2005 | ||
---|---|---|
3 | EE | Joshua D. Guttman, Amy L. Herzog: Rigorous automated network security management. Int. J. Inf. Sec. 4(1-2): 29-48 (2005) |
2 | Joshua D. Guttman, Amy L. Herzog, John D. Ramsdell, Clement W. Skorupka: Verifying information flow goals in Security-Enhanced Linux. Journal of Computer Security 13(1): 115-134 (2005) | |
2000 | ||
1 | EE | Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer: Authentication and Confidentiality via IPSEC. ESORICS 2000: 255-272 |
1 | Joshua D. Guttman | [1] [2] [3] |
2 | John D. Ramsdell | [2] |
3 | Clement W. Skorupka | [2] |
4 | F. Javier Thayer | [1] |