dblp.uni-trier.dewww.uni-trier.de

Joshua D. Guttman

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
47EEPierpaolo Degano, Joshua D. Guttman, Fabio Martinelli: Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers Springer 2009
46EEJoshua D. Guttman: Cryptographic Protocol Composition via the Authentication Tests. FOSSACS 2009: 303-317
2008
45EEGeorge Coker, Joshua D. Guttman, Peter Loscocco, Justin Sheehy, Brian T. Sniffen: Attestation: Evidence and Trust. ICICS 2008: 1-18
2007
44EEJoshua D. Guttman: How to do Things with Cryptographic Protocols. ASIAN 2007: 142-149
43EEShaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer: Completeness of the Authentication Tests. ESORICS 2007: 106-121
42EEShaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer: Searching for Shapes in Cryptographic Protocols. TACAS 2007: 523-537
41EEJay A. McCarthy, Shriram Krishnamurthi, Joshua D. Guttman, John D. Ramsdell: Compiling cryptographic protocols for deployment on the web. WWW 2007: 687-696
40EEShaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer: Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions. Electr. Notes Theor. Comput. Sci. 173: 85-102 (2007)
2005
39EEJoshua D. Guttman, Jonathan C. Herzog, John D. Ramsdell, Brian T. Sniffen: Programming Cryptographic Protocols. TGC 2005: 116-145
38EEJoshua D. Guttman, Amy L. Herzog: Rigorous automated network security management. Int. J. Inf. Sec. 4(1-2): 29-48 (2005)
37 Joshua D. Guttman, Amy L. Herzog, John D. Ramsdell, Clement W. Skorupka: Verifying information flow goals in Security-Enhanced Linux. Journal of Computer Security 13(1): 115-134 (2005)
2004
36EEJoshua D. Guttman, F. Javier Thayer, Jay A. Carlson, Jonathan C. Herzog, John D. Ramsdell, Brian T. Sniffen: Trust Management in Strand Spaces: A Rely-Guarantee Method. ESOP 2004: 325-339
35EEJoshua D. Guttman: Security, Protocols, and Trust. VMCAI 2004: 1
34 Joshua D. Guttman: A New Column: Information Security. Bulletin of the EATCS 82: 242-252 (2004)
33 Joshua D. Guttman: Authentication tests and disjoint encryption: A design method for security protocols. Journal of Computer Security 12(3-4): 409-433 (2004)
32 Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck: The faithfulness of abstract protocol analysis: Message authentication. Journal of Computer Security 12(6): 865-891 (2004)
2002
31EEJoshua D. Guttman: Security Protocol Design via Authentication Tests. CSFW 2002: 92-103
30EEJoshua D. Guttman, F. Javier Thayer: Authentication tests and the structure of bundles. Theor. Comput. Sci. 283(2): 333-380 (2002)
2001
29EEJoshua D. Guttman, F. Javier Thayer, Lenore D. Zuck: The faithfulness of abstract protocol analysis: message authentication. ACM Conference on Computer and Communications Security 2001: 186-195
28EEAndre Scedrov, Ran Canetti, Joshua D. Guttman, David Wagner, Michael Waidner: Relating Cryptography and Cryptographic Protocols. CSFW 2001: 111-114
27EEJoshua D. Guttman: Key Compromise, Strand Spaces, and the Authentication Tests. Electr. Notes Theor. Comput. Sci. 45: (2001)
2000
26EEJoshua D. Guttman, F. Javier Thayer: Protocol Independence through Disjoint Encryption. CSFW 2000: 24-34
25EEJoshua D. Guttman, Amy L. Herzog, F. Javier Thayer: Authentication and Confidentiality via IPSEC. ESORICS 2000: 255-272
24EEJoshua D. Guttman: Security Goals: Packet Trajectories and Strand Spaces. FOSAD 2000: 197-261
23EEJoshua D. Guttman, F. Javier Thayer: Authentication Tests. IEEE Symposium on Security and Privacy 2000: 96-109
22 William M. Farmer, Joshua D. Guttman: A Set Theory with Support for Partial Functions. Studia Logica 66(1): 59-78 (2000)
1999
21EEF. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman: Mixed Strand Spaces. CSFW 1999: 72-82
20 F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman: Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security 7(1): (1999)
1998
19EEF. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman: Honest Ideals on Strand Spaces. CSFW 1998: 66-77
18EEF. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman: Strand Spaces: Why is a Security Protocol Correct? IEEE Symposium on Security and Privacy 1998: 160-171
17EEShimshon Berkovits, Joshua D. Guttman, Vipin Swarup: Authentication for Mobile Agents. Mobile Agents and Security 1998: 114-136
1997
16EEJoshua D. Guttman: Filtering Postures: Local Enforcement for Global Policies. IEEE Symposium on Security and Privacy 1997: 120-129
1996
15 William M. Farmer, Joshua D. Guttman, F. Javier Thayer: IMPS: An Updated System Description. CADE 1996: 298-302
14EEWilliam M. Farmer, Joshua D. Guttman, Vipin Swarup: Security for Mobile Agents: Authentication and State Appraisal. ESORICS 1996: 118-130
1995
13 William M. Farmer, Joshua D. Guttman, F. Javier Thayer: Context in Mathematical Reasoning and Computation. J. Symb. Comput. 19(1-3): 210-206 (1995)
12 Joshua D. Guttman, John D. Ramsdell, Vipin Swarup: The VLISP Verified Scheme System. Lisp and Symbolic Computation 8(1-2): 33-110 (1995)
11 Joshua D. Guttman, John D. Ramsdell, Mitchell Wand: VLISP: A Verified Implementation of Scheme. Lisp and Symbolic Computation 8(1-2): 5-32 (1995)
1994
10 William M. Farmer, Joshua D. Guttman, Mark E. Nadel, F. Javier Thayer: Proof Script Pragmatics in IMPS. CADE 1994: 356-370
9 Joshua D. Guttman, Dale M. Johnson: Three Applications of Formal Methods at MITRE. FME 1994: 55-65
1993
8 William M. Farmer, Joshua D. Guttman, F. Javier Thayer: Reasoning with Contexts. DISCO 1993: 216-228
7 William M. Farmer, Joshua D. Guttman, F. Javier Thayer: IMPS: An Interactive Mathematical Proof System. J. Autom. Reasoning 11(2): 213-248 (1993)
1992
6 William M. Farmer, Joshua D. Guttman, F. Javier Thayer: Little Theories. CADE 1992: 567-581
5 William M. Farmer, Joshua D. Guttman, F. Javier Thayer: IMPS: System Description. CADE 1992: 701-705
4 Joshua D. Guttman: Panel: Use of Formal Methods in the Analysis of Cryptographic Protocols. CSFW 1992: 112
1990
3 William M. Farmer, Joshua D. Guttman, F. Javier Thayer: IMPS: An Interactive Mathematical Proof System. CADE 1990: 653-654
2 Joshua D. Guttman, H.-P. Ko: Verifying a Hardware Security Architecture. IEEE Symposium on Security and Privacy 1990: 333-344
1988
1 Joshua D. Guttman, Mark E. Nadel: What Needs Securing. CSFW 1988: 34-57

Coauthor Index

1Shimshon Berkovits [17]
2Ran Canetti [28]
3Jay A. Carlson [36]
4George Coker [45]
5Pierpaolo Degano [47]
6Shaddin F. Doghmi [40] [42] [43]
7William M. Farmer [3] [5] [6] [7] [8] [10] [13] [14] [15] [22]
8Amy L. Herzog [25] [37] [38]
9Jonathan C. Herzog [18] [19] [20] [21] [36] [39]
10Dale M. Johnson [9]
11H.-P. Ko [2]
12Shriram Krishnamurthi [41]
13Peter Loscocco [45]
14Fabio Martinelli [47]
15Jay A. McCarthy [41]
16Mark E. Nadel [1] [10]
17John D. Ramsdell [11] [12] [36] [37] [39] [41]
18Andre Scedrov [28]
19Justin Sheehy [45]
20Clement W. Skorupka [37]
21Brian T. Sniffen [36] [39] [45]
22Vipin Swarup [12] [14] [17]
23F. Javier Thayer [3] [5] [6] [7] [8] [10] [13] [15] [18] [19] [20] [21] [23] [25] [26] [29] [30] [32] [36] [40] [42] [43]
24David Wagner [28]
25Michael Waidner [28]
26Mitchell Wand [11]
27Lenore D. Zuck [29] [32]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)