for medical device software security. The final committee report is available through the Cyber Security and Policy Institute of the George Washington University, and the building code through the IEEE.
Carl Landwehr's Published Works
Published Works
- Basic concepts and taxonomy of dependable and secure computing (2004) (5232)
- 2018 (2019) (2066)
- A taxonomy of computer program security flaws (1994) (523)
- Formal Models for Computer Security (1981) (479)
- Towards an Analysis of Onion Routing Security (2000) (389)
- A Taxonomy of Computer Program Security Flaws, with Examples (1993) (183)
- A security model for military message systems (1984) (181)
- Computer security (2001) (79)
- The Best Available Technologies for Computer Security (1983) (67)
- Security issues in networks with Internet access (1997) (65)
- Does Open Source Improve System Security? (2001) (61)
- On Access Checking in Capability-Based Systems (1986) (54)
- Avoiding the Top 10 Software Security Design Flaws (2014) (48)
- Dependable Computing for Critical Applications 4 (1995) (44)
- Privacy and Cybersecurity: The Next 100 Years (2012) (38)
- A security model for military message systems: retrospective (2001) (28)
- A Survey of Formal Models for Computer Security. (1981) (27)
- Security Analytics and Measurements (2012) (26)
- TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY (1993) (25)
- Protecting unattended computers without software (1997) (24)
- Perspectives on the SolarWinds Incident (2021) (21)
- Privacy research directions (2016) (19)
- Improving Inter-Enclave Information Flow for a Secure Strike Planning Application (1995) (19)
- A practical approach to high assurance multilevel secure computing service (1994) (18)
- Improving Information Flow in the Information Security Market - DoD Experience and Future Directions (2004) (16)
- Overview of Cyber Security: A Crisis of Prioritization (2005) (14)
- Military Message Systems: Requirements and Security Model. (1982) (14)
- Software Systems Engineering programmes a capability approach (2017) (14)
- An Abstract Type for Statistics Collection in Simula (1980) (14)
- Cybersecurity and Artificial Intelligence: From Fixing the Plumbing to Smart Water (2008) (12)
- How Far Can You Trust A Computer? (1993) (12)
- A Formal Statement of the MMS Security Model (1984) (12)
- Hardware Requirements for Secure Computer Systems: A Framework (1984) (12)
- A National Goal for Cyberspace: Create an Open, Accountable Internet (2009) (10)
- 2018: a Big Year for Privacy (2019) (10)
- The next generation of access control models: Do we need them and what should they be? (2001) (9)
- Protection (Security) Models and Policy (1997) (8)
- Developing a blueprint for a science of cybersecurity (8)
- We need a building code for building code (2015) (8)
- Designing secure message systems: the military message systems (MMS) project (1984) (7)
- Executing Trace Specifications Using Prolog. (1986) (7)
- Some lessons from formalizing a security model (1985) (7)
- Designing a Trusted Application Using an Object-Oriented Data Model (1992) (7)
- History of US Government Investments in Cybersecurity Research: A Personal Perspective (2010) (7)
- Autonomous vehicle safety (2020) (6)
- Cyber security and artificial intelligence: from fixing the plumbing to smart water (2008) (6)
- Cybersecurity for Future Presidents: An Interdisciplinary Non-majors Course (2017) (6)
- A building code for building code: putting what we know works to work (2013) (6)
- Database Security, V: Status and Prospects, Results of the IFIP WG 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991 (1992) (6)
- Speaking of Privacy (2006) (5)
- An Approach to Determining Computer Security Requirements for Navy Systems (1985) (5)
- Database Security: Status and Prospects: Proceedings of the IFIP Tc11 4th Working Conference, Halifax, U. K., 18-21 Sept., 1990 (1991) (4)
- Database security, III : status and prospects : results of the IFIP WG 11.3 Workshop on Database Security, Monterey, California, U.S.A., 5-7 September 1989 (1990) (4)
- Reports From Working Groups (1990) (4)
- Green Computing (2005) (4)
- Changing the Puzzle Pieces (2005) (3)
- Performance Studies of the Distributed CPODA Protocol in the Mobile Access Terminal Network. (1979) (3)
- Applying Software Engineering To Protocol Simulation (1981) (3)
- Determining Security Requirements for Complex Systems with the Orange Book (1985) (3)
- Towards an Analysis of Onion Routing (2008) (3)
- Database Security, VIII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994 (1994) (2)
- Privacy, Big Data, and the Public Good: Engineered Controls for Dealing with Big Data (2014) (2)
- User's Manual for the Secure Military Message System M2 Prototype. (1986) (2)
- Database security, VIII : status and prospects : results of the IFIP WG 11.3 Workshop on Database Security, Bad Salzdetfurth, Germany, 23-26 August 1994 (1994) (2)
- Information assurance technology forecast 2005 (2006) (2)
- A Framework for Evaluating Computer Architectures to Support Systems with Security Requirements, with Applications. (1987) (2)
- Agent Safety and Security (1996) (2)
- on Database Security: Status and Prospects (1988) (2)
- Usage statistics for MTS (1975) (2)
- NRL invitational workshop on testing and proving: two approaches to assurance (1986) (2)
- Foundations of Security, Protocols, and Equational Reasoning (2019) (2)
- Database Security: Where are We? (1988) (1)
- Software Engineering Techniques Applied to Protocol Simulation. (1980) (1)
- Grand Challenges for Embedded Security Research in a Connected World (2020) (1)
- Food for Thought: Improving the Market for Assurance (2007) (1)
- IFIP WG 11.3 Database Security: Research Questions of Current Significance (1992) (1)
- New Challenges for the New Year (2007) (1)
- An endogenous priority model for load control in combined batch - interactive computer systems (1976) (1)
- Staff Listing (2012) (1)
- Moving Target [Guest editors' introduction] (2014) (1)
- Cybersecurity : From Engineering to Science Extended (2011) (1)
- Proceedings of the IFIP WG 11.3 Annual Working Conference on Database Security (8th), Held in Bad Salzdetfurth, Germany on 23 - 26 August 1994, (1994) (1)
- Up Scope (2008) (1)
- Security issues in networks with Internet access : Global information infrastructure (1997) (1)
- In Memoriam: Paul Karger (2010) (1)
- NSF activities in Cyber Trust (2003) (1)
- Revolution through Competition? (2007) (1)
- Panel: The next generation of acess control models (panel session): do we need them and what should they be? (2001) (1)
- Database Security, IV: Status and Prospects : Results of the Ifip Wg 11.3 Workshop on Database Security Halifax, U.K., 18-21 September, 1990 (1991) (1)
- Intrusion Tolerant Systems Workshop (2002) (1)
- Best Available Technologies (BATs) for Computer Security (1981) (1)
- An endogenous priority model for load control in combined batch—interactive computer systems (1976) (0)
- . Why Formal Models? (2006) (0)
- Prolog to the Section on Privacy and Cybersecurity (2012) (0)
- An Abstract Type for in SIMULA (1980) (0)
- Chapter 17. Agent Safety and Security (1996) (0)
- Sailing Away! (2010) (0)
- Perspectives on Database Security - Panel Summary (1994) (0)
- Technical correspondence: on nondeterministic programs (1982) (0)
- Technical Correspondence: On Landwehr's “An Abstract Type for Statistics Collection” (1981) (0)
- Chapter 114 : Protection ( security ) models & policy (2003) (0)
- Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects (1993) (0)
- A Taxonnomy of Computer Program Security Flaws , with Examples 5 a (2007) (0)
- 3.3 Validity Checking (2007) (0)
- Database Security, VI: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August 1992 (1993) (0)
- parimod © The par ___allel computer graphics and i_nteractive solid mod ____eling system (0)
- Research Question List, Answers, and Revision (1989) (0)
- Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription (2023) (0)
- Database Security, VII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Lake Guntersville, Alabama, USA, 12-15 September, 1993 (1994) (0)
- Challenges and Recent Advances in Developing Trustworthy Software-Based Systems (2003) (0)
- Oral history interview with Carl E. Landwehr (2014) (0)
- Proceedings of the IFIP WG11.3 Working Conference on Database Security VII (1993) (0)
- Talk delivered at IFIP WCC 2004, Toulouse, France Trusting Strangers: Open Source Software and Security (2011) (0)
- On Access Checking in Capability-Based Systems1 (2006) (0)
- Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, Annapolis, Maryland, USA, October 1987 (1988) (0)
- Trusting strangers: Open source software and security (2004) (0)
- From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion (2003) (0)
- Database security, II : status and prospects : results of the IFIP WG 11.3 Workshop on Database Security, Kingston, Ontario, Canada, 5-7 October, 1988 (1989) (0)
- Research Question List (1990) (0)
- Performance Studies of the Distributed CPODA (2002) (0)
- Das parimod-System (1993) (0)
- Reconsidering the role of the reference monitor [computer system security] (1994) (0)
- Architecture and Components for Data Management Security: NRL Perspective (1997) (0)
- Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects (1991) (0)
- IEEE Computer Society Center for Secure Design Participants (2018) (0)
- Hidden Safety Requirements in Large-Scale Systems (Preprint) (1994) (0)
- Database security, VII : status and prospects : results of the IFIP WG 11.3 Workshop on Database Security, Lake Guntersville, Alabama, U.S.A., 12-15 September, 1993 (1994) (0)
- Results of Workshops on Privacy Protection Technologies (2009) (0)
- How Can We Enable Privacy in an Age of Big Data Analytics? (2016) (0)
- Does program verification help?: how much? (1985) (0)
- Drawing the Line (2010) (0)
- A Building Code for Building Code (2013) (0)
- Discussion Notes and Research Question List (1988) (0)
- Hidden Safety Requirements in Large-Scale Systems (1994) (0)
- Parimod: the parallel computer graphics and interactive solid modeling system (1993) (0)
This paper list is powered by the following services:
Other Resources About Carl Landwehr
What Schools Are Affiliated With Carl Landwehr?
Carl Landwehr is affiliated with the following schools: