Travelled to:
4 × USA
Collaborated with:
L.Robinson R.J.Feiertag C.E.Irvine R.J.Waldinger D.A.Frincke M.Archer B.A.Silverberg P.G.Neumann J.H.Wensley M.W.Green R.E.Shostak
Talks about:
system (2) design (2) secur (2) trustworthi (1) multilevel (1) algorithm (1) approach (1) special (1) softwar (1) simulat (1)
Person: Karl N. Levitt
DBLP: Levitt:Karl_N=
Contributed to:
Wrote 7 papers:
- DAC-2007-IrvineL #hardware #question
- Trusted Hardware: Can It Be Trustworthy? (CEI, KNL), pp. 1–4.
- KBSE-1991-FrinckeAL #algorithm #approach #automation #concurrent #detection #named
- CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms (DAF, MA, KNL), pp. 151–160.
- FM-1979-LevittRS #specification
- Writing Simulatable Specifications in SPECIAL (KNL, LR, BAS), pp. 39–78.
- SOSP-1977-FeiertagLR #design #multi #proving #security
- Proving Multilevel Security of a System Design (RJF, KNL, LR), pp. 57–65.
- ICSE-1976-NeumannFLR #development #multi #proving #security
- Software Development and Proofs of Multi-Level Security (PGN, RJF, KNL, LR), pp. 421–428.
- ICSE-1976-WensleyGLS #analysis #design #fault tolerance #verification
- The Design, Analysis, and Verification of the SIFT Fault-Tolerant System (JHW, MWG, KNL, RES), pp. 458–469.
- POPL-1973-WaldingerL #reasoning #source code
- Reasoning About Programs (RJW, KNL), pp. 169–182.