search
menu
icon-carat-right
cmu-wordmark
✕
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
Enterprise Risk and Resilience Management
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webinar Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity and Inclusion
Internship Opportunities
Working at the SEI
Carnegie Mellon University
Software Engineering Institute
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cloud Computing
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity, and Inclusion
Internship Opportunities
Home
Publications
Authors
Aaron Greenhouse
Aaron Greenhouse
Software Engineering Institute
All
Tech Publications
Blog Posts
Podcasts
11 Rules for Ensuring a Security Model with AADL and Bell–LaPadula
July 29, 2021
•
Podcast
By
Aaron Greenhouse
Automating System Security with AADL: 11 Rules for Ensuring a Security Model
April 26, 2021
•
Blog Post
By
Aaron Greenhouse
Modeling and Validating Security and Confidentiality in System Architectures
March 19, 2021
•
Technical Report
By
Aaron Greenhouse
,
Jörgen Hansson (University of Skovde)
,
Lutz Wrage
Results of SEI Independent Research and Development Projects (FY 2006)
July 1, 2007
•
Technical Report
By
Christopher J. Alberts
,
William Anderson
,
Len Bass
,
Matt Bass
,
Philip J. Boxer
,
Lisa Brownsword
,
Sagar Chaki
,
Peter H. Feiler
,
David Fisher
,
Eileen C. Forrester
,
Suzanne Miller
,
Aaron Greenhouse
,
Jörgen Hansson (University of Skovde)
,
James D. Herbsleb
,
James Ivers
,
Peter Lee
,
Richard C. Linger (Oak Ridge National Laboratory)
,
Thomas A. Longstaff
,
Pratyusa K. Manadhata
,
B. Craig Meyers
,
Mike Phillips
,
Carol Sledge
,
James Smith
,
Kurt C. Wallnau
,
Gwendolyn H. Walton
,
J. Wing
,
Noam Zeilberger
Results of SEI Independent Research and Development Projects and Report on Emerging Technologies and Technology Trends (FY2005)
December 1, 2005
•
Technical Report
By
Rosann W. Collins
,
Sagar Chaki
,
Peter H. Feiler
,
John B. Goodenough
,
Aaron Greenhouse
,
Jörgen Hansson (University of Skovde)
,
Alan R. Hevner (University of South Florida)
,
John J. Hudak
,
Angel Jordan
,
Rick Kazman
,
Richard C. Linger (Oak Ridge National Laboratory)
,
Mark Pleszkoch
,
Stacy J. Prowell
,
Natasha Sharygina
,
Kurt C. Wallnau
,
Gwendolyn H. Walton
,
Charles Weinstock
,
Lutz Wrage
More from Aaron Greenhouse
Modeling and Validating Security and Confidentiality in System Architectures
March 19, 2021
•
Technical Report
By
Aaron Greenhouse
,
Jörgen Hansson (University of Skovde)
,
Lutz Wrage
Results of SEI Independent Research and Development Projects (FY 2006)
July 1, 2007
•
Technical Report
By
Christopher J. Alberts
,
William Anderson
,
Len Bass
,
Matt Bass
,
Philip J. Boxer
,
Lisa Brownsword
,
Sagar Chaki
,
Peter H. Feiler
,
David Fisher
,
Eileen C. Forrester
,
Suzanne Miller
,
Aaron Greenhouse
,
Jörgen Hansson (University of Skovde)
,
James D. Herbsleb
,
James Ivers
,
Peter Lee
,
Richard C. Linger (Oak Ridge National Laboratory)
,
Thomas A. Longstaff
,
Pratyusa K. Manadhata
,
B. Craig Meyers
,
Mike Phillips
,
Carol Sledge
,
James Smith
,
Kurt C. Wallnau
,
Gwendolyn H. Walton
,
J. Wing
,
Noam Zeilberger
Results of SEI Independent Research and Development Projects and Report on Emerging Technologies and Technology Trends (FY2005)
December 1, 2005
•
Technical Report
By
Rosann W. Collins
,
Sagar Chaki
,
Peter H. Feiler
,
John B. Goodenough
,
Aaron Greenhouse
,
Jörgen Hansson (University of Skovde)
,
Alan R. Hevner (University of South Florida)
,
John J. Hudak
,
Angel Jordan
,
Rick Kazman
,
Richard C. Linger (Oak Ridge National Laboratory)
,
Mark Pleszkoch
,
Stacy J. Prowell
,
Natasha Sharygina
,
Kurt C. Wallnau
,
Gwendolyn H. Walton
,
Charles Weinstock
,
Lutz Wrage
More from Aaron Greenhouse
Automating System Security with AADL: 11 Rules for Ensuring a Security Model
April 26, 2021
•
Blog Post
By
Aaron Greenhouse
More from Aaron Greenhouse
11 Rules for Ensuring a Security Model with AADL and Bell–LaPadula
July 29, 2021
•
Podcast
By
Aaron Greenhouse
More from Aaron Greenhouse
Send a Message