Search

Gary L Luckenbaugh

from Gaithersburg, MD
Age ~67

Gary Luckenbaugh Phones & Addresses

  • 62 Napa Valley Rd, Gaithersburg, MD 20878 (301) 869-1372
  • Montgomery Village, MD
  • Rockville, MD
  • Modesto, CA

Work

Company: Leidos Aug 2016 Position: Fellow

Education

Degree: Master of Science, Masters School / High School: University of Maryland 1979 to 1984 Specialities: Computer Science

Skills

System Architecture • Systems Engineering • Integration • Requirements Management • Requirements Analysis • Enterprise Architecture • Program Management • Earned Value Management • Technical Leadership • Information Security • Software Engineering • Configuration Management • Dod • Computer Security • Requirements Gathering • Security • Testing • Security Clearance • Ms Project • Architecture • Software Design • Software Development • Government Contracting • Defense • Pmp • Software Project Management • Information Assurance • Engineering Management • Cmmi • Sdlc • System Design • Proposal Writing • Space Systems • Systems Design • Agile Methodologies • Agile Project Management • Data Modeling • Mentoring • Linux • Unix • Cissp • Weblogic • Visio • Fisma • C4Isr • Architectures • Java Enterprise Edition

Industries

Information Technology And Services

Resumes

Resumes

Gary Luckenbaugh Photo 1

Fellow

View page
Location:
497 Electronics Pkwy, Liverpool, NY 13088
Industry:
Information Technology And Services
Work:
Leidos
Fellow

Lockheed Martin
Lockheed Martin Fellow

Lockheed Martin 1994 - 2009
Senior Manager and System Architect

Ibm Jan 1984 - Mar 1994
Senior Software Engineer
Education:
University of Maryland 1979 - 1984
Master of Science, Masters, Computer Science
University of Delaware 1975 - 1979
Bachelors, Bachelor of Electrical Engineering, Electrical Engineering
Skills:
System Architecture
Systems Engineering
Integration
Requirements Management
Requirements Analysis
Enterprise Architecture
Program Management
Earned Value Management
Technical Leadership
Information Security
Software Engineering
Configuration Management
Dod
Computer Security
Requirements Gathering
Security
Testing
Security Clearance
Ms Project
Architecture
Software Design
Software Development
Government Contracting
Defense
Pmp
Software Project Management
Information Assurance
Engineering Management
Cmmi
Sdlc
System Design
Proposal Writing
Space Systems
Systems Design
Agile Methodologies
Agile Project Management
Data Modeling
Mentoring
Linux
Unix
Cissp
Weblogic
Visio
Fisma
C4Isr
Architectures
Java Enterprise Edition

Business Records

Name / Title
Company / Classification
Phones & Addresses
Gary Luckenbaugh
Manager Information Assurance Techn
Lockheed Martin Services, Inc
Professional, Scientific and Techincal Servies · Other Professional/Scientific/Technical Services · Us Govt Services Contracting · Services, Nec, Nsk · Services-Misc · Gov't & Commercial Aircraft Repairs · Engineering Services Management Services Management Consulting Services
700 N Frederick Ave, Gaithersburg, MD 20879
PO Box 61511, King of Prussia, PA 19406
PO Box 61511, King of Prussia, PA 19406
209 W Washington St, Charleston, WV 25302
(864) 422-6262, (301) 240-7500

Publications

Us Patents

Object-Oriented Trusted Application Framework

View page
US Patent:
59918772, Nov 23, 1999
Filed:
Apr 3, 1997
Appl. No.:
8/834784
Inventors:
Gary L. Luckenbaugh - Gaithersburg MD
Assignee:
Lockheed Martin Corporation - Bethesda MD
International Classification:
G06F 1200
US Classification:
713200
Abstract:
An object-oriented framework provides ease of development and alteration of access control systems for arbitrary applications and accomodates arbitrary security policies while providing fine-grained security by providing for creation of labels for portions of a resource such as an application or portions of files, credentials corresponding to users and any other objects of the access control system by providing templates for such objects within at least one policy manager class of objects and which can be selected or modified at will. Provision for creation of label and credential objects which are later compared or correlated for granting or denying access to portions of a resource effectively decouples security policy from security enforcement and allows reconciliation of security policies having inconsistent requirements as well as development of hybrid and customized security policies.

Method And System For Authenticating Users To Multiple Computer Servers Via A Single Sign-On

View page
US Patent:
56849508, Nov 4, 1997
Filed:
Sep 23, 1996
Appl. No.:
8/717961
Inventors:
Timothy S. Dare - Damascus MD
Eric B. Ek - New Market MD
Gary L. Luckenbaugh - Gaithersburg MD
Assignee:
Lockheed Martin Corporation - Bethesda MD
International Classification:
G06F 1100
US Classification:
39518701
Abstract:
A method for authenticating an authorized user to multiple computer servers within a distributed computing environment after a single network sign-on is disclosed. In accordance with the method and system of the present invention, an authentication broker is provided within the distributed computing network. The authentication broker first receives an authentication request from a workstation. After a determination that the authentication request is valid, the authentication broker then issues a Kerberos Ticket Granting Ticket to the workstation. At this point, if there is a request by the workstation for accessing a Kerberos Ticket-based server within the distributed computing network, the authentication broker will issue a Kerberos Service Ticket to the workstation. Similarly, if there is a request by the workstation for accessing a passticket-based server within the distributed computing network, the authentication broker will issue a passticket to the workstation. Finally, if there is a request by the workstation for accessing a password-based server within the distributed computing network, the authentication broker will issue a password to the workstation.

Trusted Path Mechanism For An Operating System

View page
US Patent:
49186531, Apr 17, 1990
Filed:
Jan 28, 1988
Appl. No.:
7/149446
Inventors:
Abhai Johri - Gaithersburg MD
Gary L. Luckenbaugh - Gaithersburg MD
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 900
US Classification:
364900
Abstract:
The trusted path mechanism invention guarantees that data typed by a user on a terminal keyboard is protected from any intrusion by unauthorized programs. It allows a user to create a non-forgeable and non-penetrable communication path between the user's terminal and the trusted operating system software. The user can create a trusted path by simply pressing a key, called the Secure Attention Key (SAK), on the terminal keyboard. This operation can be called when the user logs into the system in order to be sure that the user is communicating with the real login program and not a Trojan horse program masquerading as a login program, which could steal the user's password. After the user establishes the trusted path, he can enter his critical data, such as a password, and can be sure that his critical data is not being stolen by an intruder's program. Then, after the user logs out, he can be sure that the trusted path has actually logged him out of the system so that a Trojan horse program is not capable of continuing the session started by the user.

Trusted Services Broker For Web Page Fine-Grained Security Labeling

View page
US Patent:
63112698, Oct 30, 2001
Filed:
Jun 15, 1998
Appl. No.:
9/094612
Inventors:
Gary L. Luckenbaugh - Gaithersburg MD
Forrest E. Stoakes - Gaithersburg MD
Assignee:
Lockheed Martin Corporation - Bethesda MD
International Classification:
G06F 1314
US Classification:
713154
Abstract:
Arbitrarily fine-grained limitation of access to information stored in a resource of a data processor network is provided in a manner compatible with existing network browsers by mapping user identity and credentials with randomly assigned security cookie information which thus serves as a surrogate credential accompanying each user request during a session. Labels are imbedded within HTML files/text which may embody any desired security policy, including mandatory access control (MAC) arrangements which are not available through native browser functions. Data is retrieved in response to a user request which includes a security cookie from a location in the resource which is not directly accessible through use of a URL; the location being stored in a configuration file which is hidden from users. The retrieved data is then filtered in accordance with labels provided for each page and/or embedded in the text and used to build a response which may include hypertext links or other user interfaces for transmission to the user. Provision is made for viewing or changing of labels, credentials and passwords.
Gary L Luckenbaugh from Gaithersburg, MD, age ~67 Get Report