Search the dblp DataBase
Richard A. Kemmerer :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Bruce J. Walker , Richard A. Kemmerer , Gerald J. Popek Specification and Verification of the UCLA Unix Security Kernel. [Citation Graph (2, 0)][DBLP ] Commun. ACM, 1980, v:23, n:2, pp:118-131 [Journal ] J. Thomas Haigh , Richard A. Kemmerer , John McHugh , William D. Young An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:157-168 [Journal ] Koral Ilgun , Richard A. Kemmerer , Phillip A. Porras State Transition Analysis: A Rule-Based Intrusion Detection Approach. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1995, v:21, n:3, pp:181-199 [Journal ] Darren Mutz , Giovanni Vigna , Richard A. Kemmerer An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 2003, pp:374-383 [Conf ] Richard A. Kemmerer A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:109-118 [Conf ] Richard A. Kemmerer , Tad Taylor A Modular Covert Channel Analysis Methodology for Trusted DG/UX/sup TM/. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:224-235 [Conf ] André L. M. dos Santos , Richard A. Kemmerer Implementing Security Policies using the Safe Areas of Computation Approach. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:90-99 [Conf ] André L. M. dos Santos , Richard A. Kemmerer Safe Areas of Computation for Secure Computing with Insecure Applications. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:35-44 [Conf ] Giovanni Vigna , Sumit Gwalani , Kavitha Srinivasan , Elizabeth M. Belding-Royer , Richard A. Kemmerer An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:16-27 [Conf ] Giovanni Vigna , Richard A. Kemmerer NetSTAT: A Network-Based Intrusion Detection Approach. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:25-0 [Conf ] Giovanni Vigna , William K. Robertson , Vishal Kher , Richard A. Kemmerer A Stateful Intrusion Detection System for World-Wide Web Servers. [Citation Graph (0, 0)][DBLP ] ACSAC, 2003, pp:34-45 [Conf ] Giovanni Vigna , Fredrik Valeur , Jingyu Zhou , Richard A. Kemmerer Composable Tools For Network Discovery and Security Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:14-24 [Conf ] Zhe Dang , Oscar H. Ibarra , Tevfik Bultan , Richard A. Kemmerer , Jianwen Su Binary Reachability Analysis of Discrete Pushdown Timed Automata. [Citation Graph (0, 0)][DBLP ] CAV, 2000, pp:69-84 [Conf ] Zhe Dang , Oscar H. Ibarra , Richard A. Kemmerer Decidable Approximations on Generalized and Parameterized Discrete Timed Automata. [Citation Graph (0, 0)][DBLP ] COCOON, 2001, pp:529-539 [Conf ] Richard A. Kemmerer Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:289-305 [Conf ] Richard A. Kemmerer Formal Specification and Verification Techniques for Secure Database Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:229-240 [Conf ] Richard A. Kemmerer Formal Specification of a Mental Health Delivery System. [Citation Graph (0, 0)][DBLP ] DBSec, 1989, pp:341-351 [Conf ] Richard A. Kemmerer A Multilevel Formal Specification of a Mental Health Care Database. [Citation Graph (0, 0)][DBLP ] DBSec, 1990, pp:27-52 [Conf ] André Årnes , Paul Haas , Giovanni Vigna , Richard A. Kemmerer Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. [Citation Graph (0, 0)][DBLP ] DIMVA, 2006, pp:144-163 [Conf ] Carlo Ghezzi , Richard A. Kemmerer ASTRAL: An Assertion Language for Specifying Realtime Systems. [Citation Graph (0, 0)][DBLP ] ESEC, 1991, pp:122-146 [Conf ] Alberto Coen-Porisini , Richard A. Kemmerer , Dino Mandrioli A Formal Framework for ASTRAL Inter-level Proof Obligations. [Citation Graph (0, 0)][DBLP ] ESEC, 1995, pp:90-108 [Conf ] Richard A. Kemmerer Security Issues in Distributed Software. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 1997, pp:52-59 [Conf ] Richard A. Kemmerer Analyzing Encryption Protocols Using Formal Verification Techniques. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:48- [Conf ] Paul Z. Kolano , Richard A. Kemmerer , Dino Mandrioli Parallel Refinement Mechanisms for Real-Time Systems. [Citation Graph (0, 0)][DBLP ] FASE, 2000, pp:35-50 [Conf ] Richard A. Kemmerer Formally Specifying and Verifying Real-Time Systems. [Citation Graph (0, 0)][DBLP ] ICFEM, 1997, pp:112-0 [Conf ] Zhe Dang , Richard A. Kemmerer Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems. [Citation Graph (0, 0)][DBLP ] ICSE, 2000, pp:345-354 [Conf ] Zhe Dang , Richard A. Kemmerer Using the ASTRAL Model Checker to Analyze Mobile IP. [Citation Graph (0, 0)][DBLP ] ICSE, 1999, pp:132-142 [Conf ] Richard A. Kemmerer Completely Validated Software. [Citation Graph (0, 0)][DBLP ] ICSE, 1989, pp:359-360 [Conf ] Richard A. Kemmerer Cybersecurity. [Citation Graph (0, 0)][DBLP ] ICSE, 2003, pp:705-717 [Conf ] Richard A. Kemmerer , Giovanni Vigna Internet Security and Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ICSE, 2003, pp:748-749 [Conf ] Jeffrey Douglas , Richard A. Kemmerer Aslantest: A Symbolic Execution Tool for Testing Aslan Formal Specifications. [Citation Graph (0, 0)][DBLP ] ISSTA, 1994, pp:15-27 [Conf ] Richard G. Hamlet , Richard A. Kemmerer , Edward F. Miller , Debra J. Richardson The Most Influential Papers from the ISSTA Research Community (Panel). [Citation Graph (0, 0)][DBLP ] ISSTA, 1998, pp:49- [Conf ] Alberto Coen-Porisini , Richard A. Kemmerer The Composability of ASTRAL Realtime Specifications. [Citation Graph (0, 0)][DBLP ] ISSTA, 1993, pp:128-138 [Conf ] Richard Denney , Richard A. Kemmerer , Nancy G. Leveson , Alberto Savoia Why State-of-the-Art is not State-of-the-Practice (Panel Abstract). [Citation Graph (0, 0)][DBLP ] ISSTA, 1996, pp:293- [Conf ] Paul Z. Kolano , Richard A. Kemmerer Classification schemes to aid in the analysis of real-time systems. [Citation Graph (0, 0)][DBLP ] ISSTA, 2000, pp:86-95 [Conf ] Greg Banks , Marco Cova , Viktoria Felmetsger , Kevin C. Almeroth , Richard A. Kemmerer , Giovanni Vigna SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. [Citation Graph (0, 0)][DBLP ] ISC, 2006, pp:343-358 [Conf ] Richard A. Kemmerer Designing and implementing a family of intrusion detection systems. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:3- [Conf ] Sebastian Fischmeister , Giovanni Vigna , Richard A. Kemmerer Evaluating the Security of Three Java-Based Mobile Agent Systems. [Citation Graph (0, 0)][DBLP ] Mobile Agents, 2001, pp:31-41 [Conf ] Flavio De Paoli , André L. M. dos Santos , Richard A. Kemmerer Web Browsers and Security. [Citation Graph (0, 0)][DBLP ] Mobile Agents and Security, 1998, pp:235-256 [Conf ] Oscar H. Ibarra , Jianwen Su , Zhe Dang , Tevfik Bultan , Richard A. Kemmerer Conter Machines: Decidable Properties and Applications to Verification Problems. [Citation Graph (0, 0)][DBLP ] MFCS, 2000, pp:426-435 [Conf ] William K. Robertson , Giovanni Vigna , Christopher Krügel , Richard A. Kemmerer Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. [Citation Graph (0, 0)][DBLP ] NDSS, 2006, pp:- [Conf ] André Årnes , Fredrik Valeur , Giovanni Vigna , Richard A. Kemmerer Using Hidden Markov Models to Evaluate the Risks of Intrusions. [Citation Graph (0, 0)][DBLP ] RAID, 2006, pp:145-164 [Conf ] Giovanni Vigna , Richard A. Kemmerer , Per Blix Designing a Web of Highly-Configurable Intrusion Detection Sensors. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:69-84 [Conf ] Zhe Dang , Richard A. Kemmerer A Symbolic Model Checker for Testing ASTRAL Real-Time Specifications. [Citation Graph (0, 0)][DBLP ] RTCSA, 1999, pp:174-181 [Conf ] Giovanni Vigna , Fredrik Valeur , Richard A. Kemmerer Designing and implementing a family of intrusion detection systems. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:88-97 [Conf ] Bruce J. Walker , Richard A. Kemmerer , Gerald J. Popek Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract). [Citation Graph (0, 0)][DBLP ] SOSP, 1979, pp:64-65 [Conf ] J. Thomas Haigh , Richard A. Kemmerer , John McHugh , William D. Young An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:14-24 [Conf ] Thomas H. Hinke , Jose Althouse , Richard A. Kemmerer SDC Secure Release Terminal Project. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1983, pp:113-119 [Conf ] Richard A. Kemmerer A Practical Approach to Identifying Storage and Timing Channels. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1982, pp:66-73 [Conf ] Richard A. Kemmerer Using Formal Verification Techniques to Analyze Encryption Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1987, pp:134-139 [Conf ] Christopher Krügel , Fredrik Valeur , Giovanni Vigna , Richard A. Kemmerer Stateful Intrusion Detection for High-Speed Networks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:285-0 [Conf ] Phillip A. Porras , Richard A. Kemmerer Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1991, pp:36-51 [Conf ] Zhe Dang , Pierluigi San Pietro , Richard A. Kemmerer On Presburger Liveness of Discrete Timed Automata. [Citation Graph (0, 0)][DBLP ] STACS, 2001, pp:132-143 [Conf ] Zhe Dang , Tevfik Bultan , Oscar H. Ibarra , Richard A. Kemmerer Past Pushdown Timed Automata. [Citation Graph (0, 0)][DBLP ] CIAA, 2001, pp:74-86 [Conf ] Paul Z. Kolano , Zhe Dang , Richard A. Kemmerer The Design and Analysis of Real-Time Systems Using the ASTRAL Software Development Environment. [Citation Graph (0, 0)][DBLP ] Ann. Software Eng., 1999, v:7, n:, pp:177-210 [Journal ] Daniel M. Berry , Richard A. Kemmerer , Arndt von Staa , Shaula Yemini Toward Modular Verifiable Exception Handling. [Citation Graph (0, 0)][DBLP ] Comput. Lang., 1980, v:5, n:2, pp:77-101 [Journal ] Jonathan D. Reichbach , Richard A. Kemmerer SoundWorks: An Object-Oriented Distributed System for Digital Sound. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1992, v:25, n:3, pp:25-37 [Journal ] Steve T. Eckmann , Giovanni Vigna , Richard A. Kemmerer STATL: An Attack Language for State-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2002, v:10, n:1/2, pp:71-104 [Journal ] Giovanni Vigna , Richard A. Kemmerer NetSTAT: A Network-based Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal ] Richard A. Kemmerer , Catherine Meadows , Jonathan K. Millen Three System for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1994, v:7, n:2, pp:79-130 [Journal ] J. David Blaine , Richard A. Kemmerer Complexity measures for assembly language programs. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1985, v:5, n:3, pp:229-245 [Journal ] Richard A. Kemmerer Integrating Formal Methods into the Development Process. [Citation Graph (0, 0)][DBLP ] IEEE Software, 1990, v:7, n:5, pp:37-50 [Journal ] Richard A. Kemmerer , Steven T. Eckman UNISEX: A UNIX-based Symbolic EXecutor for Pascal. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1985, v:15, n:5, pp:439-458 [Journal ] Zhe Dang , Tevfik Bultan , Oscar H. Ibarra , Richard A. Kemmerer Past pushdown timed automata and safety verification. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2004, v:313, n:1, pp:57-71 [Journal ] Zhe Dang , Oscar H. Ibarra , Richard A. Kemmerer Generalized discrete timed automata: decidable approximations for safety verificatio. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2003, v:296, n:1, pp:59-74 [Journal ] Zhe Dang , Pierluigi San Pietro , Richard A. Kemmerer Presburger liveness verification of discrete timed automata. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2003, v:1, n:299, pp:413-438 [Journal ] Oscar H. Ibarra , Jianwen Su , Zhe Dang , Tevfik Bultan , Richard A. Kemmerer Counter Machines and Verification Problems. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2002, v:289, n:1, pp:165-189 [Journal ] Fredrik Valeur , Giovanni Vigna , Christopher Krügel , Richard A. Kemmerer A Comprehensive Approach to Intrusion Detection Alert Correlation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:3, pp:146-169 [Journal ] Richard A. Kemmerer Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 1983, v:1, n:3, pp:256-277 [Journal ] Brent Auernheimer , Richard A. Kemmerer RT-ASLAN: A Specification Language for Real-Time Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1986, v:12, n:9, pp:879-889 [Journal ] Alberto Coen-Porisini , Richard A. Kemmerer , Dino Mandrioli A Formal Framework for ASTRAL Intralevel Proof Obligations. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1994, v:20, n:8, pp:548-561 [Journal ] Alberto Coen-Porisini , Carlo Ghezzi , Richard A. Kemmerer Specification of Realtime Systems Using ASTRAL. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1997, v:23, n:9, pp:572-598 [Journal ] Richard A. Kemmerer Editorial. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2000, v:26, n:2, pp:97- [Journal ] Richard A. Kemmerer Testing Formal Specifications to Detect Design Errors. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1985, v:11, n:1, pp:32-43 [Journal ] Richard A. Kemmerer Editor's Note. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1999, v:25, n:4, pp:433-434 [Journal ] Richard A. Kemmerer Editorial. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1999, v:25, n:6, pp:745-746 [Journal ] Richard A. Kemmerer , Carlo Ghezzi Guest Editors' Introduction: Specification and Analysis of Real-Time Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1992, v:18, n:9, pp:766-767 [Journal ] Richard A. Kemmerer , Phillip A. Porras Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1991, v:17, n:11, pp:1166-1185 [Journal ] Darren Mutz , William K. Robertson , Giovanni Vigna , Richard A. Kemmerer Exploiting Execution Context for the Detection of Anomalous System Calls. [Citation Graph (0, 0)][DBLP ] RAID, 2007, pp:1-20 [Conf ] André Årnes , Paul Haas , Giovanni Vigna , Richard A. Kemmerer Using a virtual security testbed for digital forensic reconstruction. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:2, n:4, pp:275-289 [Journal ] Formal Specification and Analysis of an E-voting System. [Citation Graph (, )][DBLP ] So You Think You Can Dance? [Citation Graph (, )][DBLP ] Your botnet is my botnet: analysis of a botnet takeover. [Citation Graph (, )][DBLP ] 08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. [Citation Graph (, )][DBLP ] 08102 Outcome Working Group -- Situational Awareness. [Citation Graph (, )][DBLP ] 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. [Citation Graph (, )][DBLP ] How to Steal a Botnet and What Can Happen When You Do. [Citation Graph (, )][DBLP ] Are your votes really counted?: testing the security of real-world electronic voting systems. [Citation Graph (, )][DBLP ] Formal analysis of attacks for e-voting system. [Citation Graph (, )][DBLP ] Refinement and Verification of Real-Time Systems [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.459secs