Jonathan K. Millen

According to our database1, Jonathan K. Millen authored at least 45 papers between 1974 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2012
An Analysis of the CAVES Attestation Protocol using CPSA
CoRR, 2012

2011
Formal Methods for the Orange Book.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Biba Model.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Principles of remote attestation.
Int. J. Inf. Sec., 2011

2009
Rewriting Techniques in the Constraint Solver.
Electr. Notes Theor. Comput. Sci., 2009

2005
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation.
Journal of Computer Security, 2005

2003
On the freedom of decryption.
Inf. Process. Lett., 2003

MuCAPSL.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

2002
Modeling Group Communication Protocols Using Multiset Term Rewriting.
Electr. Notes Theor. Comput. Sci., 2002

Cross-Domain Access Control via PKI.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

2001
Depender Graphs: A Method of Fault-Tolerant Certificate Distribution.
Journal of Computer Security, 2001

Non-Interference: Who Needs It?
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

Proving Secrecy is Easy Enough.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

Constraint solving for bounded-process cryptographic protocol analysis.
Proceedings of the CCS 2001, 2001

2000
Applications of Term Rewriting to Cryptographic Protocol Analysis overview of the invited talk.
Electr. Notes Theor. Comput. Sci., 2000

Protocol-Independent Secrecy.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Reasoning about Trust and Insurance in a Public Key Infrastructure.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

Optimizing Protocol Rewrite Rules of CIL Specifications.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

Efficient fault-tolerant certificate revocation.
Proceedings of the CCS 2000, 2000

1999
20 Years of Covert Channel Modeling and Analysis.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

Local Reconfiguration Policies.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

1996
CAPSL: Common Authentication Protocol Specification Language.
Proceedings of the 1996 Workshop on New Security Paradigms, 1996

Narrowing terminates for encryption.
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996

1995
Unwinding Forward Correctability.
Journal of Computer Security, 1995

The Interrogator model.
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995

1994
Three System for Cryptographic Protocol Analysis.
J. Cryptology, 1994

Unwinding Forward Correctability.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

1993
A Resource Allocation Model for Denial of Service Protection.
Journal of Computer Security, 1993

1992
Security for object-oriented database systems.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

A resource allocation model for denial of service.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

1990
Hookup Security for Synchronous Machines.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990

1989
Models of Multilevel Computer Security.
Advances in Computers, 1989

Finite-State Noiseless Covert Channels.
Proceedings of the Second IEEE Computer Security Foundations Workshop, 1989

1987
The Interrogator: Protocol Security Analysis.
IEEE Trans. Software Eng., 1987

Covert Channel Capacity.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

1984
The Interrogator: A Tool for Cryptographic Protocol Security.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

1983
The Channel Assignment Problem.
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983

1982
Kernel Isolation for the PDP-11/70.
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982

1981
An experiment with affirm and HDM.
Journal of Systems and Software, 1981

Verifying Security.
ACM Comput. Surv., 1981

Information Flow Analysis of Formal Specifications.
Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981

1978
Example of a formal flow violation.
Proceedings of the IEEE Computer Society's Second International Computer Software and Applications Conference, 1978

1976
Security Kernel Validation in Practice.
Commun. ACM, 1976

1974
Construction with Parallel Derivatives of the Closure of a Parallel Program Schema
Proceedings of the 6th Annual ACM Symposium on Theory of Computing, April 30, 1974


  Loading...