AREAS OF EXPERTISE / RESEARCH INTERESTS

Similar documents
Xinyu Tang. Education. Research Interests. Honors and Awards. Professional Experience

FEIRONG YUAN, PH.D. Updated: April 15, 2016

Why Do They Fail? An Experimental Assessment of the Role of Reputation and Effort in the Public s Response to Foreign Policy Failures.

Coordination Challenges in Global Software Development

Web-based Learning Systems From HTML To MOODLE A Case Study

Three Strategies for Open Source Deployment: Substitution, Innovation, and Knowledge Reuse

JOSHUA GERALD LEPREE

Towards a Collaboration Framework for Selection of ICT Tools

2017- Part-Time Professor Department of Political Science, Concordia University, Montréal, Canada

Development of an IT Curriculum. Dr. Jochen Koubek Humboldt-Universität zu Berlin Technische Universität Berlin 2008

Introduction to Modeling and Simulation. Conceptual Modeling. OSMAN BALCI Professor

Emmanuel Opara, D.B.A. Associate Professor Accounting & Finance & MIS College of Business

ELLEN E. ENGEL. Stanford University, Graduate School of Business, Ph.D. - Accounting, 1997.

Requirements-Gathering Collaborative Networks in Distributed Software Projects

Jon N. Kerr, PhD, CPA August 2017

ZACHARY J. OSTER CURRICULUM VITAE

Data Fusion Models in WSNs: Comparison and Analysis

Computer Science PhD Program Evaluation Proposal Based on Domain and Non-Domain Characteristics

John Joseph Strategy Area Paul Merage School of Business University of California Irvine Irvine, CA (cell)

CURRICULUM VITAE. Jose A. Torres

Stephanie Ann Siler. PERSONAL INFORMATION Senior Research Scientist; Department of Psychology, Carnegie Mellon University

A systems engineering laboratory in the context of the Bologna Process

2016 Match List. Residency Program Distribution by Specialty. Anesthesiology. Barnes-Jewish Hospital, St. Louis MO

An Estimating Method for IT Project Expected Duration Oriented to GERT

Russell M. Rhine. Education

Erin M. Evans PhD Candidate Department of Sociology University of California, Irvine

Dr. Adam Kavon Ghazi-Tehrani

EECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10. Instructor: Kang G. Shin, 4605 CSE, ;

Hongyan Ma. University of California, Los Angeles

Prairie View A&M University Houston, TX P.O. Box 519; MS 2220; Hilliard Hall (281)

Ph.D. Computer Engineering and Information Science. Case Western Reserve University. Cleveland, OH, 1986

A Comparison of the ERP Offerings of AACSB Accredited Universities Belonging to SAPUA

Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum

Student Admissions, Outcomes, and Other Data

InTraServ. Dissemination Plan INFORMATION SOCIETY TECHNOLOGIES (IST) PROGRAMME. Intelligent Training Service for Management Training in SMEs

LEN HIGHTOWER, Ph.D.

Associate Professor (with tenure) University of California, Davis, Agricultural and Resource Economics

A MULTI-AGENT SYSTEM FOR A DISTANCE SUPPORT IN EDUCATIONAL ROBOTICS

Online Marking of Essay-type Assignments

Chamilo 2.0: A Second Generation Open Source E-learning and Collaboration Platform

Statewide Strategic Plan for e-learning in California s Child Welfare Training System

Visual CP Representation of Knowledge

MIAO WANG. Articles in Refereed Journals and Book Volumes. Department of Economics Marquette University 606 N. 13 th Street Milwaukee, WI 53233

MASTER OF SCIENCE (M.S.) MAJOR IN COMPUTER SCIENCE

MABEL ABRAHAM. 710 Uris Hall Broadway mabelabraham.com New York, New York Updated January 2017 EMPLOYMENT

Developing a Distance Learning Curriculum for Marine Engineering Education

Seminar - Organic Computing

Automating the E-learning Personalization

European Cooperation in the field of Scientific and Technical Research - COST - Brussels, 24 May 2013 COST 024/13

CyberCIEGE: An Extensible Tool for Information Assurance Education

Welcome to. ECML/PKDD 2004 Community meeting

EDELINA M. BURCIAGA 3151 Social Science Plaza Irvine, CA

ERIN A. HASHIMOTO-MARTELL EDUCATION

University of California, Irvine - Division of Continuing Education

Master s Programme in Computer, Communication and Information Sciences, Study guide , ELEC Majors

QuickStroke: An Incremental On-line Chinese Handwriting Recognition System

Active Learning a pathfinder guide to active learning resources Developed by Roberta (Robin) Sullivan

SAM - Sensors, Actuators and Microcontrollers in Mobile Robots

Module Title: Teaching a Specialist Subject

Navigating the PhD Options in CMS

Guru: A Computer Tutor that Models Expert Human Tutors

Skillsoft Acquires SumTotal: Frequently Asked Questions. October 2014

The recognition, evaluation and accreditation of European Postgraduate Programmes.

Computer Organization I (Tietokoneen toiminta)

David Nunan TESOL Institute

What, Why and How? Past, Present and Future! Gudrun Wicander

Dinesh K. Sharma, Ph.D. Department of Management School of Business and Economics Fayetteville State University

Programme Specification. MSc in Palliative Care: Global Perspectives (Distance Learning) Valid from: September 2012 Faculty of Health & Life Sciences

A Coding System for Dynamic Topic Analysis: A Computer-Mediated Discourse Analysis Technique

BUILDING CAPACITY FOR COLLEGE AND CAREER READINESS: LESSONS LEARNED FROM NAEP ITEM ANALYSES. Council of the Great City Schools

ANNUAL REPORT of the ACM Education Policy Committee For the Period: July 1, June 30, 2016 Submitted by Jeffrey Forbes, Chair

HILDE : A Generic Platform for Building Hypermedia Training Applications 1

Alan D. Miller Faculty of Law and Department of Economics University of Haifa Mount Carmel, Haifa, 31905, Israel

Queensborough Public Library (Queens, NY) CCSS Guidance for TASC Professional Development Curriculum

The city Light Rail Transit (LRT) network connects the College to all suburban areas of KL.

Al Cornish Head, Library Systems Washington State University Libraries Pullman, WA

Program Assessment and Alignment

Group A Lecture 1. Future suite of learning resources. How will these be created?

Quantitative Evaluation of an Intuitive Teaching Method for Industrial Robot Using a Force / Moment Direction Sensor

Accounting & Financial Management

Specification and Evaluation of Machine Translation Toy Systems - Criteria for laboratory assignments

University of Southern California Hayward R. Alker Postdoctoral Fellow, Center for International Studies,

Contract Renewal, Tenure, and Promotion a Web Based Faculty Resource

Education for an Information Age

COURSE LISTING. Courses Listed. Training for Cloud with SAP SuccessFactors in Integration. 23 November 2017 (08:13 GMT) Beginner.

USER ADAPTATION IN E-LEARNING ENVIRONMENTS

AUTHORING E-LEARNING CONTENT TRENDS AND SOLUTIONS

THE DEPARTMENT OF DEFENSE HIGH LEVEL ARCHITECTURE. Richard M. Fujimoto

Constructive Induction-based Learning Agents: An Architecture and Preliminary Experiments

Learning Methods for Fuzzy Systems

A New Computing Book Series From ACM

Christopher Curran. Curriculum Vita

104 Immersive Learning Simulation Strategies: A Real-world Example. Richard Clark, NextQuestion Deborah Stone, DLS Group, Inc.

Curriculum Vitae Bharat K. Soni

NATO ASI Series Advanced Science Institutes Series

Curriculum Vitae Susanne E. Baumgartner

A Profile of Top Performers on the Uniform CPA Exam

SSE - Supervision of Electrical Systems

Daniel B. Boatright. Focus Areas. Overview

medicaid and the How will the Medicaid Expansion for Adults Impact Eligibility and Coverage? Key Findings in Brief

Transcription:

Thuy D. Nguyen Department of Computer Science Center for Information Systems Security Studies and Research Naval Postgraduate School, Monterey, CA 93943 Phone: (831) 656 3989 Email: tdnguyen@nps.edu AREAS OF EXPERTISE / RESEARCH INTERESTS High Assurance Platform, Trusted OS, Separation Kernel Dynamic Security Services, Multilevel Security Hardware Security Security Evaluation Security Requirements Engineering, Information Systems Security Engineering PROFESSIONAL EXPERIENCE 2002 Present Research Associate of Computer Science, Naval Postgraduate School 1995 2002 Senior Manager, Gemini Computers, Inc. 1992 1995 Product Manager, Gemini Computers, Inc. 1985 1992 Senior Engineer, Gemini Computers, Inc. 1982 1985 Principal Programmer/Analyst, NCR Corp. EDUCATION University of California, San Diego B.A. in Computer Science, 1982 PUBLICATIONS Book chapter 1. Levin, T. E., Irvine, C. E., and Nguyen, T. D., "Least Privilege in Separation Kernels", in E Business and Telecommunication Networks, J. Filipe and M. S. Obaidat, eds., Vol. 9, Communications in Computer and Information Science, Springer Verlag, 2008. Refereed conference papers 1. T. E. Levin, C. E. Irvine, T. V. Benzel, T. D. Nguyen, P. C. Clark, and G. Bhaskara, Trusted emergency management, in proc. Engineering Secure Software and Systems (ESSoS) (F. Massacci, S. T. R. Jr., and N. Zannone, eds.), LNCS 5429, (Berlin), pp. 32 36, ACM/IEEE, Springer Verlag, February 2009. 1

2. Nguyen, T. D. and Irvine, C. E., "Use of Evaluation Criteria in Security Education," 3rd International Conference on Information Warfare and Security (ICIW 2008), Omaha, Nebraska, April 2008, pp. 285 292. 3. Ong, K. L., Nguyen, T. and Irvine, C., "Implementation of a Multilevel Wiki for Cross Domain Collaboration," 3rd International Conference on Information Warfare and Security (ICIW 2008), Omaha, Nebraska, April 2008, pp. 293 304. 4. Irvine, C. E., Levin, T. E., Clark, P. C., and Nguyen, T. D., "A Security Architecture for Transient Trust, Computer Security Architecture Workshop", Fairfax, VA, October 2008. 5. Huffmire, T., Valamehr, J., Sherwood, T, Kastner, R., Levin, T. E., Nguyen, T. D., and Irvine, C. E., "Trustworthy System Security through 3 D Integrated Hardware," Proceedings of the 2008 IEEE International Workshop on Hardware Oriented Security and Trust (HOST 2008), Anaheim, CA, June 2008. (Extended Abstract) 6. Chiang, K., Nguyen, T. D., Irvine C. E., "A Linux Implementation of Temporal Access Controls," Proceedings 8th IEEE Systems, Man, and Cybernetics Information Assurance Workshop, West Point, NY, June 2007, pp. 309 316. (Won best paper) 7. DeLong, R. J., Nguyen, T. D., Irvine, C. E. and Levin, T. E., "Toward a Medium Robustness Separation Kernel Protection Profile," Annual Computer Security Applications Conference (ACSAC), Miami Beach, Florida, USA, December 2007. 8. Levin, T. E., Irvine, C. E., Weissman, C., Nguyen, T. D., "Analysis of Three Multilevel Security Architectures", Proceedings of the Computer Security Architecture Workshop, ACM, Fairfax, Virginia, USA, November 2007. 9. Huffmire, T., Brotherton, B., Wang, G., Sherwood, T., Kastner, R., Levin, T., Nguyen, T., Irvine, C., "Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems," Proceedings of the IEEE Symposium on Security and Privacy (Oakland S&P), Oakland, CA, USA, May 2007, pp. 281 295. 10. Nguyen, T. D. and Irvine, C. E., Ulitizing the Common Criteria for Advanced Student Research Projects, in IFIP International Federation for Information Processing, Volume 201, Security and Privacy in Dynamic Environments, eds. Fischer Hubner, S., Rannenberg, K., Yngstrom, L., Lindskog, S., (Boston: Springer), 2006, pp. 317 328. 11. Nguyen, T. D., Levin, T. E., and Irvine, C. E., High Robustness Requirements in a Common Criteria Protection Profile, Proceedings of the 4th IEEE International Information Assurance Workshop, Royal Holloway, University of London, UK, April 2006, pp. 66 75. 12. Nguyen, T. D., Irvine, C. E., and Kane, D. R., Using Common Criteria Methodology to Express Informal Security Requirements, Proceedings of the International Symposium on Secure Software Engineering, Arlington, VA, March 2006, pp. 75 85. 13. Afinidad, F. B., Levin, T. E., Irvine, C. E., and Nguyen, T. D., A Model for Temporal Interval Authorizations, Proceedings of the Hawaii International Conference on System Sciences, Software Technology Track, Information Security Education and Foundational Research, Kauai, Hawaii, January 2006, pp. 218. 14. Levin, T. E., Irvine, C. E., and Nguyen, T. D., Least Privilege in Separation Kernels, Proceedings of the International Conference on Security and Cryptography, Setubal, Portugal, August 2006, pp. 355 362. 15. Cone, B. D., Thompson, M. F., Irvine, C. E. and Nguyen, T. D., Cyber Security Training and Awareness Through Game Play, in IFIP International Federation for Information Processing, Volume 201, Security and Privacy in Dynamic Environments, eds. Fischer Hubner, S., Rannenberg, K., Yngstrom, L., Lindskog, S., (Boston: Springer), 2006, pp. 431 436. 2

16. Nguyen, T. D., Levin, T. E., and Irvine, C. E., "TCX Project: High Assurance for Secure Embedded Systems", Proceedings of the 11th IEEE Real Time and Embedded Technology and Applications Symposium Work In Progress Session, San Francisco, CA, March 2005, pp. 21 25. (Also published in SIGBED Review, Volume 2, Number 2, April 2005, Special Issue on IEEE RTAS 2005 Work in Progress.) 17. Nguyen, T. D., Levin, T. E., and Irvine, C. E., MYSEA Testbed, Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, NY, June 2005, pp. 438 439. 18. Clark, P. C., Irvine, C. E., Levin, T. E., Nguyen, T. D., Shifflett, D. J., Miller, D., Initial Documentation Requirements for a High Assurance System: Lessons Learned, Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, NY, June 2005, pp. 434 435. 19. Afinidad, F. B., Levin, T. E., Irvine, C. E., and Nguyen, T. D., "Foundation for a Time Interval Access Control Model," Proceedings of the Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM ACNS 2005, St. Petersburg, Russia, September 2005. (Also published in Lecture Notes in Computer Science, Springer Verlag GmbH, Volume 3685 / 2005, pp. 406, ISBN: 3 540 29113 X.) 20. Irvine, C. E., Levin, T. E., Nguyen, T. D., Shifflett, D. J., Khosalim, J., Clark, P. C., Wong, A., Afinidad, F., Bibighaus, D., and Sears, J., "Overview of a High Assurance Architecture for Distributed Multilevel Security," Proceedings of the 2004 IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, NY, June 2004. 21. Irvine, C. E., Levin, T. E., Nguyen, T. D., and Dinolt, G. W., "The Trusted Computing Exemplar Project," Proceedings of the 2004 IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, NY, June 2004, pp. 109 115. Journal articles 1. Huffmire, T., Brotherton, B., Sherwood, T., Kastner, R., Levin, T. E., Nguyen, T. D., and Irvine, C. E., "Managing Security in FPGA Based Embedded Systems", IEEE Design and Test of Computers, Vol 25, No. 6, pp 590 598. 2. Cone, B. D., Irvine, C. E., Thompson, M. F., and Nguyen, T. D., "A Video Game for Cyber Security Training and Awareness," Computers & Security, Vol. 26, Issue 1, pp. 63 72, February 2007. 3. Dodge, C., Irvine, C.E., and Nguyen, T. D., "A Study of Initialization in Linux and OpenBSD," ACM SIGOPS Operating Systems Review, Vol. 39, Issue 2, pp. 79 93, April 2005. Technical reports 1. Nguyen, T. D., Irvine, C. E. and Levin, T. E., "A Testbed for High Assurance and Dynamic Security," NPS Technical Report NPS CS 08 010, May 2008. 2. Nguyen, T. D., Khosalim, J., Shifflett, D. J., and Irvine, C. E., Monterey Security Architecture: STOP OS 7 Migration Analysis, NPS Technical Report NPS CS 08 013, July 2008. 3. Levin, T. E., Nguyen, T. D., Clark, P. C., Irvine, C. E, Shifflett, D. J., and Vidas, T. M., Use of Trusted Software Modules for High Integrity Data Display, NPS Technical Report NPS CS 08 012, June 2008. 4. Shifflett, D. J., Clark, P. C., Irvine, C. E., Nguyen, T. D., Vidas, T. M., Levin, T. E., "SecureCore Software Architecture: Trusted Management Layer (TML) Kernel Extension Module Interface Specification," NPS Technical Report NPS CS 07 021, January 2008. 3

5. Nguyen, T. D., Irvine, C. E., Levin, T. E., "Initial Review of NC3A XML Guard Draft Security Target," NPS Technical Report NPS CS 07 011, October 2007. 6. Nguyen, T. D., "Security Requirements Analysis for NC3A XML Guard Security Target," NPS Technical Report NPS CS 07 019, December 2007. 7. Levin, T. E., Bhaskara, G., Nguyen, T. D., Clark, P. C., Benzel, T. V., and Irvine, C. E., "SecureCore Security Architecture: Authority Mode and Emergency Management," NPS CS 07 012, Naval Postgraduate School, October 2007. 8. Clark, P. C., Irvine, C. E., Nguyen, T. D., Levin, T. E., Vidas, T. M., Shifflett, D. J., "SecureCore Software Architecture: SecureCore Operating System (SCOS) Functional Specification", NPS CS 07 018, December 2007. 9. Clark, P. C., Irvine, C. E., Levin, T. E., Nguyen, T. D., Vidas, T. M., "SecureCore Software Architecture: Trusted Path Application (TPA) Requirements," NPS Technical Report NPS CS 07 001, December 2007. 10. Shifflett, D. J., Clark, P. C., Irvine, C. E., Nguyen, T. D., Vidas, T. M., Levin, T. E., "SecureCore Software Architecture: Trusted Management Layer (TML) Kernel Extension Module Integration Guide," NPS Technical Report NPS CS 07 022, December 2007. 11. Levin, T. E., Irvine, C. E., Benzel, T. V., Bhaskara, G., Clark, P. C., and Nguyen, T. D., "Design Principles and Guidelines for Security", NPS Technical Report NPS CS 07 014, Naval Postgraduate School, November 2007. 12. Nguyen, T. D., Levin, T. E., Irvine, C. E., Benzel, T. V. and Bhaskara, G., Preliminary Security Requirements for SecureCore Hardware, Naval Postgraduate School Technical Report, NPS CS 06 01, September 2006. 13. Levin, T.E., Irvine, C. E. and Nguyen, T. D., An Analysis of Three Kernel based Multilevel Security Architectures, Naval Postgraduate School Technical Report, NPS CS 06 001, August 2006. 14. Bhaskara, G., Levin, T. E., Nguyen, T. D., Benzel, T. V., Irvine, C. E. and Clark, P. C., Integration of User Specific Hardware for SecureCore Cryptographic Services, Naval Postgraduate School Technical Report, NPS CS 06 012, July 2006. 15. Clark, P. C., Irvine, C. E., Levin, T. E. and Nguyen, T. D., The GIG Information Access Control Policy: An Interpretation, Analysis and Conceptual Design, Naval Postgraduate School Technical Report, NPS CS 06 018, June 2006. 16. Clark, P. C., Irvine, C. E., Levin, T. E., Nguyen, T. D., Shifflett, D. J. and Miller, D., Initial Documentation Requirements for a High Assurance System: Lessons Learned, Naval Postgraduate School Technical Report, NPS CS 06 007, February 2006. 17. Benzel, T. V., Irvine C. E., Levin, T. E., Bhaskara, G., Nguyen, T. D., Clark, P. C., Design Principles for Security, NPS CS 05 010, Naval Postgraduate School, Monterey, California, September 2005. 18. Afinidad, F., Irvine, C. E., Nguyen, T. D., and Levin, T. E., A Time Interval Memory Protection System, NPS CS 06 002, Naval Postgraduate School, Monterey, California, November 2005. 19. Irvine, C. E., Nguyen, T. D. and Levin, T. E., High Assurance Testbed For Multilevel Interoperability 2004 Developments, NPS Technical Report NPS CS 05 002, October 2004. 20. Irvine, C. E., Levin, T. E. and Nguyen, T. D., Trusted Computing Exemplar 2004 Developments, NPS Technical Report NPS CS 05 001, October 2004. 21. Levin, T. E., Irvine, C. E. and Nguyen, T. D., A Least Privilege Model for Static Separation Kernels, NPS Technical Report NPS CS 05 003, October 2004. 4

22. Nguyen, T. D. and Levin, T. E., "Policy Enforced Remote Login," NPS Technical Report NPS CS 03 004, February 2003. Refereed conference presentations (not associated with papers above) 1. Nguyen, T. D., Irvine, C. E., Khosalim, J. and Shifflett, D. J., "An Architecture for Multilevel Secure Dynamic Services," The Open Group, Real Time Embedded Systems Forum, San Diego, CA, February 2009. 2. Irvine, C. E., Nguyen, T. D., Levin, T. E., Clark, P. C., Vidas, T. M., and Shifflett, D. J, Towards An Open Source Least Privilege Architecture, The Open Group, Real Time Embedded Systems Forum, San Francisco, CA, January 2008. 3. Nguyen, T. D., Irvine, C. E., Levin, T. E., and McEvilley, M., "Assurance Considerations for a Highly Robust TOE," Proceedings of the 8th International Common Criteria Conference (ICCC), Rome, Italy, September 2007. 4. Nguyen, T. D., Irvine, C. E., and Harkins, R. M., An Experiment with CC Version 3.0 Migration, 7th International Common Criteria Conference (ICCC 06), September 19 21, 2006. 5. Levin, T. E., Irvine, C. E., and Nguyen, T. D., A Note on High Robustness Requirements for Separation Kernels, Proceedings of the 6th International Common Criteria Conference 2005, Tokyo, Japan, September 2005, pp. 301 305. PROFESSIONAL ACTIVITIES 2008 Present Course Developer, Applied Information Systems Security Engineering, Department of Computer Science, Naval Postgraduate School 2007 Present Co Author, Computing Platform Architecture & Security Criteria, High Assurance Platform program, National Security Agency 2004 Present Lead Architect, Monterey Security Architecture and MLS Testbed, Naval Postgraduate School 2005 2008 Co Principal Investigator, Collaborative Research: CT T: Adaptive Security and Separation in Reconfigurable Hardware, National Science Foundation 2004 2007 Co Author, U.S. Government Protection Profile for Separation Kernels in Environments Requiring High Robustness, National Security Agency 2007 Course Developer and Instructor, Application of Security Evaluation Criteria for Information and Software Assurance, Department of Computer Science, Naval Postgraduate School 2004 2006 Co Instructor, Advance Topics in Computer Security, Department of Computer Science, Naval Postgraduate School 1995 2000 NSA Certified Vendor Security Analyst for TCSEC Class A1 Gemini Trusted Network Processor, Gemini Computers, Inc. ADVISORY ACTIVITIES Ph. D. Dissertation Committee Member 2005 Francis Afinidad 5

Master s Thesis Co Advisor 2008 Claire LaVelle, Thomas Tenhunen 2007 Kar Leong Ong, Andrew Portner, Brian Wiese 2006 Jeremiah Bradney, Ken Chiang, Melissa Egan, Patrick Whitehorn 2005 Sonia Bui, Robert Cooper, John Horn, Douglas Kane, James Lysinger, Lily Tse 2004 Trevor Baumgarten, Catherine Dodge, Christopher Herbig, Matthew Phillips, Joseph Sears 2003 Matthew O Neal 6