The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Richard A. Kemmerer: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek
    Specification and Verification of the UCLA Unix Security Kernel. [Citation Graph (2, 0)][DBLP]
    Commun. ACM, 1980, v:23, n:2, pp:118-131 [Journal]
  2. J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young
    An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:157-168 [Journal]
  3. Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras
    State Transition Analysis: A Rule-Based Intrusion Detection Approach. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1995, v:21, n:3, pp:181-199 [Journal]
  4. Darren Mutz, Giovanni Vigna, Richard A. Kemmerer
    An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:374-383 [Conf]
  5. Richard A. Kemmerer
    A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:109-118 [Conf]
  6. Richard A. Kemmerer, Tad Taylor
    A Modular Covert Channel Analysis Methodology for Trusted DG/UX/sup TM/. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:224-235 [Conf]
  7. André L. M. dos Santos, Richard A. Kemmerer
    Implementing Security Policies using the Safe Areas of Computation Approach. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:90-99 [Conf]
  8. André L. M. dos Santos, Richard A. Kemmerer
    Safe Areas of Computation for Secure Computing with Insecure Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:35-44 [Conf]
  9. Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer
    An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:16-27 [Conf]
  10. Giovanni Vigna, Richard A. Kemmerer
    NetSTAT: A Network-Based Intrusion Detection Approach. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:25-0 [Conf]
  11. Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer
    A Stateful Intrusion Detection System for World-Wide Web Servers. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:34-45 [Conf]
  12. Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer
    Composable Tools For Network Discovery and Security Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:14-24 [Conf]
  13. Zhe Dang, Oscar H. Ibarra, Tevfik Bultan, Richard A. Kemmerer, Jianwen Su
    Binary Reachability Analysis of Discrete Pushdown Timed Automata. [Citation Graph (0, 0)][DBLP]
    CAV, 2000, pp:69-84 [Conf]
  14. Zhe Dang, Oscar H. Ibarra, Richard A. Kemmerer
    Decidable Approximations on Generalized and Parameterized Discrete Timed Automata. [Citation Graph (0, 0)][DBLP]
    COCOON, 2001, pp:529-539 [Conf]
  15. Richard A. Kemmerer
    Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:289-305 [Conf]
  16. Richard A. Kemmerer
    Formal Specification and Verification Techniques for Secure Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:229-240 [Conf]
  17. Richard A. Kemmerer
    Formal Specification of a Mental Health Delivery System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:341-351 [Conf]
  18. Richard A. Kemmerer
    A Multilevel Formal Specification of a Mental Health Care Database. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:27-52 [Conf]
  19. André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer
    Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:144-163 [Conf]
  20. Carlo Ghezzi, Richard A. Kemmerer
    ASTRAL: An Assertion Language for Specifying Realtime Systems. [Citation Graph (0, 0)][DBLP]
    ESEC, 1991, pp:122-146 [Conf]
  21. Alberto Coen-Porisini, Richard A. Kemmerer, Dino Mandrioli
    A Formal Framework for ASTRAL Inter-level Proof Obligations. [Citation Graph (0, 0)][DBLP]
    ESEC, 1995, pp:90-108 [Conf]
  22. Richard A. Kemmerer
    Security Issues in Distributed Software. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 1997, pp:52-59 [Conf]
  23. Richard A. Kemmerer
    Analyzing Encryption Protocols Using Formal Verification Techniques. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:48- [Conf]
  24. Paul Z. Kolano, Richard A. Kemmerer, Dino Mandrioli
    Parallel Refinement Mechanisms for Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    FASE, 2000, pp:35-50 [Conf]
  25. Richard A. Kemmerer
    Formally Specifying and Verifying Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    ICFEM, 1997, pp:112-0 [Conf]
  26. Zhe Dang, Richard A. Kemmerer
    Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems. [Citation Graph (0, 0)][DBLP]
    ICSE, 2000, pp:345-354 [Conf]
  27. Zhe Dang, Richard A. Kemmerer
    Using the ASTRAL Model Checker to Analyze Mobile IP. [Citation Graph (0, 0)][DBLP]
    ICSE, 1999, pp:132-142 [Conf]
  28. Richard A. Kemmerer
    Completely Validated Software. [Citation Graph (0, 0)][DBLP]
    ICSE, 1989, pp:359-360 [Conf]
  29. Richard A. Kemmerer
    Cybersecurity. [Citation Graph (0, 0)][DBLP]
    ICSE, 2003, pp:705-717 [Conf]
  30. Richard A. Kemmerer, Giovanni Vigna
    Internet Security and Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICSE, 2003, pp:748-749 [Conf]
  31. Jeffrey Douglas, Richard A. Kemmerer
    Aslantest: A Symbolic Execution Tool for Testing Aslan Formal Specifications. [Citation Graph (0, 0)][DBLP]
    ISSTA, 1994, pp:15-27 [Conf]
  32. Richard G. Hamlet, Richard A. Kemmerer, Edward F. Miller, Debra J. Richardson
    The Most Influential Papers from the ISSTA Research Community (Panel). [Citation Graph (0, 0)][DBLP]
    ISSTA, 1998, pp:49- [Conf]
  33. Alberto Coen-Porisini, Richard A. Kemmerer
    The Composability of ASTRAL Realtime Specifications. [Citation Graph (0, 0)][DBLP]
    ISSTA, 1993, pp:128-138 [Conf]
  34. Richard Denney, Richard A. Kemmerer, Nancy G. Leveson, Alberto Savoia
    Why State-of-the-Art is not State-of-the-Practice (Panel Abstract). [Citation Graph (0, 0)][DBLP]
    ISSTA, 1996, pp:293- [Conf]
  35. Paul Z. Kolano, Richard A. Kemmerer
    Classification schemes to aid in the analysis of real-time systems. [Citation Graph (0, 0)][DBLP]
    ISSTA, 2000, pp:86-95 [Conf]
  36. Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna
    SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:343-358 [Conf]
  37. Richard A. Kemmerer
    Designing and implementing a family of intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    ASE, 2005, pp:3- [Conf]
  38. Sebastian Fischmeister, Giovanni Vigna, Richard A. Kemmerer
    Evaluating the Security of Three Java-Based Mobile Agent Systems. [Citation Graph (0, 0)][DBLP]
    Mobile Agents, 2001, pp:31-41 [Conf]
  39. Flavio De Paoli, André L. M. dos Santos, Richard A. Kemmerer
    Web Browsers and Security. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:235-256 [Conf]
  40. Oscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer
    Conter Machines: Decidable Properties and Applications to Verification Problems. [Citation Graph (0, 0)][DBLP]
    MFCS, 2000, pp:426-435 [Conf]
  41. William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer
    Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  42. André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer
    Using Hidden Markov Models to Evaluate the Risks of Intrusions. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:145-164 [Conf]
  43. Giovanni Vigna, Richard A. Kemmerer, Per Blix
    Designing a Web of Highly-Configurable Intrusion Detection Sensors. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:69-84 [Conf]
  44. Zhe Dang, Richard A. Kemmerer
    A Symbolic Model Checker for Testing ASTRAL Real-Time Specifications. [Citation Graph (0, 0)][DBLP]
    RTCSA, 1999, pp:174-181 [Conf]
  45. Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer
    Designing and implementing a family of intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:88-97 [Conf]
  46. Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek
    Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    SOSP, 1979, pp:64-65 [Conf]
  47. J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young
    An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:14-24 [Conf]
  48. Thomas H. Hinke, Jose Althouse, Richard A. Kemmerer
    SDC Secure Release Terminal Project. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:113-119 [Conf]
  49. Richard A. Kemmerer
    A Practical Approach to Identifying Storage and Timing Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1982, pp:66-73 [Conf]
  50. Richard A. Kemmerer
    Using Formal Verification Techniques to Analyze Encryption Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:134-139 [Conf]
  51. Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer
    Stateful Intrusion Detection for High-Speed Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:285-0 [Conf]
  52. Phillip A. Porras, Richard A. Kemmerer
    Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:36-51 [Conf]
  53. Zhe Dang, Pierluigi San Pietro, Richard A. Kemmerer
    On Presburger Liveness of Discrete Timed Automata. [Citation Graph (0, 0)][DBLP]
    STACS, 2001, pp:132-143 [Conf]
  54. Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer
    Past Pushdown Timed Automata. [Citation Graph (0, 0)][DBLP]
    CIAA, 2001, pp:74-86 [Conf]
  55. Paul Z. Kolano, Zhe Dang, Richard A. Kemmerer
    The Design and Analysis of Real-Time Systems Using the ASTRAL Software Development Environment. [Citation Graph (0, 0)][DBLP]
    Ann. Software Eng., 1999, v:7, n:, pp:177-210 [Journal]
  56. Daniel M. Berry, Richard A. Kemmerer, Arndt von Staa, Shaula Yemini
    Toward Modular Verifiable Exception Handling. [Citation Graph (0, 0)][DBLP]
    Comput. Lang., 1980, v:5, n:2, pp:77-101 [Journal]
  57. Jonathan D. Reichbach, Richard A. Kemmerer
    SoundWorks: An Object-Oriented Distributed System for Digital Sound. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1992, v:25, n:3, pp:25-37 [Journal]
  58. Steve T. Eckmann, Giovanni Vigna, Richard A. Kemmerer
    STATL: An Attack Language for State-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:1/2, pp:71-104 [Journal]
  59. Giovanni Vigna, Richard A. Kemmerer
    NetSTAT: A Network-based Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal]
  60. Richard A. Kemmerer, Catherine Meadows, Jonathan K. Millen
    Three System for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1994, v:7, n:2, pp:79-130 [Journal]
  61. J. David Blaine, Richard A. Kemmerer
    Complexity measures for assembly language programs. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1985, v:5, n:3, pp:229-245 [Journal]
  62. Richard A. Kemmerer
    Integrating Formal Methods into the Development Process. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1990, v:7, n:5, pp:37-50 [Journal]
  63. Richard A. Kemmerer, Steven T. Eckman
    UNISEX: A UNIX-based Symbolic EXecutor for Pascal. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1985, v:15, n:5, pp:439-458 [Journal]
  64. Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer
    Past pushdown timed automata and safety verification. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2004, v:313, n:1, pp:57-71 [Journal]
  65. Zhe Dang, Oscar H. Ibarra, Richard A. Kemmerer
    Generalized discrete timed automata: decidable approximations for safety verificatio. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:296, n:1, pp:59-74 [Journal]
  66. Zhe Dang, Pierluigi San Pietro, Richard A. Kemmerer
    Presburger liveness verification of discrete timed automata. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:1, n:299, pp:413-438 [Journal]
  67. Oscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer
    Counter Machines and Verification Problems. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2002, v:289, n:1, pp:165-189 [Journal]
  68. Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer
    A Comprehensive Approach to Intrusion Detection Alert Correlation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:3, pp:146-169 [Journal]
  69. Richard A. Kemmerer
    Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1983, v:1, n:3, pp:256-277 [Journal]
  70. Brent Auernheimer, Richard A. Kemmerer
    RT-ASLAN: A Specification Language for Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1986, v:12, n:9, pp:879-889 [Journal]
  71. Alberto Coen-Porisini, Richard A. Kemmerer, Dino Mandrioli
    A Formal Framework for ASTRAL Intralevel Proof Obligations. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1994, v:20, n:8, pp:548-561 [Journal]
  72. Alberto Coen-Porisini, Carlo Ghezzi, Richard A. Kemmerer
    Specification of Realtime Systems Using ASTRAL. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1997, v:23, n:9, pp:572-598 [Journal]
  73. Richard A. Kemmerer
    Editorial. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2000, v:26, n:2, pp:97- [Journal]
  74. Richard A. Kemmerer
    Testing Formal Specifications to Detect Design Errors. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1985, v:11, n:1, pp:32-43 [Journal]
  75. Richard A. Kemmerer
    Editor's Note. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1999, v:25, n:4, pp:433-434 [Journal]
  76. Richard A. Kemmerer
    Editorial. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1999, v:25, n:6, pp:745-746 [Journal]
  77. Richard A. Kemmerer, Carlo Ghezzi
    Guest Editors' Introduction: Specification and Analysis of Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1992, v:18, n:9, pp:766-767 [Journal]
  78. Richard A. Kemmerer, Phillip A. Porras
    Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1991, v:17, n:11, pp:1166-1185 [Journal]
  79. Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer
    Exploiting Execution Context for the Detection of Anomalous System Calls. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:1-20 [Conf]
  80. André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer
    Using a virtual security testbed for digital forensic reconstruction. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:2, n:4, pp:275-289 [Journal]

  81. Formal Specification and Analysis of an E-voting System. [Citation Graph (, )][DBLP]


  82. So You Think You Can Dance? [Citation Graph (, )][DBLP]


  83. Your botnet is my botnet: analysis of a botnet takeover. [Citation Graph (, )][DBLP]


  84. 08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. [Citation Graph (, )][DBLP]


  85. 08102 Outcome Working Group -- Situational Awareness. [Citation Graph (, )][DBLP]


  86. 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. [Citation Graph (, )][DBLP]


  87. How to Steal a Botnet and What Can Happen When You Do. [Citation Graph (, )][DBLP]


  88. Are your votes really counted?: testing the security of real-world electronic voting systems. [Citation Graph (, )][DBLP]


  89. Formal analysis of attacks for e-voting system. [Citation Graph (, )][DBLP]


  90. Refinement and Verification of Real-Time Systems [Citation Graph (, )][DBLP]


Search in 0.029secs, Finished in 0.032secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002