dblp.uni-trier.dewww.uni-trier.de

Jonathan K. Millen

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
36EEJonathan K. Millen: Rewriting Techniques in the Constraint Solver. Electr. Notes Theor. Comput. Sci. 234: 77-91 (2009)
2005
35EEJonathan K. Millen, Vitaly Shmatikov: Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. Journal of Computer Security 13(3): 515-564 (2005)
34EEJonathan K. Millen, Vitaly Shmatikov: Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. Journal of Computer Security 13(4): 695- (2005)
2003
33EEJonathan K. Millen, Vitaly Shmatikov: Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. CSFW 2003: 47-61
32EEJonathan K. Millen, Grit Denker: MuCAPSL. DISCEX (1) 2003: 238-
31EEJonathan K. Millen: On the freedom of decryption. Inf. Process. Lett. 86(6): 329-333 (2003)
2002
30EEGrit Denker, Jonathan K. Millen, Yutaka Miyake: Cross-Domain Access Control via PKI. POLICY 2002: 202-205
29EEGrit Denker, Jonathan K. Millen: Modeling Group Communication Protocols Using Multiset Term Rewriting. Electr. Notes Theor. Comput. Sci. 71: (2002)
2001
28EEJonathan K. Millen, Vitaly Shmatikov: Constraint solving for bounded-process cryptographic protocol analysis. ACM Conference on Computer and Communications Security 2001: 166-175
27EEPeter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor: Non-Interference: Who Needs It? CSFW 2001: 237-
26EEVéronique Cortier, Jonathan K. Millen, Harald Rueß: Proving Secrecy is Easy Enough. CSFW 2001: 97-
25 Rebecca N. Wright, Patrick Lincoln, Jonathan K. Millen: Depender Graphs: A Method of Fault-Tolerant Certificate Distribution. Journal of Computer Security 9(4): 323-338 (2001)
2000
24EERebecca N. Wright, Patrick Lincoln, Jonathan K. Millen: Efficient fault-tolerant certificate revocation. ACM Conference on Computer and Communications Security 2000: 19-24
23EEJonathan K. Millen, Rebecca N. Wright: Reasoning about Trust and Insurance in a Public Key Infrastructure. CSFW 2000: 16-22
22EEGrit Denker, Jonathan K. Millen, Antonio Grau, Juliana Küster Filipe: Optimizing Protocol Rewrite Rules of CIL Specifications. CSFW 2000: 52-62
21EEJonathan K. Millen, Harald Rueß: Protocol-Independent Secrecy. IEEE Symposium on Security and Privacy 2000: 110-209
20EEJonathan K. Millen: Applications of Term Rewriting to Cryptographic Protocol Analysis overview of the invited talk. Electr. Notes Theor. Comput. Sci. 36: (2000)
1999
19EEJonathan K. Millen: 20 Years of Covert Channel Modeling and Analysis. IEEE Symposium on Security and Privacy 1999: 113-114
18EEJonathan K. Millen: Local Reconfiguration Policies. IEEE Symposium on Security and Privacy 1999: 48-56
1996
17EEJonathan K. Millen, Hai-Ping Ko: Narrowing terminates for encryption. CSFW 1996: 39-
1995
16 Jonathan K. Millen: Unwinding Forward Correctability. Journal of Computer Security 3(1): 35-54 (1995)
1994
15 Jonathan K. Millen: Unwinding Forward Correctability. CSFW 1994: 2-10
14 Richard A. Kemmerer, Catherine Meadows, Jonathan K. Millen: Three System for Cryptographic Protocol Analysis. J. Cryptology 7(2): 79-130 (1994)
1993
13 Jonathan K. Millen: A Resource Allocation Model for Denial of Service Protection. Journal of Computer Security 2(2-3): 89-106 (1993)
1990
12 Jonathan K. Millen: Hookup Security for Synchronous Machines. CSFW 1990: 84-90
1989
11 Jonathan K. Millen: Finite-State Noiseless Covert Channels. CSFW 1989: 81-86
10 Jonathan K. Millen: Models of Multilevel Computer Security. Advances in Computers 29: 1-45 (1989)
1987
9 Jonathan K. Millen: Covert Channel Capacity. IEEE Symposium on Security and Privacy 1987: 60-66
8 Jonathan K. Millen, Sidney C. Clark, Sheryl B. Freedman: The Interrogator: Protocol Security Analysis. IEEE Trans. Software Eng. 13(2): 274-288 (1987)
1984
7 Jonathan K. Millen: The Interrogator: A Tool for Cryptographic Protocol Security. IEEE Symposium on Security and Privacy 1984: 134-141
1983
6 Bahaa W. Fam, Jonathan K. Millen: The Channel Assignment Problem. IEEE Symposium on Security and Privacy 1983: 107-112
1982
5 Jonathan K. Millen: Kernel Isolation for the PDP-11/70. IEEE Symposium on Security and Privacy 1982: 57-65
1981
4 Maureen Harris Cheheyl, Morrie Gasser, George A. Huff, Jonathan K. Millen: Verifying Security. ACM Comput. Surv. 13(3): 279-339 (1981)
3EEJonathan K. Millen, David L. Drake: An experiment with affirm and HDM. Journal of Systems and Software 2(2): 159-175 (1981)
1976
2 Jonathan K. Millen: Security Kernel Validation in Practice. Commun. ACM 19(5): 243-250 (1976)
1974
1 Jonathan K. Millen: Construction with Parallel Derivatives of the Closure of a Parallel Program Schema STOC 1974: 242-247

Coauthor Index

1Juliana Küster Filipe Bowles (Juliana Küster Filipe) [22]
2Maureen Harris Cheheyl [4]
3Sidney C. Clark [8]
4Véronique Cortier [26]
5Grit Denker [22] [29] [30] [32]
6David L. Drake [3]
7Bahaa W. Fam [6]
8Sheryl B. Freedman [8]
9Morrie Gasser [4]
10Virgil D. Gligor [27]
11Antonio Grau [22]
12George A. Huff [4]
13Richard A. Kemmerer [14]
14Hai-Ping Ko [17]
15Patrick Lincoln [24] [25]
16John D. McLean [27]
17Catherine Meadows [14]
18Yutaka Miyake [30]
19Harald Rueß [21] [26]
20Peter Y. A. Ryan (Peter Ryan) [27]
21Vitaly Shmatikov [28] [33] [34] [35]
22Rebecca N. Wright [23] [24] [25]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)