Paul D. Rowe

Affiliations:
  • The MITRE Corporation, Bedford, MA, USA


According to our database1, Paul D. Rowe authored at least 25 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Evidence Tampering and Chain of Custody in Layered Attestations.
CoRR, 2024

2021
Flexible Mechanisms for Remote Attestation.
ACM Trans. Priv. Secur., 2021

Automated Trust Analysis of Copland Specifications for Layered Attestations✱.
Proceedings of the PPDP 2021: 23rd International Symposium on Principles and Practice of Declarative Programming, 2021

On Orderings in Security Models.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
Assumption-Based Analysis of Distance-Bounding Protocols with cpsa.
Proceedings of the Logic, 2020

2019
Orchestrating Layered Attestations.
Proceedings of the Principles of Security and Trust - 8th International Conference, 2019

Limitations on observability of effects in cyber-physical systems.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

Enrich-by-Need Protocol Analysis for Diffie-Hellman.
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019

2018
Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version).
CoRR, 2018

Mission-focused cyber situational understanding via graph analytics.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

2017
Continuous Verification for Cryptographic Protocol Development.
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 2017

2016
Measuring protocol strength with security goals.
Int. J. Inf. Sec., 2016

Principles of Layered Attestation.
CoRR, 2016

Bundling Evidence for Layered Attestation.
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016

Cross-Tool Semantics for Protocol Security Goals.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

Decision-theoretic approach to designing cyber resilient systems.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

Confining Adversary Actions via Measurement.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016

2015
Formal Support for Standardizing Protocols with State.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

A Cut Principle for Information Flow.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Security Goals and Evolving Standards.
Proceedings of the Security Standardisation Research - First International Conference, 2014

A Hybrid Analysis for Security Protocols with State.
Proceedings of the Integrated Formal Methods - 11th International Conference, 2014

2011
Collaborative Planning with Confidentiality.
J. Autom. Reason., 2011

2009
Policy Compliance in Collaborative Systems.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

2008
Analysis of EAP-GPSK Authentication Protocol.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Collaborative Planning With Privacy.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007


  Loading...