Articles and Papers

Here is a list of articles and papers I have produced. Where possible, I include a link to the paper. If there are co-authors, they are listed at the end of the entry.

ACM Digital Library - Author R. E. SmithThe ACM Digital Library also provides a  list of my publications. The list is less complete, but includes downloadable citations in multiple formats, citation lists, and related minutia.

Peer Reviewed Professional Writings

“A Contemporary Look at Saltzer and Schroeder’s 1975 Design Principles,” Security & Privacy, IEEE , vol.10, no.6, pp.20-25, Nov.-Dec. 2012. An extended preprint is available online.

“Boundaries and flows: a strategy for introducing information security to undergraduates” (PDF), Proceedings of the 2008 Annual Conference of the American Society of Engineering Education, Pittsburgh, PA, June 22-24, 2008.

“Trends in Security Product Evaluations (PDF), Information Systems Security 16 (4), 2007.

“A spreadsheet-based simulation of CPU instruction execution (PDF)“, Proceedings of the 2007 American Society of Engineering Education Conference, Honolulu, HI, June 2007. I have posted additional information on Spreadsheet CPU (SSCPU) on this site.

“Multilevel Security,” Chapter 205 in Handbook of Information Security, Volume 3, Threats, Vulnerabilities, Prevention, Detection and Management, Hossein Bidgoli, ed., ISBN 0-471-64832-9, John Wiley, 2006. A similar introduction to multilevel security is available online.

“Cost Profile of a Highly Assured, Secure Operating System” (PDF)ACM Transactions on Information and System Security (TISSEC), 2001.

“Experimenting with Security Policy,” Proc. DARPA Information Survivability Conference and Exposition II, IEEE Computer Society Press, 2001.

“A Releasable Data Products Framework,” Proc. DARPA Information Survivability Conference and Exposition II, IEEE Computer Society Press, 2001 (with Charles Payne).

“Trends in Government Endorsed Security Product Evaluations” (PDF)Proc. 22nd National Information Systems Security Conference, 2000.

“Using Type Enforcement to Assure a Configurable Guard,” Proc. 13th Annual Computer Security Applications Conference, December 1997 (with Paula Greve and John Hoffman).

“Mandatory Protection for Internet Server Software” (PDF), Proc. 12th Annual Computer Security Applications Conference, December 1996.

“Securing Client/Server TCP/IP,” Chapter 8 of Securing Client/Server Computer Networks, Peter Davis, ed., ISBN 0-07-015841-X, McGraw-Hill, 1996.

“Constructing a High Assurance Mail Guard” (PDF), Proc. 17th National Computer Security Conference, 1994.

“High Assurance Multilevel Data Sharing with LOCKServer,” Proc. 11th Annual Computer Security Applications Conference, 1993.

“Error management for robot programming,” Journal of Intelligent Manufacturing, vol. 2, 1991, (with Maria Gini).

“A Historical Overview of Computer Architecture,” Annals of the History of Computing, vol. 10, no. 4, 1988.

“Reliable Real-Time Robot Operation Employing Intelligent Forward Recovery,” Journal of Robotic Systems, vol. 3, no. 3, Fall 1986, pp. 281-300 (with Maria Gini).

“Monitoring Robot Actions for Error Detection and Recovery,” Proc. Workshop on Space Telerobotics, NASA Jet Propulsion Laboratory, 1987. (with Maria Gini).

“Robot Tracking and Control Issues in an Intelligent Error Recovery System,” Proc. 1986 IEEE International Conference on Robotics and Automation, San Francisco, CA, April 1986. (with Maria Gini).

“The Role of Knowledge in the Architecture of a Robust Robot Control,” Proc. 1985 IEEE International Conference on Robotics and Automation, St. Louis, MO, March 1985. (with M. Gini, R. Doshi, M. Gluch, and I. Zualkernan).

Other Professional Writing

“How Authentication Technologies Work,” Chapter 1 of Biometrics: Identity Assurance in the Information Age, John Woodward, ed., ISBN 0-07-222227-1,McGraw-Hill, 2003.

“A Curricular Strategy for Information Security Engineering,” Proceedings of the 2007 ASEE North Midwest Sectional Conference, September 22, 2007, Houghton, MI.

“Extending the Spreadsheet to Illustrate Basic CPU Operations in a Computer Literacy Course”, Proceedings of the 2006 ASEE North Midwest Regional Conference, University of Wisconsin- Milwaukee, October 7-9, 2006. I have posted additional information on Spreadsheet CPU (SSCPU) on this site.

“Crypto Alphabet Soup: Making Sense of Today’s Algorithms,” Information Security, January 2003.

The Strong Password Dilemma,” Computer Security Journal, Summer 2002.

“Deciphering the Advanced Encryption Standard (PDF),” Network Magazine, March 2001.

Authentication: Patterns of Trust,” Information Security, August 2000.

“Security assurance issues for open source software,” white paper for the NSA/DARPA Open Source Workshop, 1999 (with Charles Payne).

“Internet Cryptography,” Chapter 15 of ICSA Guide to Cryptography, Randall Nichols, ed., ISBN 0-07-913759-8, McGraw-Hill, 1999.

“Sidewinder defense in depth using type enforcement” (PDF), International Journal of Network Management, vol. 5, no. 4, July-August 1995.

“Task Planning Issues for an In-Orbit Service Manipulator,” Space Station Automation IV: Proc. SPIE, Wun C. Chiou, Sr., ed., vol. 1002, 1988, pp. 71-78.

“Hierarchical Multiprocessing Software for High Performance Robotics,” Intelligent Robotics and Computer Vision: Seventh in a Series; Proc. SPIE, David P. Casasent, Emery L. Moore, eds., vol. 1006, 1988, pp. 444-451.

“A Language and Multi-Tasking Operating System to Support an Eight-Channel Speech Input Terminal,” paper given at the 50th Anniversary Meeting, Acoustical Society of America, Cambridge, MA, 1979 (with A. Stowe and S. Glazer).

Other Writing

“Plate Construction and Layout,” chapter 43 in Juell & Rod, eds., Encyclopedia of United States Stamps and Stamp Collecting, Minneapolis: Kirk House, 2006. Also appeared in United States Specialist 76 (5), pp. 199-207, May, 2005.

“Are Web Transactions Safe?” tutorial article for the companion web site of NOVA’s television show . “Decoding Nazi Secrets,” November 2000.
http://www.pbs.org/wgbh/nova/decoding/web.html

“Secure Computing Legislative Policy Recommendations on Encryption,” 1998-1999.