Joshua D. Guttman

According to our database1, Joshua D. Guttman authored at least 84 papers between 1988 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Understanding Attestation: Analyzing Protocols that Use Quotes.
Proceedings of the Security and Trust Management - 15th International Workshop, 2019

Enrich-by-Need Protocol Analysis for Diffie-Hellman.
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019

2018
Homomorphisms and Minimality for Enrich-by-Need Security Analysis.
CoRR, 2018

Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version).
CoRR, 2018

Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA.
Proceedings of the Integrated Formal Methods - 14th International Conference, 2018

2017
Information Flow, Distributed Systems, and Refinement, by Example.
Proceedings of the Concurrency, Security, and Puzzles, 2017

2016
Measuring protocol strength with security goals.
Int. J. Inf. Sec., 2016

Cross-Tool Semantics for Protocol Security Goals.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

Localizing Firewall Security Policies.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Hash-Based TPM Signatures for the Quantum World.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Formal Support for Standardizing Protocols with State.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Composable Bounds on Information Flow from Distribution Differences.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

A Cut Principle for Information Flow.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Limited Disclosure and Locality in Graphs.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
Establishing and preserving protocol security goals.
J. Comput. Secur., 2014

Security Goals and Evolving Standards.
Proceedings of the Security Standardisation Research - First International Conference, 2014

A Hybrid Analysis for Security Protocols with State.
Proceedings of the Integrated Formal Methods - 11th International Conference, 2014

Decidability for Lightweight Diffie-Hellman Protocols.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
Secure ad hoc trust initialization and key management in wireless body area networks.
ACM Trans. Sens. Networks, 2013

Preface.
J. Comput. Secur., 2013

Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Sessions and Separability in Security Protocols.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Robust distributed stream processing.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

2012
State and Progress in Strand Spaces: Proving Fair Exchange.
J. Autom. Reason., 2012

An Analysis of the CAVES Attestation Protocol using CPSA
CoRR, 2012

Symbolic Protocol Analysis for Diffie-Hellman
CoRR, 2012

An Algebra for Symbolic Diffie-Hellman Protocol Analysis.
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012

Trust Engineering via Security Protocols.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012

2011
Principles of remote attestation.
Int. J. Inf. Sec., 2011

Security Goals and Protocol Transformations.
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011

Shapes: Surveying Crypto Protocol Runs.
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011

2010
Metric Strand Spaces for Locale Authentication Protocols.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

2009
Introduction.
J. Comput. Secur., 2009

Execution Models for Choreographies and Cryptoprotocols
Proceedings of the Proceedings Second International Workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software, 2009

Choreographies with Secure Boxes and Compromised Principals
Proceedings of the Proceedings 2nd Interaction and Concurrency Experience: Structured Interactions, 2009

Security Theorems via Model Theory
Proceedings of the Proceedings 16th International Workshop on Expressiveness in Concurrency, 2009

Fair Exchange in Strand Spaces
Proceedings of the Proceedings 7th International Workshop on Security Issues in Concurrency, 2009

Transformations between Cryptographic Protocols.
Proceedings of the Foundations and Applications of Security Analysis, 2009

2008
Cryptographic Protocol Composition via the Authentication Tests.
IACR Cryptol. ePrint Arch., 2008

Attestation: Evidence and Trust.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

2007
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions.
Proceedings of the 23rd Conference on the Mathematical Foundations of Programming Semantics, 2007

Compiling cryptographic protocols for deployment on the web.
Proceedings of the 16th International Conference on World Wide Web, 2007

Searching for Shapes in Cryptographic Protocols.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2007

Completeness of the Authentication Tests.
Proceedings of the Computer Security, 2007

How to do Things with Cryptographic Protocols.
Proceedings of the Advances in Computer Science, 2007

2006
Searching for Shapes in Cryptographic Protocols (extended version).
IACR Cryptol. ePrint Arch., 2006

2005
Verifying information flow goals in Security-Enhanced Linux.
J. Comput. Secur., 2005

Rigorous automated network security management.
Int. J. Inf. Sec., 2005

Programming Cryptographic Protocols.
Proceedings of the Trustworthy Global Computing, International Symposium, 2005

2004
The faithfulness of abstract protocol analysis: Message authentication.
J. Comput. Secur., 2004

Authentication tests and disjoint encryption: A design method for security protocols.
J. Comput. Secur., 2004

A New Column: Information Security.
Bull. EATCS, 2004

Security, Protocols, and Trust.
Proceedings of the Verification, 2004

Trust Management in Strand Spaces: A Rely-Guarantee Method.
Proceedings of the Programming Languages and Systems, 2004

2003
Guest editorial overview.
IEEE J. Sel. Areas Commun., 2003

2002
Authentication tests and the structure of bundles.
Theor. Comput. Sci., 2002

Security Protocol Design via Authentication Tests.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2001
Key Compromise, Strand Spaces, and the Authentication Tests.
Proceedings of the Seventeenth Conference on the Mathematical Foundations of Programming Semantics, 2001

Relating Cryptography and Cryptographic Protocols.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

2000
A Set Theory with Support for Partial Functions.
Stud Logica, 2000

Authentication Tests.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Security Goals: Packet Trajectories and Strand Spaces.
Proceedings of the Foundations of Security Analysis and Design, 2000

Authentication and Confidentiality via IPSEC.
Proceedings of the Computer Security, 2000

Protocol Independence through Disjoint Encryption.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

1999
Strand Spaces: Proving Security Protocols Correct.
J. Comput. Secur., 1999

Mixed Strand Spaces.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

1998
Strand Spaces: Why is a Security Protocol Correct?
Proceedings of the Security and Privacy, 1998

Authentication for Mobile Agents.
Proceedings of the Mobile Agents and Security, 1998

Honest Ideals on Strand Spaces.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
Filtering Postures: Local Enforcement for Global Policies.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

1996
Security for Mobile Agents: Authentication and State Appraisal.
Proceedings of the Computer Security, 1996

IMPS: An Updated System Description.
Proceedings of the Automated Deduction - CADE-13, 13th International Conference on Automated Deduction, New Brunswick, NJ, USA, July 30, 1996

1995
VLISP: A Verified Implementation of Scheme.
LISP Symb. Comput., 1995

The VLISP Verified Scheme System.
LISP Symb. Comput., 1995

Context in Mathematical Reasoning and Computation.
J. Symb. Comput., 1995

1994
Three Applications of Formal Methods at MITRE.
Proceedings of the FME '94: Industrial Benefit of Formal Methods, 1994

Proof Script Pragmatics in IMPS.
Proceedings of the Automated Deduction - CADE-12, 12th International Conference on Automated Deduction, Nancy, France, June 26, 1994

1993
IMPS: An Interactive Mathematical Proof System.
J. Autom. Reason., 1993

Reasoning with Contexts.
Proceedings of the Design and Implementation of Symbolic Computation Systems, 1993

1992
Panel: Use of Formal Methods in the Analysis of Cryptographic Protocols.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992

IMPS: System Description.
Proceedings of the Automated Deduction, 1992

Little Theories.
Proceedings of the Automated Deduction, 1992

1990
Verifying a Hardware Security Architecture.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990

1988
What Needs Securing.
Proceedings of the First IEEE Computer Security Foundations Workshop, 1988


  Loading...