2009 | ||
---|---|---|
61 | EE | Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates: Case Studies of an Insider Framework. HICSS 2009: 1-10 |
60 | EE | Sean Peisert, Matt Bishop, Alec Yasinsac: Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines. HICSS 2009: 1-10 |
59 | EE | Kara L. Nance, Brian Hay, Matt Bishop: Digital Forensics: Defining a Research Agenda. HICSS 2009: 1-6 |
2008 | ||
58 | EE | Alec Yasinsac, Matt Bishop: Of Paper Trails and Voter Receipts. HICSS 2008: 487 |
2007 | ||
57 | EE | David P. Gilliam, Matt Bishop, Y. V. (Ramana) Reddy: ST Workshop Final Report. WETICE 2007: 387-388 |
56 | EE | Sean Peisert, Matt Bishop: How to Design Computer Security Experiments. World Conference on Information Security Education 2007: 141-148 |
55 | EE | Matt Bishop: E-Voting as a Teaching Tool. World Conference on Information Security Education 2007: 17-24 |
54 | EE | Jingmin Zhou, Mark Heckman, Brennen Reynolds, Adam Carlson, Matt Bishop: Modeling network intrusion detection alerts for correlation. ACM Trans. Inf. Syst. Secur. 10(1): (2007) |
53 | EE | Matt Bishop, David Wagner: Risks of e-voting. Commun. ACM 50(11): 120 (2007) |
52 | EE | Earl Barr, Matt Bishop, Mark Gondree: Fixing federal e-voting standards. Commun. ACM 50(3): 19-24 (2007) |
51 | EE | Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo: Analysis of Computer Intrusions Using Sequences of Function Calls. IEEE Trans. Dependable Sec. Comput. 4(2): 137-150 (2007) |
2006 | ||
50 | EE | Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Karl N. Levitt, Matt Bishop: Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. DIMVA 2006: 1-16 |
49 | EE | Vicentiu Neagoe, Matt Bishop: Inconsistency in deception for defense. NSPW 2006: 31-38 |
48 | EE | Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt: Sanitization models and their limitations. NSPW 2006: 41-56 |
47 | EE | David P. Gilliam, Matt Bishop: Eleventh Securities Technologies (ST) Workshop Report. WETICE 2006: 305-306 |
46 | EE | Matt Bishop, Rick Crawford, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt: Some Problems in Sanitizing Network Data. WETICE 2006: 307-312 |
45 | EE | David P. Gilliam, John D. Powell, Matt Bishop, Chris Andrew, Sameer Jog: Security Verification Techniques Applied to PatchLink COTS Software. WETICE 2006: 319-325 |
44 | EE | Matt Bishop: Teaching context in information security. ACM Journal of Educational Resources in Computing 6(3): (2006) |
43 | EE | Matt Bishop, Deborah A. Frincke: Who Owns Your Computer? IEEE Security & Privacy 4(2): 61-63 (2006) |
2005 | ||
42 | EE | Jingmin Zhou, Adam J. Carlson, Matt Bishop: Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. ACSAC 2005: 117-126 |
41 | EE | David P. Gilliam, John D. Powell, Matt Bishop: Application of Lightweight Formal Methods to Software Security. WETICE 2005: 160-165 |
40 | EE | Matt Bishop, Deborah A. Frincke: A Human Endeavor: Lessons from Shakespeare and Beyond. IEEE Security & Privacy 3(4): 49-51 (2005) |
39 | EE | Matt Bishop, Deborah A. Frincke: Teaching Secure Programming. IEEE Security & Privacy 3(5): 54-56 (2005) |
2004 | ||
38 | EE | Matt Bishop, Bhume Bhumiratana, Rick Crawford, Karl N. Levitt: How to Sanitize Data. WETICE 2004: 217-222 |
37 | EE | Tom Walcott, Matt Bishop: Traducement: A model for record security. ACM Trans. Inf. Syst. Secur. 7(4): 576-590 (2004) |
36 | EE | Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) |
35 | EE | Matt Bishop, Deborah A. Frincke: Teaching Robust Programming. IEEE Security & Privacy 2(2): 54-57 (2004) |
34 | EE | Deborah A. Frincke, Matt Bishop: Guarding the Castle Keep: Teaching with the Fortress Metaphor. IEEE Security & Privacy 2(3): 69-72 (2004) |
33 | EE | Deborah A. Frincke, Matt Bishop: Back to School. IEEE Security & Privacy 2(4): 54-56 (2004) |
32 | EE | Deborah A. Frincke, Matt Bishop: Joining the Security Education Community. IEEE Security & Privacy 2(5): 61-63 (2004) |
31 | EE | Deborah A. Frincke, Matt Bishop: Academic Degrees and Professional Certification. IEEE Security & Privacy 2(6): 56-58 (2004) |
2003 | ||
30 | EE | Michael Clifford, Daniel Faigin, Matt Bishop, Tasneem Brutch: Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem. ACSAC 2003: 428-429 |
29 | EE | Eric Haugh, Matt Bishop: Testing C Programs for Buffer Overflow Vulnerabilities. NDSS 2003 |
28 | EE | David P. Gilliam, John D. Powell, Eric Haugh, Matt Bishop: Addressing Software Security and Mitigations in the Life Cycle. SEW 2003: 201 |
27 | EE | David P. Gilliam, Thomas L. Wolfe, Joseph S. Sherif, Matt Bishop: Software Security Checklist for the Software Life Cycle. WETICE 2003: 243-248 |
26 | Matt Bishop: Panel: Teaching Undergraduate Information Assurance. World Conference on Information Security Education 2003: 169-171 | |
25 | EE | Matt Bishop: What Is Computer Security? IEEE Security & Privacy 1(1): 67-69 (2003) |
2002 | ||
24 | EE | David S. Peterson, Matt Bishop, Raju Pandey: A Flexible Containment Mechanism for Executing Untrusted Code. USENIX Security Symposium 2002: 207-225 |
23 | Matt Bishop: Trends in academic research: vulnerabilities analysis and intrusion detection. Computers & Security 21(7): 609-612 (2002) | |
2001 | ||
22 | EE | Matt Bishop, Anup K. Ghosh, James A. Whittaker: How Useful is Software Fault Injection for Evaluating the Security of COTS Products? ACSAC 2001: 339-342 |
21 | EE | David P. Gilliam, John C. Kelly, John D. Powell, Matt Bishop: Development of a Software Security Assessment Instrument to Reduce Software Security Risk. WETICE 2001: 144-149 |
2000 | ||
20 | EE | Tuomas Aura, Matt Bishop, Dean Sniegowski: Analyzing Single-Server Network Inhibition. CSFW 2000: 108-117 |
19 | EE | John R. Hughes, Tuomas Aura, Matt Bishop: Using Conservation of Flow as a Security Mechanism in Network Protocols. IEEE Symposium on Security and Privacy 2000: 132-131 |
18 | EE | David P. Gilliam, John C. Kelly, Matt Bishop: Reducing Software Security Risk through an Integrated Approach. WETICE 2000: 141-146 |
17 | EE | Brant Hashii, Scott Malabarba, Raju Pandey, Matt Bishop: Supporting reconfigurable security policies for mobile programs. Computer Networks 33(1-6): 77-93 (2000) |
1999 | ||
16 | EE | Matt Bishop: Vulnerability Analysis: An Extended Abstract. Recent Advances in Intrusion Detection 1999 |
1998 | ||
15 | EE | Michael Clifford, C. Lavine, Matt Bishop: The Solar Trust Model: Authentication Without Limitation. ACSAC 1998: 300-307 |
1996 | ||
14 | Matt Bishop, Michael Dilger: Checking for Race Conditions in File Accesses. Computing Systems 2(2): 131-152 (1996) | |
13 | Edward Amoroso, Matt Bishop: Secruity Enables Electronic Commerce. J. Network Syst. Manage. 4(3): (1996) | |
12 | Matt Bishop: Conspiracy and Information Flow in the Take-Grant Protection Model. Journal of Computer Security 4(4): 331-360 (1996) | |
1995 | ||
11 | EE | Matt Bishop, Daniel V. Klein: Improving system security via proactive password checking. Computers & Security 14(3): 233-249 (1995) |
10 | Matt Bishop: Theft of Information in the Take-Grant Protection Model. Journal of Computer Security 3(4): 283-308 (1995) | |
1993 | ||
9 | Matt Bishop: Teaching Computer Security. SEC 1993: 65-74 | |
1991 | ||
8 | Matt Bishop: An Authentication Mechanism for USENET. USENIX Winter 1991: 281-288 | |
1990 | ||
7 | Matt Bishop: Collaboration using Roles. Softw., Pract. Exper. 20(5): 485-497 (1990) | |
1988 | ||
6 | Matt Bishop: Theft of Information in the Take-Grant Protection Model. CSFW 1988: 194-218 | |
5 | Matt Bishop: An Application of a Fast Data Encryption Standard Implementation. Computing Systems 1(3): 221-254 (1988) | |
1987 | ||
4 | Matt Bishop: Profiling Under UNIX by Patching. Softw., Pract. Exper. 17(10): 729-739 (1987) | |
1986 | ||
3 | Matt Bishop: Analyzing the Security of an Existing Computer System. FJCC 1986: 1115-1119 | |
1981 | ||
2 | Matt Bishop: Hierarchical Take-Grant Protection Systems. SOSP 1981: 109-122 | |
1979 | ||
1 | Matt Bishop, Lawrence Snyder: The Transfer of Information and Authority in a Protection System. SOSP 1979: 45-54 |