Cynthia Irvine - Publications

    2014

  1. Michael Thompson and Cynthia E. Irvine, CyberCIEGE Scenario Design and Implementation, USENIX Summit on Gaming, Games, and Gamification in Security Education, San Diego, 18 August 2014.

  2. Cynthia E. Irvine, Want More Women in Cybersecurity? Some Suggestions, Colloquium on Information System Security Education, San Diego, June 2014.
  3. 2013

  4. Thuy D. Nguyen, Mark A. Gondree, Jean Khosalim, and Cynthia E. Irvine, Towards a Cross-Domain MapReduce Framework, Military Communications Conference (MILCOM), San Diego, CA, 18-21 November 2013. accepted

  5. Cynthia Irvine, A Cyberoperations Program, IEEE Security and Privacy Magazine, Vol. 11, No 5, pp. 66 -69. Sept-Oct, 2013.

  6. Nguyen, T. D., Irvine, C. E., and Khosalim, J., A Multilevel Secure MapReduce Framework for Cross-Domain Information Sharing in the Cloud, Ground System Architectures Workshop (GSAW 2013), Los Angeles, California, USA, March 2013.

  7. Jonathan Valamehr, Timothy Sherwood, Ryan Kastner, David Marangoni-Simonsen, Ted Huffmire, Cynthia Irvine, and Timothy Levin, A 3D Split Manufacturing Approach to Trustworthy System Development, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Vol. 32, No. 4, pp 611-615, 2013.

  8. Alec Yasinsac and Cynthia Irvine, Help! Is There a Trustworthy-Systems Doctor in the House?, IEEE Security and Privacy Magazine, Vol. 11, No. 1, pp. 73-77, Jan-Feb 2013.
  9. 2012

  10. Jonathan Valamehr, Ted Huffmire, Cynthia Irvine, Ryan Kastner, K. Koc, Timothy Levin, and Timothy Sherwood. A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors, Cryptography and Security: From Theory to Applications, pp. 364-382. in LNCS No. 6805, David Naccache (ed.), Berlin Heidelberg: Springer-Verlag, March 2012.

  11. Michael Bilzor, Ted Huffmire, Cynthia Irvine, and Tim Levin. Evaluating Security Requirements in a General-Purpose Processor by Combining Assertion Checkers with Code Coverage. Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), San Francisco, CA, June 2012, Pages 49-54.

  12. Thuy Nguyen, Mark Gondree, Jean Khosalim, Timothy Levin, and Cynthia Irvine. An Approach for Cross-Domain Intrusion Deection,. Proceedings of the 7th International Conference on Information Warfare and Security (ICIW 2012), Seattle, WA, March 2012, Pages 203-212.
  13. 2011

  14. Cynthia Irvine,The Value of Capture-the-Flag Exercises in Education: An Interview with Chris Eagle, IEEE Security and Privacy Magazine, Vol 9., No. 6, November/December, 2011, pp. 58-60.

  15. Michael Thompson and Cynthia Irvine. Active Learning and the CyberCIEGE Video Game. 4th Workshop on Cyber Security Experimentation and Test, San Francisco, CA, August 2011.

  16. Ted Huffmire, Timothy Levin, Michael Bilzor, M., and Cynthia Irvine, Security-constrained design of 3-D architectures, 2011 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), San Diego, CA, June 2011.

  17. Ted Huffmire, Timothy Levin, Cynthia Irvine, Ryan Kastner, and Timothy Sherwood. 3-D Extensions for Trustworthy Systems. Proceedings of the International Conference on Engineering of Reconfigurable Systems and Algorithms (ERSA), Las Vegas, NV, July 2011, pp. 45-54.

  18. Michael Bilzor, Ted Huffmire, Cynthia Irvine, and Timothy Levin. Security Checkers: Detecting Processor Malicious Inclusions at Runtime. Proceedings of the International Symposium on Hardware-Oriented Security and Trust (HOST), San Diego, CA, June 2011, pp. 34-39.

  19. Michael Bilzor. 3D Execution Monitor (3D-EM): Using 3D Circuits to Detect Hardware Malicious Inclusions in General Purpose Processors. Best PhD Paper, Proceedings of the International Conference on Information Warfare and Security, Washington, DC, USA, March 2011, pp. 289-298.

  20. Cynthia E. Irvine and J. R. Rao, Guest Editor's Introduction to Special Issue on Engineering Secure Systems, IEEE Security and Privacy Magazine, Vol 9, No. 1, January/Feburary 2011, pp. 18-21.
  21. 2010

  22. Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood, Ryan Kastner, Ted Huffmire, Cynthia Irvine, and Timothy Levin, Hardware assistance for trustworthy systems through 3-D integration, Annual Computer Security Applications Conference (ACSAC), ACM, Dec 2010.

  23. Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine, and Michael McEvilley, SKPP Revisited, in Fourth Annual Layered Assurance Workshop (LAW 2010), Applied Computer Security Associates, December 2010.

  24. Clark, P. C., Cook, G. R., Fisher, E. L., Fulp, J. D., Linhoff, V., Irvine, C. E., New Pathways in Identity Management, IEEE Security and Privacy Magazine, Vol 8, No. 6, November 2010, pp 64-67.

  25. Ted Huffmire, Timothy Levin, Michael Bilzor, Cynthia E. Irvine, Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood, and Ryan Kastner. Hardware Trust Implications of 3-D Integration. Proceedings of the 5th Workshop on Embedded Systems Security (WESS), Scottsdale, AZ, October 2010, Pages 1-10.

  26. Irvine, C. E. and Thompson, M. F., Simulation of PKI-enabled Communication for Identity Management Using CyberCIEGE, Proceedings of the 2010 Military Communications Conference (MILCOM 2010), San Jose, CA, October 2010, pp. 1758-1763.

  27. Nguyen, T. D., Gondree, M. A., Shifflett, D. S., Khosalim, J., Levin, T. E., and Irvine, C. E., A Cloud-Oriented Cross-Domain Security Architecture, Proceedings of the 2010 Military Communications Conference (MILCOM 2010), San Jose, CA, November 2010, pp. 1701-1707.

  28. Irvine, Cynthia E. and Nguyen, Thuy D., Educating the System Security Engineer's Apprentice, IEEE Security and Privacy Magazine, Vol. 8, No. 4, pp. 58-61, July 2010.

  29. Ted Huffmire, Timothy Levin, Thuy Nguyen, Cynthia Irvine, Bret Brotherton. Gang Wang, Timothy Sherwood and Ryan Kastner, Security primitives for reconfigurable hardware-based systems, ACM Transactions on Reconfigurable Technology and Systems (TRETS), Vol. 3, No. 2, pp. 1-35, May 2010. PDF, BibTex

  30. Irvine, C. E., and Palmer, C. C., Call in the Cyber National Guard!, IEEE Security and Privacy Magazine, Vol. 8, No. 1, pp. 56-59, January 2010.

  31. Irvine, C. E., Multilevel Security, in Handbook of Science and Technology for Homeland Security, J. Voller, ed., Wiley-Interscience. 2010.

  32. T. Huffmire, T. Levin, M. Bilzor, C. E. Irvine, J. Valamehr, M. Tiwari, T. Sherwood, and R. Kastner, "Hardware trust implications of 3-d integration," in Proc. of Workshop on Embedded Systems Security (WESS"2010), (Scottsdale, AZ, USA), ACM, 2010.

  33. T. Huffmire, C. Irvine, T. D. Nguyen, T. Levin, R. Kastner, and T. Sherwood, Handbook of FPGA Design Security., 1st ed., July 2010.
  34. 2009

  35. Sami Saydjari and Cynthia E. Irvine, A Tale of Three Cyber-Defense Workshops, IEEE Security and Privacy Magazine, Vol. 7, No. 6, pp. 60-64, November 2009.

  36. C. E. Irvine, T. D. Nguyen, D. J. Shifflett, T. E. Levin, J. Khosalim, C. Prince, P. C. Clark, and M. Gondree, MYSEA: The Monterey Security Architecture, Proc. Workshop on Scalable Trusted Computing (ACM STC), Conference on Computer and Communications Security (CCS), Association for Computing Machinery (ACM), 2009, to appear

  37. T. Levin, J. Dwoskin, G. Bhaskara, T. Nguyen, P. Clark, R. Lee, C. Irvine, and T. Benzel, "Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture," in Trust '09: Proceedings of the 2nd International Conference on Trusted Computing, (L. Chen, C. J. Mitchell, and A. Martin, eds.) Lecture Notes in Computer Science 5471, (Berlin, Heidelberg), pp. 133-152, Springer-Verlag, April 2009. PDF BibTex

  38. Clark, P. C., Levin, T. E., Irvine, C. E., Shifflett, D. J., DNS and Multilevel Security Networks, Architectures and Recommendations, NPS Technical Report NPS-CS-09-004, Naval Postgraduate School, Monterey, CA, February 2009.

  39. T. E. Levin, C. E. Irvine, T. V. Benzel, T. D. Nguyen, P. C. Clark, and G. Bhaskara, "Trusted emergency management," in Proc. Engineering Secure Software and Systems (ESSoS) (F. Massacci, S. T. R. Jr., and N. Zannone, eds.), LNCS 5429, (Berlin), pp. 32-36, ACM/IEEE, Springer-Verlag, February 2009. PDF BibTex
  40. 2008

  41. Levin, T. E., Irvine, C. E., and Nguyen, T. D., "Least Privilege in Separation Kernels," in E-Business and Telecommunication Networks, J. Filipe and M. S. Obaidat, eds., Vol. 9, Communications in Computer and Information Science, Springer-Verlag, 2008.

  42. Irvine, C. E., Levin, T. E., Clark, P. C., and Nguyen, T. D., A Security Architecture for Transient Trust, Computer Security Architecture Workshop, Fairfax, VA, October 2008. PDF BibTex

  43. Huffmire, T. , Brotherton, B., Sherwood, T., Kastner, R., Levin, T., Nguyen, T., and Irvine, C., "Managing Security in the Design of FPGA Based Embedded systems," IEEE Design and Test of Computers, vol 25, No. 6, pp 590-598.

  44. Levin T. E., Irvine, C. E., Benzel T., Nguyen, T. D., Clark, P. C., Bhaskara, G., Trusted Emergency Management, NPS Technical Report NPS-CS-09-001, Naval Postgraduate School, Monterey, CA, September 2008.

  45. Alan Shaffer, Mikhail Auguston, Cynthia Irvine, and Timothy Levin, " A Security Domain Model for Implementing Trusted Subject Behaviors," in Proceedings of the Modeling Security Workshop, Toulouse, France, September 2008. PDF

  46. Alan Shaffer, Mikhail Auguston, Cynthia Irvine, and Timothy Levin, A Security Domain Model for Implementing Trusted Subject Behaviors, NPS-CS-08-015, Naval Postgraduate School, Monterey, CA, September 2008. PDF

  47. Nguyen, T. D., Khosalim, J., Shifflett, D., and Irvine, C. E., Monterey Security Architecture: STOP OS 7 Migration Analysis, NPS-CS-08-013, Naval Postgraduate School, Monterey, CA, July 2008.

  48. Timothy E. Levin, Thuy D. Nguyen, Paul C. Clark, Cynthia E. Irvine, David J. Shifflett, and Timothy M. Vidas, Use of Trusted Software Modules for High Integrity Data Display, NPS-CS-08-012, Naval Postgraduate School, Monterey, CA, June 2008.

  49. Ted Huffmire, Jonathan Valamehr, Timothy Sherwood, Ryan Kastner, Timothy Levin, Thuy D. Nguyen, and Cynthia Irvine, "Trustworthy System Security through 3-D Integrated Hardware," Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST-2008), Anaheim, CA, June 2008. PDF BibTex

  50. Alan Shaffer, Mikhail Augustion, Cynthia Irvine, and Timothy Levin, A Security Domain Model to Assess Software for Exploitable Covert Channels, Proceedings of the ACM SIGPLAN Third Workshop on Programming Languages and Analysis for Security (PLAS'08), Tucson, AZ, June 2008, pp. 45-56. BibTex

  51. Thuy D. Nguyen, Cynthia E. Irvine, and Timothy E. Levin, A Testbed for High Assurance and Dynamic Security}, NPS-CS-08-010, Naval Postgraduate School, Monterey, CA, May 2008. PDF BibTex

  52. Nguyen, T. D., and Irvine, C. E., "Use of Evaluation Criteria in Security Education," in Proc. of the Third International Conference on i-Warfare and Security, (Omaha, NB), April 2008, pp. 285-292. PDF BibTex

  53. Ong, K. L., Nguyen, T. D., and Irvine, C. E., "Implementation of a Multilevel Wiki for Cross-Domain Collaboration," in Proc of the Third International Conference on i-Warfare and Security, (Omaha, NB), April 2008, pp. 293- 304. PDF BibTex

  54. Orwat, M., Levin, T. and C. Irvine, "An Ontological Approach to Secure MANET Management," in Proc. of the Third International Conference on Availability, Security, and Reliability, (Barcelona, Spain), pp. 787-794, Mar. 2008. PDF BibTex
  55. 2007

  56. DeLong, R., Nguyen, T. D., Irvine, C. E., and Levin, T. E., Toward a Medium-Robustness Separation Kernel Protection Profile, Annual Computer Security Applications Conference, Miami Beach, FL, December 2007, pp 40-51.

  57. Clark, Paul C., Irvine, Cynthia E., Levin, Timothy E., Nguyen, Thuy D., Vidas, Timothy M., SecureCore Software Architecture: Trusted Path Application (TPA) Requirements, NPS-CS-07-001, Naval Postgraduate School, December 2007. PDF

  58. Clark, Paul C., Irvine, Cynthia E., Levin, Timothy E., Nguyen, Thuy D., Vidas, Timothy M., Shifflett, David J., SecureCore Software Architecture: SecureCore Operating System (SCOS) Functional Specification, NPS-CS-07-018, Naval Postgraduate School, December 2007. PDF

  59. Shifflett, David J., Clark, Paul C., Irvine, Cynthia E., Nguyen, Thuy D., Vidas, Timothy M., and Levin, Timothy E., Secure Core Software Architectures: Trusted Management Layer (TML) Kernel Extension Module Integration Guide, NPS-CS-07-022, Naval Postgraduate School, December 2007. PDF

  60. Shifflett, David J., Clark, Paul C., Irvine, Cynthia E., Nguyen, Thuy D., Vidas, Timothy M., Levin, Timothy E., SecureCore Software Architecture: Trusted Management Layer (TML) Kernel Extension Module Interface Specification, NPS-CS-07-021, Naval Postgraduate School, December 2007. PDF

  61. Levin, Timothy E., Irvine, Cynthia E., Weissman, Clark, and Nguyen, Thuy D., Analysis of Three Multilevel Security Architectures, Computer Security Architecture Workshop, Fairfax, VA, November 2007, pp. 37-46. PDF

  62. Levin, T. E., Irvine, C. E., Benzel, T. V., Bhaskara, G., Clark, P. C., and Nguyen, T. D., Design Principles and Guidelines for Security, NPS-CS-08-001, Naval Postgraduate School, November 2007. PDF

  63. Timothy E. Levin, Ganesha Bhaskara, Thuy D. Nguyen, Paul C. Clark, Terry V. Benzel, and Cynthia E. Irvine, SecureCore Security Architecture: Authority Mode and Emergency Management, NPS-CS-07-012, Naval Postgraduate School, Monterey, CA, October, 2007. PDF

  64. Shaffer, A., Auguston, M., Irvine, C. and Levin, T. "Toward a Security Domain Model for Static Analysis and Verification of Information Systems." Proceedings of the 7th OOPSLA Workshop on Domain-Specific Modeling (DSM '07). Montreal, Canada. October 2007. pp. 160- 71. To be included in SIGPLAN Compliation CD in 2010.

  65. Huffmire, Ted and Irvine, Cynthia. Field Programmable Gate Array Guidance for Information Systems Security Engineers: Analysis and Recommendations, NPS Technical report NPS-CS-07-009, August 2007.

  66. Irvine, Cynthia and Thompson, Michael, CyberCIEGE: The Information Assurance Training and Awareness Video Game, IA Newsletter, Vol. 10, No. 2, Summer 2007. http://iac.dtic.mil/iatac/download/Vol10_No2.pdf

  67. Chiang, Ken, Nguyen, Thuy D., and Irvine, Cynthia E., "A Linux Implementation of Temporal Access Controls," Proceedings 8th IEEE Systems, Man, and Cybernetics Information Assurance Workshop, West Point, NY, June 2007, pp. 309-316. This work was given the award of Best Paper at the conference. PDF
    Addendum: in Figure 3 yes and no are reversed in the Write request? conditional.

  68. Irvine, Cynthia E. and Levitt, Karl, "Trusted Hardware: Can it Be Trustworthy?," Proc. Design Automation Conference, San Diego, CA, June 2007, pp 1-4. PDF

  69. Huffmire, Ted, Brotherton, Brett, Wang, Gang, Sherwood, Tim, Kastner, Ryan, Levin, Timothy Nguyen, Thuy, and Irvine, Cynthia. Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems, Proc. IEEE Symposium on Security and Privacy, May 2007, Oakland, CA. pp. 281-295. PDF BibTex

  70. Cullum, J., Irvine, C. E., Levin, T. E., "Performance Impact of Connectivity Restrictions and Increased Vulnerability Presence on Automated Attack Graph Generation", ICIW 2007 2nd International Conference on i- Warfare and Security, Monterey, CA, March 2007, pp. 33-46. PDF

  71. Ralph F. Wachter, Louise M. Davidson, Cynthia E. Irvine, Patrick Lincoln, and Stanley Chincheck, "Cyberspace in 2030- A Navy Science and Technology Perspective," SSG XXVI, Office of Naval Research, 21 January 2007.

  72. Cone, Benjamin D., Irvine, Cynthia E., Thompson, Micahel F., and Nguyen, Thuy D., A video game for cyber security training and awareness, Computers and Security, Vol. 26, No. 1, pp. 63-72, 2007. Publisher site
  73. 2006

  74. Nguyen, Thuy D., and Levin, Timothy E., Irvine, Cynthia E., Benzel, Terry V., and Bhaskara, Ganesha, Preliminary Security Requirements for SecureCore Hardware, NPS-CS-06-014, Naval Postgraduate School, Monterey, California, September 2006. PDF

  75. Levin, Timothy E., Irvine, Cynthia E., and Nguyen, Thuy D., An Analysis of Three Kernel-based Multilevel Security Architectures, NPS-CS-06-001, Naval Postgraduate School, Monterey, California, August 2006. PDF

  76. Levin, Timothy E., Irvine, Cynthia E., and Nguyen, Thuy, D., Least Privilege in Separation Kernels, Proceedings International Conference on Security and Cryptography, Setubal, Portugal, August 2006, pp. 355-362.

  77. Bhaskara, Ganesha, Levin, Timothy E., Nguyen, Thuy D., Benzel, Terry V., Irvine, Cynthia E.,and Clark, Paul C., Integration of User Specific Hardware for SecureCore Cryptographic Services, NPS-CS-06-012, Naval Postgraduate School, Monterey, California, July 2006. PDF

  78. Vernon, Richard C., Irvine, Cynthia E., and Levin, Timothy E., "Toward a Boot Odometer", Proceedings from the 7th IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, NY, June 2006. (PDF)

  79. Clark, Paul C., and Irvine, Cynthia E., Levin, Timothy E., and Nguyen, Thuy D., The GIG Information Access Control Policy: An Interpretation, Analysis and Conceptual Design, NPS-CS-06-018, Naval Postgraduate School, Monterey, California, June 2006. This document is not available for download.

  80. Clark, Paul C., Irvine, Cynthia E., Levin, Timothy E., Nguyen, Thuy D., Shifflett, David J., Miller, Donna, Initial Documentation Requirements for a High Assurance System: Lessons Learned, NPS-CS-06-007, Naval Postgraduate School, Monterey, California, February 2006. (PDF)

  81. Nguyen, T. D. and Irvine, C. E., "Utilizing the Common Criteria for Advanced Student Research Projects," 2006, in IFIP International Federation for Information Processing, Volume 201, Security and Privacy in Dynamic Environments, eds. Fischer-Hubner, S., Rannenberg, K., Yngstrom, L., Lindskog, S., (Boston: Springer), pp. 317-328. (PDF)

  82. Cone, B. D., Thompson, M. F., Irvine, C. E. and Nguyen, T. D., "Cyber Security Training and Awareness Through Game Play," 2006, in IFIP International Federation for Information Processing, Volume 201, Security and Privacy in Dynamic Environments, eds. Fischer-Hubner, S., Rannenberg, K., Yngstrom, L., Lindskog, S., (Boston: Springer), pp. 431-436. (PDF)

  83. Irvine, Cynthia E., "What Might We Mean by 'Secure Code' and How Might We Teach What We Mean?", Proceedings Workshop on Secure Software Engineering Education and Training, Oaho, HI, April 2006. (PDF)

  84. Nguyen, Thuy D., Levin, Timothy E., and Irvine, Cynthia E., "High Robustness Requirements in a Common Criteria Protection Profile," Proceedings of the 4th IEEE International Information Asurance Workshop, Royal Holloway, UK, April 2006, pp. 66-75. (PDF)

  85. Barwinski, Mark, Irvine, Cynthia E., and Levin, Timothy E., "Empirical Study of Drive-By-Download Spyware," Proceedings of the International Conference on i-Warfare and Security, Princess Anne, MD, March 2006, pp. 1-12. (PDF)

  86. Nguyen, Thuy D., Irvine, Cynthia E., and Kane, Douglas R., "Using Common Criteria Methodology to Express Informal Security Requirements", Proc. International Symposium on Secure Software Engineering, Arlington, VA, March 2006, pp. 75-85. (PDF)

  87. Levin, Timothy E., Irvine, Cynthia E., and Spyropoulou, Evdoxia, "Quality of Security Service: Adaptive Security," Handbook of Information Security, Volume 3, ed. H. Bidgoli, John Wiley and Sons, Hoboken, NJ, pp. 1016-1025, 2006.

  88. Irvine, Cynthia E., "Security Policy Enforcement," Handbook of Information Security, Volume 3, ed. H. Bidgoli, John Wiley and Sons, Hoboken, NJ, pp 1026-1040, 2006.

  89. Afinidad, Francis, Levin, Timothy, Irvine, Cynthia E., and Nguyen, Thuy D., "A Model for Temporal Interval Authorizations, Hawaii International Conference on System Sciences, Software Technology Track, Information Security Education and Foundational Research, Kauai, Hawaii, January 2006, p. 218 (abstract) full paper on Proceedings CD. (PDF)
  90. 2005

  91. Afinidad, Francis, Irvine, Cynthia E., Nguyen, Thuy D., and Levin, Timothy E., A Time Interval Memory Protection System, NPS-CS-06-002, Naval Postgraduate School, Monterey, California, November 2005. (PDF)

  92. Afinidad, Francis, Levin, Timothy, Irvine, Cynthia E., and Nguyen, Thuy D., "Foundation for a Time Interval Access Control Model", Mathematical Methods, Models, and Architectures for Computer Networks Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings, Lecture Notes in Computer Science, ed. Vladimir Gorodetsky, Igor Kotenko, and Victor Skormin, Springer-Verlag GmbH, Vol. 2685, pp 406-411, St. Petersburg, Russia, Septebmer 24-28, 2005.

  93. Benzel, Terry V., Irvine, Cynthia E., Levin, Timothy E., Bhaskara, Ganesha, Nguyen, Thuy D., and Clark, Paul C., "Design Principles for Security", NPS-CS-05-010, Naval Postgraduate School, Monterey, California, September 2005. (Also Available as ISI-TR-605.)PDF

  94. Irvine, Cynthia E., Thompson, Michael F., and Allen, Ken, "CyberCIEGE: Gaming for Information Assurance, IEEE Security and Privacy, Vol. 3, No. 2, 2005, pp. 64-67.

  95. Clark, Paul C., Irvine, Cynthia E., Levin, Timothy E., Nguyen, Thuy D., Shifflett, David J., Miller, Donna, "Initial Documentation Requirements for a High Assurance System: Lessons Learned", Proceedings from the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, NY, June 2005, pp. 434-435.

  96. Nguyen, Thuy D., Levin, Timothy E., and Irvine, Cynthia E., "MYSEA Testbed", Proceedings from the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, NY, June 2005, pp. 438-439. PDF

  97. Irvine, Cynthia E., Thompson, Michael F., and Allen, Ken, "CyberCIEGE: An Extensible Tool for Information Assurance Education", Proceedings of the 9th Colloquium for Information Systems Security Education, Atlanta, GA, June 2005, pp 130-138. PDF

  98. Irvine, Cynthia E., "Cybersecurity Considerations for Information Systems", Handbook of Public Information Systems, 2nd. Edition, ed. D. Garson, CRC Press, 2005, pp. 203-218. PDF

  99. Nguyen, Thuy D., Levin, Timothy E., and Irvine, Cynthia E., TCX Project: High Assurance for Secure Embedded Systems, Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium, Work in Progress Session, San Francisco, CA, March 2005, pp. 21-25. (Also appeared in SIGBED Review, Vol. 2, No. 2, April 2005, Special Issue on IEEE RTAS 2005 Work-in-Progress, http://www.cs.virginia.edu/sigbed/vol2_num2.html PDF

  100. Irvine, Cynthia E., and Falby, Naomi B., Scholarship for Service: IA Tutorials and Workshops for Educators, Naval Postgraduate School Technical Report, NPS-CS-05-005, Naval Postgraduate School, Monterey, California, March 2005. PDF

  101. Irvine, Cynthia E., A Common Criteria-Based Team Project for High Assurance System Education, Success Through Information Security Knowledge, Proc. Fourth World Conference on Information Security Education, Moscow, Russia, May 2005, pp. 82-93. PDF

  102. Dodge, Catherine, Irvine, Cynthia E., Nguyen, Thuy D., A Study of Initialization in Linux and OpenBSD, Operating Systems Review, Vol. 39, No 2, pp. 79-93. PDF

  103. Irvine, Cynthia E., Thompson, Michael F., and Allen, Ken, CyberCIEGE (TM): An Information Assurance Teaching Tool for Training and Awareness, Proceedings of the 2005 FISSEA Conference, Bethesda, MD, March 2005. PDF

  104. Miller, Donna, Levin, Timothy E., and Irvine, Cynthia E., A Case Study of Wireless Integration into an Enterprise Network, Naval Postgraduatel School Technical Report, NPS-CS-005-004, Naval Postgraduate School, Monterey, CA, January 2005.PDF

  105. Kim, Jong-Kook, Hensgen, Debra A., Kidd, Taylor, Siegel, Howard Jay, St. John, David, Irvine, Cynthia, Levin, Tim, Porter, N. Wayne, Prasanna, Viktor, K., and Freund, Richard F., "A Flexible Multi-dimensional QoS Performance Measure Framework for Distributed Heterogeneous Systems," Cluster Computing, Special Issue on Cluster Computing in Science and Engineering, accepted, to appear. PDF
  106. 2004

  107. Irvine, Cynthia E. and Levin, Timothy E., A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach, Information Security Management, Education and Privacy, ed. Deswarte, Cuppens, Jajodia, and Wang, Kluwer Academic Publishers, Norwell, MA, pp. 173-180, 2004.PDF

  108. Irvine, Cynthia E., Nguyen, Thuy D., and Levin, Timothy E., A High Assurance Testbed for Multilevel Interoperabiity: 2004 Developments, Naval Postgraduate School Technical Report, NPS-CS-05-002, Naval Postgraduate School, Monterey, CA, October 2004. PDF

  109. Levin, Timothy E., Irvine, Cynthia E., and Nguyen, Thuy D., A Least Privilege Model for Static Separation Kernels, Naval Postgraduate School Technical Report, NPS-CS-05-003, Naval Postgraduate School, Monterey, CA, October 2004.PDF

  110. Irvine, Cynthia E., Levin, Timothy E., and Nguyen,Thuy D., Trusted Computing Exemplar: 2004 Developments, Naval Postgraduate School Technical Report, NPS-CS-05-001, Naval Postgraduate School, Monterey, CA, October 2004.PDF

  111. Irvine, Cynthia E., and Thompson, Michael F., Expressing an Information Security Policy Within a Security Simulation Game, in Avoiding Fear, Uncertainty and Doubt, Proceedings of the Sixth Workshop on Education in Computer Security, Monterey, California, July 2004, pp. 43-49.PDF

  112. Irvine, Cynthia E., Levin, Timothy E., Nguyen, Thuy D., and Dinolt, George W., The Trusted Computing Exemplar Project, Proceedings of the 2004 IEEE Systems Man and Cybernetics Information Assurance Workshop, West Point, NY, June 2004, pp. 109-115. PDF

  113. Irvine, Cynthia E., Levin, Timothy E., Nguyen, Thuy D., Shifflett, David, Khosalim, Jean, Clark, Paul C., Wong, Albert, Afinidad, Francis, Bibighaus, David, and Sears, Joseph, "Overview of a High Assurance Architecture for Distributed Multilevel Security," Proceedings of the 2004 IEEE Systems Man and Cybernetics Information Assurance Workshop, West Point, NY, June 2004, pp. 38-45. PDF

  114. Falby, Naomi, Fulp, J.D., Clark, Paul C., Cote, R. Scott, Irvine, Cynthia E., Dinolt, George W., Levin, Timothy E., Rose, Matthew, and Shifflett, Deborah, "Information Assurance Capacity Building: A Case Study," Proceedings of the Colloquium on Information Systems Security Education, pp. 31-36. PDF

  115. Falby, Naomi, Thompson, Michael F., and Irvine, Cynthia, "A Security Simulation Game Scenario Definition Language," Innovative Program Abstracts - Colloquium on Information Systems Security Education, West Point, NY, June 2004, http://www.ncisse.org/CAEabstracts.htm. PDF

  116. Anderson, Emory A., Irvine, Cynthia E., and Schell, Roger R., "Subversion as a Threat in Information Warfare," Journal of Information Warfare, Vol. 3, No. 2, pp 52-65. PDF
  117. 2003

  118. Mohan, Raj, Levin, Timothy E., and Irvine, Cynthia E., An Editor for Adpative XML-Based Policy Management of IPsec, Proceedings of the 19th Computer Security Applications Conference, Las Vegas, NV, December 2003, pp. 276-285. PDF

  119. Irvine, Cynthia E., and Thompson, Michael, "Teaching Objectives of a Simulation Game for Computer Security," Proceedings of Informing Science and Information Technology Joint Conference, Pori, Finland, June 2003, Informing Science Institute, Santa Rosa, California, pp. 779-791.PDF

  120. Clark, Paul C., Levin, Timothy, and Irvine, Cynthia E. Execution Policies: Research and Implementation, NPS-CS-03=003, Naval Postgraduate School, Monterey, CA, February 2003. PDF BibTex

  121. Irvine, Cynthia E., "Teaching Constructive Security", IEEE Security and Privacy, Vol. 1, No. 6, pp 59-61.PDF

  122. "Security Education and Critical Infrastructures," edited with H. Armstrong, Kluwer Academic Publishers, Norwell, MA, 2003.

  123. Rasmussen, Craig, Irvine, Cynthia E., Dinolt, George W., Levin, Timothy, and Burke, Karen L., A Program for Education in Certification and Accreditation, Security Education and Critical Infrastructures, ed. C. Irvine and H. Armstrong, Kluwer Academic Publishers, Norwell, MA, pp 131-149, 2003.PDF

  124. Burke, Karen L, Craig W. Rasmussen, Craig W., Irvine, Cynthia E, Dinolt, George W., Levin, Timothy E., "Certification and Accreditation,: A Program for Practitioner Education," Journal of Information Warfare, Vol. 2, No. 3, 2003, pp. 25-37. PDF

  125. Irvine, Cynthia E., "The SimSecurity Information Assurance Virtual Laboratory," extended abstract for IEEE Symposium on Security and Privacy, Oakland, California, May 2003. PDF

  126. Irvine, Cynthia E., Levin, Timothy, Nguyen, Thuy, and Dinolt, George, "Trusted Computing Exemplar Project," extended abstract for IEEE Symposium on Security and Privacy, Oakland, California, May 2003. PDF

  127. Irvine, Cynthia E., Shifflett, David, Clark, Paul, Levin, Timothy, and Dinolt, George, "MYSEA Technology Demonstration," in Proceedings DISCEX Conference, April 2003, pp. 10-12.

  128. Irvine, Cynthia E., Shifflett, David, Clark, Paul, Levin, Timothy, and Dinolt, George, "Monterey Security Enhanced Architecture Project," in Proceedings DISCEX Conference, April 2003, pp. 176-181.
  129. 2002

  130. Irvine, Cynthia E. and Levin, Timothy, "A Cautionary Note Regarding the Data Integrity Capacity of Certain Secure Systems", Integrity, Internal Control and Security in Information Systems, ed. M. Gertz, E. Guldentops, L. Strous, Kluwer Academic Publishers, Norwell, MA, pp 3-25, 2002.PDF

  131. Irvine, Cynthia E., Levin, Timothy, Wilson, Jeffrey D., Shifflett, David, and Pereira, Barbara, "An Approach to Security Requirements Engineering for a High Assurance System," Requirements Engineering, Vol. 7, No. 4, 2002, pp. 192-208. PDF

  132. Irvine, Cynthia, and Levin, Timothy, "An Extended-OpenBSD Security Architecture: MYSEA," extended abstract for Secure Trusted Operating System Conference '02, Monterey, California, August 2002. PDF

  133. Xie, Geoffrey, Irvine, Cynthia E., and Levin, Timothy, "Quantifying Effect of Network Latency and Clock Drift on Time-Driven Key Sequencing," Proceedings of IEEE First International Workshop on Assurance in Distributed Systems and Networks, Vienna, Austria, July 2002, pp. 35-42.PDF

  134. Spyropoulou, Evdoxia, C. Agar, Christopher, Levin, Timothy E., and Irvine, Cynthia E., "IPsec Modulation for Quality of Security Service", Proceedings of the International Systems Security Engineering Conference, Orlando, FL, March 2002.PDF

  135. Irvine, Cynthia E., Levin, Timothy E., and Dinolt, George W., "Diamond High Assurance Security Program: Trusted Computing Exemplar,"Naval Postgraduate School Technical Report, NPS-CS-02-004, Naval Postgraduate School, Monterey, CA, September 2002. PDF

  136. Spyropoulou, E., Levin, T., and Irvine, C., "Demonstration of Quality of Security Service Awareness for IPsec," Naval Postgraduate School Technical Report, NPS-CS-02-005, Naval Postgraduate School, Monterey, CA, September 2002. PDF

  137. Irvine, Cynthia E., Levin, T., Dinolt, G.W., Protected Domains for Cyber Infrastructure Management," NPS-CS-02-007, Naval Postgraduate School, Monterey, CA, October 2002. PDF

  138. Irvine, Cynthia E., Shifflett, David, Clark Paul C., Levin, Timothy E., and Dinolt, George W., "MYSEA Security Architecture," Naval Postgraduate School Technical Report, NPS-CS-02-006, Naval Postgraduate School, Monterey, CA, May 2002. PDF

  139. Irvine, Cynthia E., Levin, Timothy, Dinolt, George W., "A National Trusted Computing Strategy" Naval Postgraduate School Technical Report, NPS-CS-02-003, Naval Postgraduate School, Monterey, CA, May 2002. PDF

  140. Spyropoulou, E., Levin, T., and Irvine, Cynthia E., "Keynote Policy Files and Conversion to Disjunctive Normal Form for Use in IPsec," Naval Postgraduate School Technical Report, NPS-CS-02-001, Naval Postgraduate School, Monterey, CA, January 2002. PDF
  141. 2001

  142. Irvine, Cynthia E., and Levin, Timothy E., Spyropoulou, Evdoxia, and Allen, Bruce, "Security as a Dimension of Quality of Security Service", Proceedings of the Active Middleware Services Workshop, August 2001, San Francisco, CA, pp 87-93.PDF

  143. Irvine, Cynthia E., and Levin, Timothy E., "Teaching Security Engineering Principles," Proceedings Second World Conference on Information Security Education, Perth, Australia, July 2001, pp. 113-127.PDF

  144. Spyropoulou, Evdoxia, Irvine, Cynthia E., Levin, Timothy E., and Allen, Bruce, "Managing Costs and Variability of Security Services," extended abstract for IEEE Symposium on Security and Privacy, Oakland, California, May 2001. PDF

  145. Irvine, Cynthia E., and Levin, Timothy E., "Overview of Quality of Security Service," extended abstract for IEEE Symposium on Security and Privacy, Oakland, California, May 2001. PDF

  146. VanPutte, Michael, Irvine, Cynthia E., and Hiles, John, "Distance Learning and Virtual Laboratory for Information Assurance," extended abstract for IEEE Symposium on Security and Privacy, Oakland, California, May 2001. PDF

  147. Kim, J.-K., Kidd, T., Siegel, H. J., Irvine, C., Levin, T., Hensgen, D. A., St. John, D., Prasanna, V. K., Freund, R. F., and Porter, N. W., "Collective Value QoS: A Performance Measure Framework for Distributed Heterogeneous Networks," Proceedings of the 15th International Parallel and Distributed Processing Symposium (IPDPS 2001), 10th Heterogeneous Computing Workshop (HCW 2001), San Francisco, California, April 2001, pp. 810-823.PDF

  148. Irvine, Cynthia E., Levin, Timothy, Wilson, Jeffrey D., Shifflett, David, and Pereira, Barbara, "A Case Study in Security Requirements Engineering for a High Assurance System," Proceedings of the 1st Symposium on Requirements Engineering for Information Security, Indianapolis, Indiana, March 2001.PDF

  149. Irvine, Cynthia E., and Levin, Timothy, "Data Integrity Limitations in Highly Secure Systems," Proceedings of the International Systems Security Engineering Conference, Orlando, FL, February 2001. PDF
  150. 2000

  151. Irvine, Cynthia E., "Security Issues for Automated Information Systems," Handbook of Public Information Systems, ed. D. Garson, Marcel Dekker, Inc., New York, NY, pp.231-245, 2000.PDF

  152. Sypropoulou, Evdoxia, Levin, Timothy, and Irvine, Cynthia E., "Calculating Costs for Quality of Security Service," in Proceedings of the 16th Computer Security Applications Conference, New Orleans, LA, December 2000, pp. 334-343.PDF

  153. Irvine, Cynthia E. and Levin, Timothy, "Data Integrity Limitations in Hybrid Security Architectures," Naval Postgraduate School Technical Report, NPS-CS-00-008, Naval Postgraduate School, Monterey, CA, December 2000. PDF

  154. Balmer, Steven R., and Irvine, Cynthia E. "Analysis of Terminal Server Architectures for Thin Clients in a High Assurance Network," Proceedings of the National Information Systems Security Conference, Baltimore, MD, October 2000, pp 192-202. This paper was given the award of Best Paper at the conference.PDF

  155. Irvine, Cynthia E., and Levin, Timothy, "Quality of Security Service," Proceedings of the New Security Paradigms Workshop, Ballycotton, Ireland September 2000, pp. 91-99. (Reprinted in the Proceedings of the National Information Systems Security Conference, Baltimore, MD, October 2000, CD version).PDF

  156. Robin, J. Scott, and Irvine, Cynthia E., "Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor," Proceedings of the 9th Usenix Security Symposium, Denver, CO, August, 2000, pp.129 - 144. PDF

  157. Xie, G.G., Irvine, C. and Levin, T., Conditions for time-driven key sequencing, NPS-CS-00-001, Naval Postgraduate School, Monterey, California, August 2000.

  158. Irvine, Cynthia E. and Levin, Timothy, "Toward Quality of Security Service in A Resource Management System Benefit Function," Proceedings of the 2000 Heterogeneous Computing Workshop, Cancun, Mexico, May 2000, pp.133-139. PDF

  159. Irvine, Cynthia E., and Levin, Timothy, "Is Electronic Privacy Achievable?", Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2000, pp.76-77. (refereed panel) PDF

  160. Irvine, Cynthia E., "Security: Where Testing Fails," ITEA Journal, June 2000, pp.53-57. PDF

  161. Kim, Jong-Kook, Hensgen, Deborah A., Kidd, Taylor, Siegel, Howard J., St. John, David, Irvine, Cynthia E., Levin, Timothy, Prasanna, Viktor K., and Freund, Richard F., "A QoS Performance Measure Framework for Distributed Heterogeneous Networks," Proceeding of EuroMicro-PDP, Rhodos, Greece , January 2000, pp. 18 - 27. PDF

  162. Irvine, Cynthia and Levin, Timothy, "The Effects of Security Choices and Limits in a Metacomputing Environment," Naval Postgraduate School Technical Report, NPS-CS-00-004, Naval Postgraduate School, Monterey, CA, April 2000. PDF

  163. Irvine, Cynthia and Levin, Timothy, "Quality of Security Service: An Introduction," Naval Postgraduate School Technical Report, NPS-CS-00-005, Naval Postgraduate School, Monterey, CA, April 2000. PDF

  164. Irvine, Cynthia, Howard J. Seigel, Viktor Prasanna, Debra Hensgen, Levin, Timothy, "Management System for Heterogeneous Networks Final Report, Volume I: Project Summary and Papers," Naval Postgraduate School Technical Report, NPS-CS-00-006, Naval Postgraduate School, Monterey, CA, April 2000. PDF

  165. Spyropoulou, Evdoxia, Levin, Timothy, and Irvine, Cynthia, "Quality of Security Service Costing Demonstration for the MSHN Project," Naval Postgraduate School Technical Report, NPS-CS-00-007, Naval Postgraduate School, Monterey, CA, April 2000. PDF
  166. 1999

  167. Irvine, Cynthia E., "The Reference Monitor Concept as a Unifying Principle in Computer Security Education," Bezopasnost Information Technology, Moscow, No 4, 1999, pp. 31-36.

  168. Irvine, Cynthia E., "Amplifying Security Education in the Laboratory," Bezopasnost Information Technology, Moscow, No 4, 1999, pp.36-40.

  169. Irvine, Cynthia E., and Levin, Timothy, "Toward a Taxonomy and Costing Method for Security Services," Proceedings of the 15th Computer Security Applications Conference, December 1999, pp. 183-188, Scottsdale, AZ. PDF

  170. Irvine, Cynthia E., "The Reference Monitor Concept as a Unifying Principle in Computer Security Education," Proceedings of the First World Conference on Information Systems Security Education, Stockholm, Sweden, pp.27-37, June 1999. PDF

  171. Irvine, Cynthia E., "Amplifying Security Education in the Laboratory," Proceedings of the First World Conference on Information Systems Security Education, Stockholm, Sweden, pp. 139-146, June 1999. PDF

  172. Jong-Kook Kim, Debra A. Hensgen, Taylor Kidd, Howard Jay Siegel, David St. John, Cynthia Irvine, Tim Levin, N. Wayne Porter, Viktor K. Prasanna, and Richard F. Freund, "QoS Measure Framework for Distributed Heterogeneous Networks," The Fourth Midwest Meeting on High Performance Systems, Ann Arbor, MI, May 1999.

  173. Isa, H.R., Shockley, W. R., and Irvine, Cynthia E., "A Multi-threading Architecture for Multilevel Secure Transaction Processing," Proceedings of 1999 Symposium on Security and Privacy , Oakland, California, pp. 166-180, May 1999. PDF

  174. Irvine, Cynthia E., "The Benefits of Student Research in Information Systems Security Education," Proceedings of the 1999 National Colloquium on Information Systems Security Education, Palisades, NY, May 1999. PDF

  175. Balmer, Steven, Bryer-Joyner, Susan, Eads, Bradley, Heller, Scott D., Irvine, Cynthia E. "High Assurance Multilevel Secure Mail Service: Session Server and IMAP Server" extended abstract, distributed as part of 5-minute talks at IEEE Symposium on Security and Privacy, Oakland, California, May 1999. PDF

  176. Irvine, Cynthia E. and Levin, Timothy, "Security Approach for a Resource Management System," extended abstract distributed as part of 5-minute talks at IEEE Symposium on Security and Privacy, Oakland, California, May 1999. PDF

  177. Hensgen, D., Kidd, T., St. John, D., Schnaidt, M.C., Siegel, H. J., Braun, T., Maheswaran, M., Ali, S., Kim, J-K, Irvine, Cynthia E., Levin, Timothy, Freund, R.F., Kusso, M., Godfrey, M., Duman, A., Carff, P., Kidd, S., Prasanna, V., Bhat, P, Alhusaini, A., "An Overview of the Management System for Heterogeneous Networks (MSHN)," Proceedings of the 8th Workshop on Heterogeneous Computing Systems (HCW '99), San Juan, Puerto Rico, pp. 184-198, April 1999. PDF

  178. Levin, Timothy, and Irvine, Cynthia E., "Quality of Security Service in A Resource Management System Benefit Function," Naval Postgraduate School Technical Report, NPS-CS-00-02, Naval Postgraduate School, Monterey, California November 1999. PDF

  179. Irvine, Cynthia E., and Levin, Timothy, "A Note on Mapping User-Oriented Security Policies to Complex Mechanisms and Services," Naval Postgraduate School Technical Report, NPS-CS-99-008, Naval Postgraduate School, Monterey, California June 15, 1999. PDF

  180. Irvine, Cynthia E. and Levin T., "Toward a Taxonomy and Costing Method for Security Services," NPS-CS-99-007, Naval Postgraduate School, Monterey, California 15 June 1999. PDF

  181. Levin, Timothy, and Irvine, Cynthia E., "An Approach to Characterizing Resource Usage and User Preferences in Benefit Functions," NPS-CS-99-005, Naval Postgraduate School, Monterey, California June 15, 1999. PDF
  182. Xie, G., Irvine, C., and Colwell, C., A Protocol for High Speed Packet Authentication, NPS-CS-99-001, Naval Postgraduate School, Monterey, California, 1999.
  183. 1998

  184. Irvine, Cynthia E., Chin, Shu-Kai, and Frinke, Deborah., "Integrating Security into the Curriculum", IEEE Computer, Vol 31, No 12, 1998, pp.25-30. PDF

  185. Wright, R.E., Shifflett, D.J., and Irvine, Cynthia E., "Security for a Virtual Heterogeneous Machine," Proceedings of the Fourteenth Computer Security Applications Conference, Scottsdale, AZ, pp. 167-177, December 1998. PDF

  186. Irvine, Cynthia E., Anderson, J.P., Robb, D.A., and Hackerson, J., "High Assurance Multilevel Services for Off-The-Shelf Workstation Applications," Proceedings of the National Information Systems Security Conference, Crystal City, VA, pp.421-431, October 1998. PDF

  187. Irvine, Cynthia E. and Shockley, William R., "Roundhouse: A Security Architecture for Active Networks," Naval Postgraduate School Technical Report, NPSCS-98-002, Naval Postgraduate School, Monterey, California, May 1998. PDF

  188. Irvine, Cynthia E., "NPS CISR Annual Report," June 1998.
  189. 1997

  190. Chin, Shu-Kai, Irvine, Cynthia E., and Frinke, Deborah, "An Information Security Education Initiative for Engineering and Computer Science," Naval Postgraduate School Technical Report, NPSCS-97-003, Naval Postgraduate School, Monterey, California, December 1997. PDF

  191. Irvine, Cynthia E., "Computer Security Education Challenges," IEEE Software, Vol 14, No. 5, September 1997, pp.110-111. PDF

  192. Volpano, Dennis, and Irvine, Cynthia E., "Secure Flow Typing," Computers and Security, Vol 16, No.2, 1997, pp.137-144. PDF
  193. Irvine, Cynthia E., "The First ACM Workshop on Education Computer Security," ACM SIGSAC Review, Vol. 15, No. 2, pp.3-5, 1997. PDF

  194. Irvine, Cynthia E., "Naval Postgraduate School Center for INFOSEC Studies and Research: Teaching the Science of Computer Security," MILCOM Proceedings (unclassified), Monterey, California, November 1997. PDF

  195. Irvine, Cynthia E., Warren, D.F., and Clark, P.C., "The NPS CISR Graduate Program in INFOSEC: Six Years of Experience," Proceedings of the 20th National Information Systems Security Conference, Baltimore, MD, pp.22-30, October 1997. PDF

  196. Irvine, Cynthia E., "Security in Innovative New Operating Systems," Proceedings IEEE Symposium on Security and Privacy, May 1997, pp. 202-203. (referred panel) PDF

  197. Irvine, Cynthia E., Warren, D. F., and Stemp, R., "Teaching Computer Security at a Department of Defense University," NPS-CS-97-002, April 1997. PDF
  198. 1996

  199. Volpano, Dennis., Smith, Geoff. and Irvine, Cynthia E., "A Sound Type System for Secure Flow Analysis," Journal of Computer Security, Vol 4, No. 3, 1996, pp. 1-21. PDF

  200. Currie, D. and Irvine, Cynthia E., "Surmounting the Effects of Lossy Compression on Steganography ," Proceedings of the 19th National Information System Security Conference , Baltimore, pp. 194-201, Md, October 1996. PDF

  201. Irvine, Cynthia E., "NPS CISR Annual Report," December 1996.

  202. Irvine, Cynthia E., "Goals for Computer Security Education," Proceedings 1996 IEEE Symposium on Security and Privacy, Oakland, CA, pp.24-25, May 1996. (refereed panel) PDF
  203. 1995

  204. Irvine, Cynthia E., "A Multilevel File System for High Assurance," Proceedings 1995 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 78-87, May 1995. PDF

  205. Irvine, Cynthia E., and Volpano, D., "A Practical Tool for Developing Trusted Applications," in Proceedings of the 11th Computer Security Applications Conference, New Orleans, LA, pp. 190-195, December 1995. PDF
  206. 1988-1994

  207. Schell, Roger R. and Irvine, Cynthia E., "Future Roles for Balanced Assurance in Trusted Database Management Systems," Proceedings of the 5th RADC Database Security Workshop, October 1992.

  208. Irvine, Cynthia E., Schell, Roger R. and Thompson, Michael F., "Using TNI Concepts for Near-Term Use of High Assurance Database Management Systems," Proceedings of the 4th RADC Database Security Workshop, Little Compton, RI, April 1991.

  209. Irvine, Cynthia E., Schell, Roger R. and Vetter, Linda, "Architecture for an Embedded Secure Database Management System," Proceedings of the 6th Annual Computer Applications Conference, Tucson, AZ, December 1990. PDF

  210. Irvine, Cynthia E., and Towle, Bradley S., "Embedded Secure Database Management System," RADC-TR-90-439, Rome Air Development Center, Griffiss AFB, December 1990,

  211. Irvine, Cynthia E., Acheson, T.B. and Thompson, M.F., "Building Trust into a Multilevel File System," Proceedings of the 13th National Computer Security Conference, pp. 450-459, October 1990, Washington, DC. PDF

  212. Schell, R.R. and Irvine, Cynthia E., "Performance Implications for Multilevel Database Systems," Proceedings of the 3rd RADC Database Security Workshop, June 1990, Castile, NY.

  213. Irvine, Cynthia E., and Acheson, Todd B., "Factors Affecting Software Ports to the GEMSOS Environment," Technical Note, GCI-89-03-01, July 1989.

  214. Levin, Timothy, Padilla, S. and Irvine, Cynthia E., "A Formal Model for UNIX SETUID," Proceedings of the IEEE Conference on Security and Privacy, pp.78-83, May 1989, Oakland, CA. (PDF)

  215. Irvine, Cynthia E., and Levin, Tim, An Analysis for Class A1 Certification of the Multilevel Secure UNIX Workstation, Technical Report GCI-89-0601, ICS Division, Gemini Computers, Carmel, CA, April 1989.

  216. Irvine, Cynthia E., Thompson, M.F., Schell, R.R., Tao, T.F., Lessin, R.E., Wopat, J.R., and BenArieh, E., "Genesis of a Secure Application: A Multilevel Secure Message Preparation Workstation Demonstration", Proceedings of the 4th Aerospace Security Applications Conference, December 1988, Orlando, FL.
  217. 1987 and Earlier

  218. Irvine, Cynthia E., "V1302 Aquilae (IRC +10420)," I.A.U. Circ., No. 4286, 1986.

  219. Irvine, Cynthia E., "Optical and Near Infrared Changes in IRC +10420," Bull. Amer. Astron. Soc., 18, 961, 1986.

  220. Irvine, Cynthia E., and Bergez, J., "An Astronomy Outreach Program for Grades 4, 5, and 6," Bull. Amer. Astron. Soc., 18, 1000, 1986.

  221. Irvine, Nelson J., and Irvine Cynthia E., "SIRTF, Space Infrared Telescope Facility" for NASA-Ames Research Center, 1985.

  222. Irvine, Cynthia E., and Bergez, John, "Mission to Mars: A Classroom Activities Manual," Monterey Institute for Research in Astronomy, 1984.

  223. Irvine, Nelson J., and Irvine, Cynthia E., "The Oliver Observing Station: MIRA's New Observatory," Bull. Amer. Astron. Soc., 15, 998, 1983.

  224. Chester, Craig, Irvine, Cynthia E., Irvine, Nelson J., Merville, Al, Ross, H., and Weaver, W.B., "MIRA, A Status Report," Bul. Amer. Astron. Soc., 11, 631, 1980.

  225. Irvine, Cynthia E., "Astronomy and Astrophysics," Academic American Encyclopedia, ed. S. J. Foderaro, Arete Publishing Co., Princeton, NJ, Vol 2, p. 281, 1980.

  226. Irvine, Cynthia E., "Astronomical Maps and Catalogs," Academic American Encyclopedia, ed. S. J. Foderaro, Arete Publishing Co., Princeton, NJ, Vol 2, p. 276, 1980.

  227. Irvine, Cynthia E., "Faint Object Detection," Academic American Encyclopedia, ed. S. J. Foderaro, Arete Publishing Co., Princeton, NJ, Vol 8, p. 8, 1980.

  228. Irvine, Cynthia E., "Infrared Astronomy," Academic American Encyclopedia, ed. S. J. Foderaro, Arete Publishing Co., Princeton, NJ, Vol 11, p. 175, 1980.

  229. Irvine, Cynthia E., "Astronomical Photometry," Academic American Encyclopedia, ed. S. J. Foderaro, Arete Publishing Co., Princeton, NJ, Vol 15, p. 274, 1980.

  230. Irvine, Cynthia E., "X-ray Galaxies," Academic American Encyclopedia, ed. S. J. Foderaro, Arete Publishing Co., Princeton, NJ, Vol 20, p. 309, 1980.

  231. Irvine, Nelson J., and Irvine, Cynthia E., "Suspected Variability and Line Emission in Early-Type Stars," Publ. Astron. Soc. Pacific, 91, 105, 1979.

  232. Irvine, Cynthia E., "Application of Acoustic Signal Processing Techniques to Seismic Data," NPS-52IR77061, Naval Postgraduate School, Monterey, California, 1977.

  233. Irvine, Nelson J., and Irvine, Cynthia E.," A New Optical Supernova Remnant in Centaurus," Astrophys, Journal Letters, 192, L111, 1974.

  234. Irvine, Cynthia E., and Titter, John C., Exposure Eliminator--A Serendipitous Discovery, The Observatory, No. 1000, 1974.

  235. Bidelman, William P., and Irvine, Cynthia E., "On the Identification of an Unidentified Feature in CS Stars," Bul. Amer. Astron. Soc., 6, 365, 1974.

  236. Irvine, Cynthia E., and Irvine, Nelson J.,"He II Line Profile Variations in the Wolf-Rayet Start EZ CMa," Publ. Astron. Soc. Pacific, 85, 506, 1973.
  237. Newspaper Articles

  238. Irvine, Cynthia E., "New Observatory Rising to the Stars," Monterey Peninsula Herald, January 1, 1984.

  239. Irvine, Cynthia E., "Intelligent Life Beyond Earth," MIRA Newsletter, 6, No 2, 1983.

  240. Irvine, Cynthia E., "The Big Bang and Cosmic Radiation," Monterey Peninsula Herald, September 9, 1983.

  241. Irvine, Cynthia E., "Women in the Field of Astronomy," Monterey Peninsula Herald, June 26, 1983.

  242. Irvine, Cynthia E., "Sir Arthur Eddington--Author, Scientist," Monterey Peninsula Herald, December 26, 1982.

  243. Irvine, Cynthia E., "Gregorian Calendar is 400 Years Old," Monterey Peninsula Herald October 26, 1982.

  244. Experiencing Science, by Jeremy Bernstein , book review, for The Humanist, 1982.

  245. Irvine, Cynthia E., "Planetary Nebulae: Tombstones in the Sky," Monterey Peninsula Herald, 1982.

  246. Irvine, Cynthia E., "Excitement Over a Lot of Nothing," Monterey Peninsula Herald, December 27, 1981 (Interstellar Matter).

  247. Irvine, Cynthia E. and Irvine, N. J., "Stars in Their Eyes," Monterey Life, November 1981, p. 66.

  248. Irvine, Cynthia E., "The 'Evil Eye' that Stars in the Heavens," Monterey Peninsula Herald, September 27, 1981 (Algol).

  249. Irvine, Cynthia E., "Scientists View the Dark Spots in the Heavens," Monterey Peninsula Herald, July 5, 1981 (Interstellar Matter).

  250. Irvine, Cynthia E., "Astronomer's Notebook--More on the Big Bang," MIRA Newsletter, 4, No. 1, 7, 1981.

  251. Irvine, Cynthia E., "What is MIRA Anyway? From Cleveland to Monterey," MIRA Newsletter, 4, No. 1, 5, 1981.

  252. Irvine, Cynthia E., "The Death of a Star in 1054," Monterey Peninsula Herald, January 4, 1981 (Crab Nebula).

  253. Irvine, Cynthia E., "Sunspots Spoiled Ancient Theory of 'Perfect' Sun," Monterey Peninsula Herald, August 31, 1980 (Maunder Minimum).

  254. Irvine, Cynthia E., "Double Hubble Troubles Universe," Monterey Peninsula Herald, April 27, 1980 (Extra-galactic distance scale).

  255. Irvine, Cynthia E., "Changing Views on the Origin of the Universe," Monterey Peninsula Herald, March 30, 1980.

  256. Irvine, Cynthia E., "It Wasn't Easy for February to Get that Extra Day," Monterey Peninsula Herald, February 3, 1980.

  257. Irvine, Cynthia E., "Great Nebula is Month's Display," Monterey Peninsula Herald, September 2, 1979 (M31, The Andromeda Galaxy).

  258. Irvine, Cynthia E., "A Star called Mira," MIRA Newsletter, Winter 1978.

  259. Demonstrations and Presentations

  260. Cynthia E. Irvine and David Shifflett, "High Assurance Multilevel Secure LAN", system demonstration Navy MSL/MLS Workshop, Norfolk, VA, May 2001.

  261. Irvine, Cynthia E., Levin, Timothy, and Spyropoulou, Evdoxia, "Security Costing Demonstration," system demonstration at DARPA Quorum Program Principal Investigator Meeting, Seattle, WA, May 2000.

  262. Xie, Geoffrey, Cowell, Cary, and Irvine Cynthia E., "LLPA: high speed link layer packet authentication" Proceedings of Annual IEEE Gigabits Networking Workshop (GBN'99), New York City, NY, March 1999. PDF

  263. Material contained herein is made available for the purpose of peer review and discussion and does not necessarily reflect the views
    of the Department of the Navy or the Department of Defense.
    Last modified: February 2015