dblp.uni-trier.dewww.uni-trier.de

Matt Bishop

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
61EEMatt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates: Case Studies of an Insider Framework. HICSS 2009: 1-10
60EESean Peisert, Matt Bishop, Alec Yasinsac: Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines. HICSS 2009: 1-10
59EEKara L. Nance, Brian Hay, Matt Bishop: Digital Forensics: Defining a Research Agenda. HICSS 2009: 1-6
2008
58EEAlec Yasinsac, Matt Bishop: Of Paper Trails and Voter Receipts. HICSS 2008: 487
2007
57EEDavid P. Gilliam, Matt Bishop, Y. V. (Ramana) Reddy: ST Workshop Final Report. WETICE 2007: 387-388
56EESean Peisert, Matt Bishop: How to Design Computer Security Experiments. World Conference on Information Security Education 2007: 141-148
55EEMatt Bishop: E-Voting as a Teaching Tool. World Conference on Information Security Education 2007: 17-24
54EEJingmin Zhou, Mark Heckman, Brennen Reynolds, Adam Carlson, Matt Bishop: Modeling network intrusion detection alerts for correlation. ACM Trans. Inf. Syst. Secur. 10(1): (2007)
53EEMatt Bishop, David Wagner: Risks of e-voting. Commun. ACM 50(11): 120 (2007)
52EEEarl Barr, Matt Bishop, Mark Gondree: Fixing federal e-voting standards. Commun. ACM 50(3): 19-24 (2007)
51EESean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo: Analysis of Computer Intrusions Using Sequences of Function Calls. IEEE Trans. Dependable Sec. Comput. 4(2): 137-150 (2007)
2006
50EEEbrima N. Ceesay, Jingmin Zhou, Michael Gertz, Karl N. Levitt, Matt Bishop: Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. DIMVA 2006: 1-16
49EEVicentiu Neagoe, Matt Bishop: Inconsistency in deception for defense. NSPW 2006: 31-38
48EERick Crawford, Matt Bishop, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt: Sanitization models and their limitations. NSPW 2006: 41-56
47EEDavid P. Gilliam, Matt Bishop: Eleventh Securities Technologies (ST) Workshop Report. WETICE 2006: 305-306
46EEMatt Bishop, Rick Crawford, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt: Some Problems in Sanitizing Network Data. WETICE 2006: 307-312
45EEDavid P. Gilliam, John D. Powell, Matt Bishop, Chris Andrew, Sameer Jog: Security Verification Techniques Applied to PatchLink COTS Software. WETICE 2006: 319-325
44EEMatt Bishop: Teaching context in information security. ACM Journal of Educational Resources in Computing 6(3): (2006)
43EEMatt Bishop, Deborah A. Frincke: Who Owns Your Computer? IEEE Security & Privacy 4(2): 61-63 (2006)
2005
42EEJingmin Zhou, Adam J. Carlson, Matt Bishop: Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. ACSAC 2005: 117-126
41EEDavid P. Gilliam, John D. Powell, Matt Bishop: Application of Lightweight Formal Methods to Software Security. WETICE 2005: 160-165
40EEMatt Bishop, Deborah A. Frincke: A Human Endeavor: Lessons from Shakespeare and Beyond. IEEE Security & Privacy 3(4): 49-51 (2005)
39EEMatt Bishop, Deborah A. Frincke: Teaching Secure Programming. IEEE Security & Privacy 3(5): 54-56 (2005)
2004
38EEMatt Bishop, Bhume Bhumiratana, Rick Crawford, Karl N. Levitt: How to Sanitize Data. WETICE 2004: 217-222
37EETom Walcott, Matt Bishop: Traducement: A model for record security. ACM Trans. Inf. Syst. Secur. 7(4): 576-590 (2004)
36EERuzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004)
35EEMatt Bishop, Deborah A. Frincke: Teaching Robust Programming. IEEE Security & Privacy 2(2): 54-57 (2004)
34EEDeborah A. Frincke, Matt Bishop: Guarding the Castle Keep: Teaching with the Fortress Metaphor. IEEE Security & Privacy 2(3): 69-72 (2004)
33EEDeborah A. Frincke, Matt Bishop: Back to School. IEEE Security & Privacy 2(4): 54-56 (2004)
32EEDeborah A. Frincke, Matt Bishop: Joining the Security Education Community. IEEE Security & Privacy 2(5): 61-63 (2004)
31EEDeborah A. Frincke, Matt Bishop: Academic Degrees and Professional Certification. IEEE Security & Privacy 2(6): 56-58 (2004)
2003
30EEMichael Clifford, Daniel Faigin, Matt Bishop, Tasneem Brutch: Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem. ACSAC 2003: 428-429
29EEEric Haugh, Matt Bishop: Testing C Programs for Buffer Overflow Vulnerabilities. NDSS 2003
28EEDavid P. Gilliam, John D. Powell, Eric Haugh, Matt Bishop: Addressing Software Security and Mitigations in the Life Cycle. SEW 2003: 201
27EEDavid P. Gilliam, Thomas L. Wolfe, Joseph S. Sherif, Matt Bishop: Software Security Checklist for the Software Life Cycle. WETICE 2003: 243-248
26 Matt Bishop: Panel: Teaching Undergraduate Information Assurance. World Conference on Information Security Education 2003: 169-171
25EEMatt Bishop: What Is Computer Security? IEEE Security & Privacy 1(1): 67-69 (2003)
2002
24EEDavid S. Peterson, Matt Bishop, Raju Pandey: A Flexible Containment Mechanism for Executing Untrusted Code. USENIX Security Symposium 2002: 207-225
23 Matt Bishop: Trends in academic research: vulnerabilities analysis and intrusion detection. Computers & Security 21(7): 609-612 (2002)
2001
22EEMatt Bishop, Anup K. Ghosh, James A. Whittaker: How Useful is Software Fault Injection for Evaluating the Security of COTS Products? ACSAC 2001: 339-342
21EEDavid P. Gilliam, John C. Kelly, John D. Powell, Matt Bishop: Development of a Software Security Assessment Instrument to Reduce Software Security Risk. WETICE 2001: 144-149
2000
20EETuomas Aura, Matt Bishop, Dean Sniegowski: Analyzing Single-Server Network Inhibition. CSFW 2000: 108-117
19EEJohn R. Hughes, Tuomas Aura, Matt Bishop: Using Conservation of Flow as a Security Mechanism in Network Protocols. IEEE Symposium on Security and Privacy 2000: 132-131
18EEDavid P. Gilliam, John C. Kelly, Matt Bishop: Reducing Software Security Risk through an Integrated Approach. WETICE 2000: 141-146
17EEBrant Hashii, Scott Malabarba, Raju Pandey, Matt Bishop: Supporting reconfigurable security policies for mobile programs. Computer Networks 33(1-6): 77-93 (2000)
1999
16EEMatt Bishop: Vulnerability Analysis: An Extended Abstract. Recent Advances in Intrusion Detection 1999
1998
15EEMichael Clifford, C. Lavine, Matt Bishop: The Solar Trust Model: Authentication Without Limitation. ACSAC 1998: 300-307
1996
14 Matt Bishop, Michael Dilger: Checking for Race Conditions in File Accesses. Computing Systems 2(2): 131-152 (1996)
13 Edward Amoroso, Matt Bishop: Secruity Enables Electronic Commerce. J. Network Syst. Manage. 4(3): (1996)
12 Matt Bishop: Conspiracy and Information Flow in the Take-Grant Protection Model. Journal of Computer Security 4(4): 331-360 (1996)
1995
11EEMatt Bishop, Daniel V. Klein: Improving system security via proactive password checking. Computers & Security 14(3): 233-249 (1995)
10 Matt Bishop: Theft of Information in the Take-Grant Protection Model. Journal of Computer Security 3(4): 283-308 (1995)
1993
9 Matt Bishop: Teaching Computer Security. SEC 1993: 65-74
1991
8 Matt Bishop: An Authentication Mechanism for USENET. USENIX Winter 1991: 281-288
1990
7 Matt Bishop: Collaboration using Roles. Softw., Pract. Exper. 20(5): 485-497 (1990)
1988
6 Matt Bishop: Theft of Information in the Take-Grant Protection Model. CSFW 1988: 194-218
5 Matt Bishop: An Application of a Fast Data Encryption Standard Implementation. Computing Systems 1(3): 221-254 (1988)
1987
4 Matt Bishop: Profiling Under UNIX by Patching. Softw., Pract. Exper. 17(10): 729-739 (1987)
1986
3 Matt Bishop: Analyzing the Security of an Existing Computer System. FJCC 1986: 1115-1119
1981
2 Matt Bishop: Hierarchical Take-Grant Protection Systems. SOSP 1981: 109-122
1979
1 Matt Bishop, Lawrence Snyder: The Transfer of Information and Authority in a Protection System. SOSP 1979: 45-54

Coauthor Index

1Edward Amoroso [13]
2Chris Andrew [45]
3Tuomas Aura [19] [20]
4Ruzena Bajcsy [36]
5Earl Barr [52]
6Terry Benzel [36]
7Bhume Bhumiratana [38] [46] [48]
8Robert Braden [36]
9Carla E. Brodley [36]
10Tasneem Brutch [30]
11Adam Carlson [54]
12Adam J. Carlson [42]
13Ebrima N. Ceesay [50]
14Lisa Clark [46] [48]
15Michael Clifford [15] [30]
16Rick Crawford [38] [46] [48]
17Michael Dilger [14]
18Sophie Engle [61]
19Sonia Fahmy [36]
20Daniel Faigin [30]
21Sally Floyd [36]
22Deborah A. Frincke [31] [32] [33] [34] [35] [39] [40] [43]
23Carrie Gates [61]
24Michael Gertz [50]
25Anup K. Ghosh [22]
26David P. Gilliam [18] [21] [27] [28] [41] [45] [47] [57]
27Mark Gondree [52]
28W. Hardaker [36]
29Brant Hashii [17]
30Eric Haugh [28] [29]
31Brian Hay [59]
32Mark Heckman [54]
33John R. Hughes [19]
34Sameer Jog [45]
35Anthony D. Joseph [36]
36Sidney Karin [51]
37John C. Kelly [18] [21]
38George Kesidis [36]
39Daniel V. Klein [11]
40C. Lavine [15]
41Karl N. Levitt [36] [38] [46] [48] [50]
42Robert Lindell [36]
43Peng Liu [36]
44Scott Malabarba [17]
45Keith Marzullo [51]
46David Miller [36]
47Russ Mundy [36]
48Kara L. Nance [59]
49Vicentiu Neagoe [49]
50Cliford Neuman [36]
51Ron Ostrenga [36]
52Raju Pandey [17] [24]
53Vern Paxson [36]
54Sean Peisert [51] [56] [60] [61]
55David S. Peterson [24]
56Phillip A. Porras [36]
57John D. Powell [21] [28] [41] [45]
58Y. V. (Ramana) Reddy [57]
59Brennen Reynolds [54]
60Catherine Rosenberg [36]
61Shankar Sastry (Shankar S. Sastry) [36]
62Joseph S. Sherif [27]
63Dean Sniegowski [20]
64Lawrence Snyder (Larry Snyder) [1]
65Daniel F. Sterne [36]
66J. Doug Tygar (J. D. Tygar) [36]
67David Wagner [53]
68Tom Walcott [37]
69Sean Whalen [61]
70James A. Whittaker [22]
71Thomas L. Wolfe [27]
72Shyhtsun Felix Wu [36]
73Alec Yasinsac [58] [60]
74Jingmin Zhou [42] [50] [54]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)