Jonathan K. Millen

Orcid: 0000-0003-1896-5225

Affiliations:
  • MITRE Corporation, Bedford, MA, USA


According to our database1, Jonathan K. Millen authored at least 52 papers between 1967 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Adapting Constraint Solving to Automatically Analyze UPI Protocols.
Proceedings of the Protocols, Strands, and Logic, 2021

2019
A Long, Slow Conversation.
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019

2012
An Analysis of the CAVES Attestation Protocol using CPSA
CoRR, 2012

2011
Formal Methods for the Orange Book.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Biba Model.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Principles of remote attestation.
Int. J. Inf. Sec., 2011

Constraint solving techniques and enriching the model with equational theories.
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011

2010
Editorial.
J. Comput. Secur., 2010

2008
Rewriting Techniques in the Constraint Solver.
Proceedings of the Third International Workshop on Security and Rewriting Techniques, 2008

2005
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation.
J. Comput. Secur., 2005

2003
On the freedom of decryption.
Inf. Process. Lett., 2003

MuCAPSL.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

2002
Modeling Group Communication Protocols Using Multiset Term Rewriting.
Proceedings of the Fourth International Workshop on Rewriting logic and Its Applications, 2002

Cross-Domain Access Control via PKI.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

2001
Depender Graphs: A Method of Fault-Tolerant Certificate Distribution.
J. Comput. Secur., 2001

Non-Interference: Who Needs It?
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

Proving Secrecy is Easy Enough.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

Constraint solving for bounded-process cryptographic protocol analysis.
Proceedings of the CCS 2001, 2001

2000
Applications of Term Rewriting to Cryptographic Protocol Analysis overview of the invited talk.
Proceedings of the 3rd International Workshop on Rewriting Logic and its Applications, 2000

Protocol-Independent Secrecy.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Reasoning about Trust and Insurance in a Public Key Infrastructure.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

Optimizing Protocol Rewrite Rules of CIL Specifications.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

Efficient fault-tolerant certificate revocation.
Proceedings of the CCS 2000, 2000

1999
20 Years of Covert Channel Modeling and Analysis.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

Local Reconfiguration Policies.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

1996
CAPSL: Common Authentication Protocol Specification Language.
Proceedings of the 1996 Workshop on New Security Paradigms, 1996

Narrowing terminates for encryption.
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996

1995
Unwinding Forward Correctability.
J. Comput. Secur., 1995

The Interrogator model.
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995

1994
Three System for Cryptographic Protocol Analysis.
J. Cryptol., 1994

1993
A Resource Allocation Model for Denial of Service Protection.
J. Comput. Secur., 1993

1992
Security for object-oriented database systems.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

A resource allocation model for denial of service.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

1990
Hookup Security for Synchronous Machines.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990

1989
Models of Multilevel Computer Security.
Adv. Comput., 1989

Finite-State Noiseless Covert Channels.
Proceedings of the Second IEEE Computer Security Foundations Workshop, 1989

1987
The Interrogator: Protocol Security Analysis.
IEEE Trans. Software Eng., 1987

Covert Channel Capacity.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

1984
The Interrogator: A Tool for Cryptographic Protocol Security.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

1983
The Channel Assignment Problem.
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983

1982
Kernel Isolation for the PDP-11/70.
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982

1981
Recent verification work at MITRE.
ACM SIGSOFT Softw. Eng. Notes, 1981

An experiment with affirm and HDM.
J. Syst. Softw., 1981

Verifying Security.
ACM Comput. Surv., 1981

Information Flow Analysis of Formal Specifications.
Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981

1980
A note on information flow into arrays.
ACM SIGSOFT Softw. Eng. Notes, 1980

1978
Example of a formal flow violation.
Proceedings of the IEEE Computer Society's Second International Computer Software and Applications Conference, 1978

1976
Security Kernel Validation in Practice.
Commun. ACM, 1976

1974
Construction with Parallel Derivatives of the Closure of a Parallel Program Schema
Proceedings of the 6th Annual ACM Symposium on Theory of Computing, April 30, 1974

1972
Microtext: the design of a microprogrammed finite state search machine for full-text retrieval.
Proceedings of the American Federation of Information Processing Societies: Proceedings of the AFIPS '72 Fall Joint Computer Conference, December 5-7, 1972, Anaheim, California, USA, 1972

1967
CHARYBDIS: a LISP program to display mathematical expressions on typewriter-like devices.
Proceedings of the ACM Symposium on Interactive Systems for Experimental Applied Mathematics, 1967


  Loading...