The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Joshua D. Guttman: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. William M. Farmer, Joshua D. Guttman, F. Javier Thayer
    IMPS: An Updated System Description. [Citation Graph (0, 0)][DBLP]
    CADE, 1996, pp:298-302 [Conf]
  2. William M. Farmer, Joshua D. Guttman, Mark E. Nadel, F. Javier Thayer
    Proof Script Pragmatics in IMPS. [Citation Graph (0, 0)][DBLP]
    CADE, 1994, pp:356-370 [Conf]
  3. William M. Farmer, Joshua D. Guttman, F. Javier Thayer
    IMPS: An Interactive Mathematical Proof System. [Citation Graph (0, 0)][DBLP]
    CADE, 1990, pp:653-654 [Conf]
  4. William M. Farmer, Joshua D. Guttman, F. Javier Thayer
    Little Theories. [Citation Graph (0, 0)][DBLP]
    CADE, 1992, pp:567-581 [Conf]
  5. William M. Farmer, Joshua D. Guttman, F. Javier Thayer
    IMPS: System Description. [Citation Graph (0, 0)][DBLP]
    CADE, 1992, pp:701-705 [Conf]
  6. Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck
    The faithfulness of abstract protocol analysis: message authentication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:186-195 [Conf]
  7. Joshua D. Guttman
    Security Protocol Design via Authentication Tests. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:92-103 [Conf]
  8. Joshua D. Guttman
    Panel: Use of Formal Methods in the Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1992, pp:112- [Conf]
  9. Joshua D. Guttman, Mark E. Nadel
    What Needs Securing. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:34-57 [Conf]
  10. Joshua D. Guttman, F. Javier Thayer
    Protocol Independence through Disjoint Encryption. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:24-34 [Conf]
  11. Andre Scedrov, Ran Canetti, Joshua D. Guttman, David Wagner, Michael Waidner
    Relating Cryptography and Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:111-114 [Conf]
  12. F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman
    Honest Ideals on Strand Spaces. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:66-77 [Conf]
  13. F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman
    Mixed Strand Spaces. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:72-82 [Conf]
  14. William M. Farmer, Joshua D. Guttman, F. Javier Thayer
    Reasoning with Contexts. [Citation Graph (0, 0)][DBLP]
    DISCO, 1993, pp:216-228 [Conf]
  15. Joshua D. Guttman, F. Javier Thayer, Jay A. Carlson, Jonathan C. Herzog, John D. Ramsdell, Brian T. Sniffen
    Trust Management in Strand Spaces: A Rely-Guarantee Method. [Citation Graph (0, 0)][DBLP]
    ESOP, 2004, pp:325-339 [Conf]
  16. William M. Farmer, Joshua D. Guttman, Vipin Swarup
    Security for Mobile Agents: Authentication and State Appraisal. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:118-130 [Conf]
  17. Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
    Authentication and Confidentiality via IPSEC. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:255-272 [Conf]
  18. Joshua D. Guttman, Dale M. Johnson
    Three Applications of Formal Methods at MITRE. [Citation Graph (0, 0)][DBLP]
    FME, 1994, pp:55-65 [Conf]
  19. Joshua D. Guttman
    Security Goals: Packet Trajectories and Strand Spaces. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2000, pp:197-261 [Conf]
  20. Shimshon Berkovits, Joshua D. Guttman, Vipin Swarup
    Authentication for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:114-136 [Conf]
  21. Joshua D. Guttman
    Filtering Postures: Local Enforcement for Global Policies. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:120-129 [Conf]
  22. Joshua D. Guttman, H.-P. Ko
    Verifying a Hardware Security Architecture. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:333-344 [Conf]
  23. Joshua D. Guttman, F. Javier Thayer
    Authentication Tests. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:96-109 [Conf]
  24. Joshua D. Guttman, Jonathan C. Herzog, John D. Ramsdell, Brian T. Sniffen
    Programming Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:116-145 [Conf]
  25. Joshua D. Guttman
    Security, Protocols, and Trust. [Citation Graph (0, 0)][DBLP]
    VMCAI, 2004, pp:1- [Conf]
  26. Joshua D. Guttman
    A New Column: Information Security. [Citation Graph (0, 0)][DBLP]
    Bulletin of the EATCS, 2004, v:82, n:, pp:242-252 [Journal]
  27. Joshua D. Guttman
    Key Compromise, Strand Spaces, and the Authentication Tests. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:45, n:, pp:- [Journal]
  28. Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
    Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:173, n:, pp:85-102 [Journal]
  29. Joshua D. Guttman, Amy L. Herzog
    Rigorous automated network security management. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:29-48 [Journal]
  30. William M. Farmer, Joshua D. Guttman, F. Javier Thayer
    IMPS: An Interactive Mathematical Proof System. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 1993, v:11, n:2, pp:213-248 [Journal]
  31. Joshua D. Guttman
    Authentication tests and disjoint encryption: A design method for security protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:3-4, pp:409-433 [Journal]
  32. Joshua D. Guttman, Amy L. Herzog, John D. Ramsdell, Clement W. Skorupka
    Verifying information flow goals in Security-Enhanced Linux. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:1, pp:115-134 [Journal]
  33. Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck
    The faithfulness of abstract protocol analysis: Message authentication. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:6, pp:865-891 [Journal]
  34. F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman
    Strand Spaces: Proving Security Protocols Correct. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal]
  35. William M. Farmer, Joshua D. Guttman, F. Javier Thayer
    Context in Mathematical Reasoning and Computation. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 1995, v:19, n:1-3, pp:210-206 [Journal]
  36. Joshua D. Guttman, John D. Ramsdell, Vipin Swarup
    The VLISP Verified Scheme System. [Citation Graph (0, 0)][DBLP]
    Lisp and Symbolic Computation, 1995, v:8, n:1-2, pp:33-110 [Journal]
  37. Joshua D. Guttman, John D. Ramsdell, Mitchell Wand
    VLISP: A Verified Implementation of Scheme. [Citation Graph (0, 0)][DBLP]
    Lisp and Symbolic Computation, 1995, v:8, n:1-2, pp:5-32 [Journal]
  38. William M. Farmer, Joshua D. Guttman
    A Set Theory with Support for Partial Functions. [Citation Graph (0, 0)][DBLP]
    Studia Logica, 2000, v:66, n:1, pp:59-78 [Journal]
  39. Joshua D. Guttman, F. Javier Thayer
    Authentication tests and the structure of bundles. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2002, v:283, n:2, pp:333-380 [Journal]
  40. Joshua D. Guttman
    How to do Things with Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:142-149 [Conf]
  41. Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
    Completeness of the Authentication Tests. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:106-121 [Conf]
  42. Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
    Searching for Shapes in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    TACAS, 2007, pp:523-537 [Conf]
  43. Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. Guttman, John D. Ramsdell
    Compiling cryptographic protocols for deployment on the web. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:687-696 [Conf]

  44. Cryptographic Protocol Composition via the Authentication Tests. [Citation Graph (, )][DBLP]


  45. Attestation: Evidence and Trust. [Citation Graph (, )][DBLP]


  46. Transformations between Cryptographic Protocols. [Citation Graph (, )][DBLP]


  47. Strand Spaces: Why is a Security Protocol Correct? [Citation Graph (, )][DBLP]


  48. Fair Exchange in Strand Spaces [Citation Graph (, )][DBLP]


  49. Security Theorems via Model Theory [Citation Graph (, )][DBLP]


  50. Choreographies with Secure Boxes and Compromised Principals [Citation Graph (, )][DBLP]


  51. Execution Models for Choreographies and Cryptoprotocols [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002