2009 |
47 | EE | Pierpaolo Degano,
Joshua D. Guttman,
Fabio Martinelli:
Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers
Springer 2009 |
46 | EE | Joshua D. Guttman:
Cryptographic Protocol Composition via the Authentication Tests.
FOSSACS 2009: 303-317 |
2008 |
45 | EE | George Coker,
Joshua D. Guttman,
Peter Loscocco,
Justin Sheehy,
Brian T. Sniffen:
Attestation: Evidence and Trust.
ICICS 2008: 1-18 |
2007 |
44 | EE | Joshua D. Guttman:
How to do Things with Cryptographic Protocols.
ASIAN 2007: 142-149 |
43 | EE | Shaddin F. Doghmi,
Joshua D. Guttman,
F. Javier Thayer:
Completeness of the Authentication Tests.
ESORICS 2007: 106-121 |
42 | EE | Shaddin F. Doghmi,
Joshua D. Guttman,
F. Javier Thayer:
Searching for Shapes in Cryptographic Protocols.
TACAS 2007: 523-537 |
41 | EE | Jay A. McCarthy,
Shriram Krishnamurthi,
Joshua D. Guttman,
John D. Ramsdell:
Compiling cryptographic protocols for deployment on the web.
WWW 2007: 687-696 |
40 | EE | Shaddin F. Doghmi,
Joshua D. Guttman,
F. Javier Thayer:
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions.
Electr. Notes Theor. Comput. Sci. 173: 85-102 (2007) |
2005 |
39 | EE | Joshua D. Guttman,
Jonathan C. Herzog,
John D. Ramsdell,
Brian T. Sniffen:
Programming Cryptographic Protocols.
TGC 2005: 116-145 |
38 | EE | Joshua D. Guttman,
Amy L. Herzog:
Rigorous automated network security management.
Int. J. Inf. Sec. 4(1-2): 29-48 (2005) |
37 | | Joshua D. Guttman,
Amy L. Herzog,
John D. Ramsdell,
Clement W. Skorupka:
Verifying information flow goals in Security-Enhanced Linux.
Journal of Computer Security 13(1): 115-134 (2005) |
2004 |
36 | EE | Joshua D. Guttman,
F. Javier Thayer,
Jay A. Carlson,
Jonathan C. Herzog,
John D. Ramsdell,
Brian T. Sniffen:
Trust Management in Strand Spaces: A Rely-Guarantee Method.
ESOP 2004: 325-339 |
35 | EE | Joshua D. Guttman:
Security, Protocols, and Trust.
VMCAI 2004: 1 |
34 | | Joshua D. Guttman:
A New Column: Information Security.
Bulletin of the EATCS 82: 242-252 (2004) |
33 | | Joshua D. Guttman:
Authentication tests and disjoint encryption: A design method for security protocols.
Journal of Computer Security 12(3-4): 409-433 (2004) |
32 | | Joshua D. Guttman,
F. Javier Thayer,
Lenore D. Zuck:
The faithfulness of abstract protocol analysis: Message authentication.
Journal of Computer Security 12(6): 865-891 (2004) |
2002 |
31 | EE | Joshua D. Guttman:
Security Protocol Design via Authentication Tests.
CSFW 2002: 92-103 |
30 | EE | Joshua D. Guttman,
F. Javier Thayer:
Authentication tests and the structure of bundles.
Theor. Comput. Sci. 283(2): 333-380 (2002) |
2001 |
29 | EE | Joshua D. Guttman,
F. Javier Thayer,
Lenore D. Zuck:
The faithfulness of abstract protocol analysis: message authentication.
ACM Conference on Computer and Communications Security 2001: 186-195 |
28 | EE | Andre Scedrov,
Ran Canetti,
Joshua D. Guttman,
David Wagner,
Michael Waidner:
Relating Cryptography and Cryptographic Protocols.
CSFW 2001: 111-114 |
27 | EE | Joshua D. Guttman:
Key Compromise, Strand Spaces, and the Authentication Tests.
Electr. Notes Theor. Comput. Sci. 45: (2001) |
2000 |
26 | EE | Joshua D. Guttman,
F. Javier Thayer:
Protocol Independence through Disjoint Encryption.
CSFW 2000: 24-34 |
25 | EE | Joshua D. Guttman,
Amy L. Herzog,
F. Javier Thayer:
Authentication and Confidentiality via IPSEC.
ESORICS 2000: 255-272 |
24 | EE | Joshua D. Guttman:
Security Goals: Packet Trajectories and Strand Spaces.
FOSAD 2000: 197-261 |
23 | EE | Joshua D. Guttman,
F. Javier Thayer:
Authentication Tests.
IEEE Symposium on Security and Privacy 2000: 96-109 |
22 | | William M. Farmer,
Joshua D. Guttman:
A Set Theory with Support for Partial Functions.
Studia Logica 66(1): 59-78 (2000) |
1999 |
21 | EE | F. Javier Thayer,
Jonathan C. Herzog,
Joshua D. Guttman:
Mixed Strand Spaces.
CSFW 1999: 72-82 |
20 | | F. Javier Thayer,
Jonathan C. Herzog,
Joshua D. Guttman:
Strand Spaces: Proving Security Protocols Correct.
Journal of Computer Security 7(1): (1999) |
1998 |
19 | EE | F. Javier Thayer,
Jonathan C. Herzog,
Joshua D. Guttman:
Honest Ideals on Strand Spaces.
CSFW 1998: 66-77 |
18 | EE | F. Javier Thayer,
Jonathan C. Herzog,
Joshua D. Guttman:
Strand Spaces: Why is a Security Protocol Correct?
IEEE Symposium on Security and Privacy 1998: 160-171 |
17 | EE | Shimshon Berkovits,
Joshua D. Guttman,
Vipin Swarup:
Authentication for Mobile Agents.
Mobile Agents and Security 1998: 114-136 |
1997 |
16 | EE | Joshua D. Guttman:
Filtering Postures: Local Enforcement for Global Policies.
IEEE Symposium on Security and Privacy 1997: 120-129 |
1996 |
15 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
IMPS: An Updated System Description.
CADE 1996: 298-302 |
14 | EE | William M. Farmer,
Joshua D. Guttman,
Vipin Swarup:
Security for Mobile Agents: Authentication and State Appraisal.
ESORICS 1996: 118-130 |
1995 |
13 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
Context in Mathematical Reasoning and Computation.
J. Symb. Comput. 19(1-3): 210-206 (1995) |
12 | | Joshua D. Guttman,
John D. Ramsdell,
Vipin Swarup:
The VLISP Verified Scheme System.
Lisp and Symbolic Computation 8(1-2): 33-110 (1995) |
11 | | Joshua D. Guttman,
John D. Ramsdell,
Mitchell Wand:
VLISP: A Verified Implementation of Scheme.
Lisp and Symbolic Computation 8(1-2): 5-32 (1995) |
1994 |
10 | | William M. Farmer,
Joshua D. Guttman,
Mark E. Nadel,
F. Javier Thayer:
Proof Script Pragmatics in IMPS.
CADE 1994: 356-370 |
9 | | Joshua D. Guttman,
Dale M. Johnson:
Three Applications of Formal Methods at MITRE.
FME 1994: 55-65 |
1993 |
8 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
Reasoning with Contexts.
DISCO 1993: 216-228 |
7 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
IMPS: An Interactive Mathematical Proof System.
J. Autom. Reasoning 11(2): 213-248 (1993) |
1992 |
6 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
Little Theories.
CADE 1992: 567-581 |
5 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
IMPS: System Description.
CADE 1992: 701-705 |
4 | | Joshua D. Guttman:
Panel: Use of Formal Methods in the Analysis of Cryptographic Protocols.
CSFW 1992: 112 |
1990 |
3 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
IMPS: An Interactive Mathematical Proof System.
CADE 1990: 653-654 |
2 | | Joshua D. Guttman,
H.-P. Ko:
Verifying a Hardware Security Architecture.
IEEE Symposium on Security and Privacy 1990: 333-344 |
1988 |
1 | | Joshua D. Guttman,
Mark E. Nadel:
What Needs Securing.
CSFW 1988: 34-57 |