Carl Landwehr

Carl E. Landwehr
Born Evanston, Illinois
Citizenship American
Fields Computer science
Institutions Merit Network
Naval Research Laboratory
Mitretek Systems
National Science Foundation
University of Maryland
IARPA
George Washington University
Alma mater Yale
University of Michigan
Thesis Load Sharing in Computer Networks: A Queueing Model (1974)
Doctoral advisor Bernard A. Galler
Known for Computer Security
Notable awards National Cyber Security Hall of Fame Inductee (2012)
IEEE Fellow (2013)
Website
http://www.landwehr.org

Carl E. Landwehr is an American computer scientist whose research focus is cybersecurity and trustworthy computing.[1] His work has addressed the identification of software vulnerabilities toward high assurance software development, architectures for intrusion-tolerant and multilevel security systems, token-based authentication, and system evaluation and certification methods. In an invited essay for ACSAC 2013, he proposed the idea of developing building codes for building software that is used in critical infrastructures.[2] He has been invited to present this idea at various professional meetings[3] and organized an NSF funded workshop to develop a building code and research agenda for medical device software security.[4] The final committee report is available through the Cyber Security and Policy Institute of the George Washington University,[5] and the building code through the IEEE.[6]

Carl Landwehr has developed and led cybersecurity research programs at the National Science Foundation (2001-2004, 2009-2011), IARPA (2005-2009), Mitretek Systems and the Naval Research Laboratory (1982-1999). From 2007 to 2010, he served as Editor-in-Chief of IEEE Security & Privacy Magazine[7] as well as Associate Editor of several IEEE journals. He was a member of DARPA's Information Science and Technology (ISAT) Study Group and has served on several studies for the National Academy of Sciences. Research begun while visiting at the Isaac Newton Institute at Cambridge eventually led to the development of a patent for a secure identification system held by Dr. Landwehr and Daniel Latham.[8] He is the author of several highly cited publications.

Carl Landwehr holds degrees from Yale University (BS) and the University of Michigan (MS,PhD).[9] While at Michigan, he worked for the Merit Network, currently the longest running regional computer network in the United States.[10] He has taught and lectured widely, including at Purdue University, Georgetown University, Virginia Tech University, and the University of Maryland.[11] He is currently a Lead Research Scientist at the Cyber Security Policy and Research Institute (CSPRI) at George Washington University. In 2015 and 2016, Dr. Landwehr was the visiting McDevitt Professor of Computer Science at the McDevitt Center for Creativity and Innovation of LeMoyne College to develop and teach an inter-disciplinary undergraduate course entitled “Cybersecurity for Future Presidents”.[12] Dr. Landwehr joined the Board of Directors of the Center for Democracy and Technology (CDT) in September 2016. [13]

Carl Landwehr was interviewed by Gary McGraw of Cigital for the Silver Bullet podcasts on Security for IEEE discussing changing threats in cybersecurity.[14] He has also been interviewed for the computer history series hosted by the Charles Babbage Institute of the University of Minnesota.[15] For the 30th Anniversary IEEE Symposium on Security and Privacy, he provided a history of U.S. Government investments in cyber security research.[16]

Dr. Landwehr is an IEEE Fellow (2013) and has received various awards, including the ACM SIGSAC's Outstanding Contribution Award (2013)[17] and the National Science Foundation Director's Award for Meritorious Service (2012). He was a member of the founding class (2012) inducted into the National Cyber Security Hall of Fame.[18][19]

References

  1. "Carl Landwehr becomes NSF Trustworthy Computing Director". Institute for Systems Research. 30 November 2009. Retrieved 5 January 2013.
  2. "ACM Digital Library". ACM. 31 December 2013. Retrieved 5 June 2014.
  3. "2014 ASE Big Data Social Computing Conference on Cyber Security at Stanford University". ASE. 28 May 2014. Retrieved 5 February 2015.
  4. "NSF Where Discoveries Begin". NSF. 25 August 2014. Retrieved 5 February 2015.
  5. "Workshop to Develop a Building Code and Research Agenda For Medical Device Software Security" (PDF). GWU. 8 January 2015. Retrieved 5 February 2015.
  6. "Building Code for Medical Device Software Security" (PDF). IEEE. 17 May 2015. Retrieved 17 May 2015.
  7. "Landwehr named editor-in-chief of IEEE Security and Privacy". Institute for Systems Research. 6 July 2006. Retrieved 5 January 2013.
  8. US 5892901, Landwehr, Carl & Daniel Latham, "Secure Identification System", issued 6 April 1999
  9. "Disruptive Technologies for Information Assurance". Dartmouth College Institute for Security, Technology, and Society. Retrieved 5 January 2013.
  10. Merit Network
  11. "Carl Landwehr named IEEE Fellow". Retrieved 15 January 2013.
  12. "McDevitt Center Appoints Endowed Chair and Visiting Professor of Computer Science". Lemoyne College. 5 June 2014. Retrieved 5 February 2015.
  13. "CDT Welcomes Three New Board Members". CDT. 15 September 2016. Retrieved 28 September 2016.
  14. "Show 061 - An Interview with Carl Landwehr". Cigital. 28 April 2011. Retrieved 8 January 2013.
  15. "Oral History Interview with Carl E. Landwehr". 21 April 2014. Retrieved 4 February 2015.
  16. "CS Digital Library Abstract A History of US Government Investments in Cybersecurity Research: A Personal Perspective". IEEE Computer Society. 16–19 May 2010. Retrieved 8 January 2013.
  17. "ACM Special Interest Group on Security, Audit and Control (SIGSAC)". ACM. 31 May 2012. Archived from the original on 2 April 2013. Retrieved 14 January 2013.
  18. "Cyber Security Hall of Fame to induct 11 security pioneers". Infosecurity. 17 September 2012. Retrieved 5 January 2013.
  19. "National Cyber Security Hall of Fame". 6 January 2014. Retrieved 6 January 2014.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.