The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jonathan K. Millen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jonathan K. Millen
    Security Kernel Validation in Practice. [Citation Graph (2, 0)][DBLP]
    Commun. ACM, 1976, v:19, n:5, pp:243-250 [Journal]
  2. Jonathan K. Millen, Vitaly Shmatikov
    Constraint solving for bounded-process cryptographic protocol analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:166-175 [Conf]
  3. Rebecca N. Wright, Patrick Lincoln, Jonathan K. Millen
    Efficient fault-tolerant certificate revocation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:19-24 [Conf]
  4. Grit Denker, Jonathan K. Millen, Antonio Grau, Juliana Küster Filipe
    Optimizing Protocol Rewrite Rules of CIL Specifications. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:52-62 [Conf]
  5. Véronique Cortier, Jonathan K. Millen, Harald Rueß
    Proving Secrecy is Easy Enough. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:97-0 [Conf]
  6. Jonathan K. Millen
    Finite-State Noiseless Covert Channels. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:81-86 [Conf]
  7. Jonathan K. Millen
    Hookup Security for Synchronous Machines. [Citation Graph (0, 0)][DBLP]
    CSFW, 1990, pp:84-90 [Conf]
  8. Jonathan K. Millen
    Unwinding Forward Correctability. [Citation Graph (0, 0)][DBLP]
    CSFW, 1994, pp:2-10 [Conf]
  9. Jonathan K. Millen, Hai-Ping Ko
    Narrowing terminates for encryption. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:39-0 [Conf]
  10. Jonathan K. Millen, Vitaly Shmatikov
    Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:47-61 [Conf]
  11. Jonathan K. Millen, Rebecca N. Wright
    Reasoning about Trust and Insurance in a Public Key Infrastructure. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:16-22 [Conf]
  12. Peter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor
    Non-Interference: Who Needs It? [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:237-0 [Conf]
  13. Jonathan K. Millen, Grit Denker
    MuCAPSL. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:238-0 [Conf]
  14. Grit Denker, Jonathan K. Millen, Yutaka Miyake
    Cross-Domain Access Control via PKI. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:202-205 [Conf]
  15. Bahaa W. Fam, Jonathan K. Millen
    The Channel Assignment Problem. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:107-112 [Conf]
  16. Jonathan K. Millen
    Kernel Isolation for the PDP-11/70. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1982, pp:57-65 [Conf]
  17. Jonathan K. Millen
    The Interrogator: A Tool for Cryptographic Protocol Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:134-141 [Conf]
  18. Jonathan K. Millen
    Covert Channel Capacity. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:60-66 [Conf]
  19. Jonathan K. Millen
    Local Reconfiguration Policies. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:48-56 [Conf]
  20. Jonathan K. Millen
    20 Years of Covert Channel Modeling and Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:113-114 [Conf]
  21. Jonathan K. Millen, Harald Rueß
    Protocol-Independent Secrecy. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:110-209 [Conf]
  22. Jonathan K. Millen
    Construction with Parallel Derivatives of the Closure of a Parallel Program Schema [Citation Graph (0, 0)][DBLP]
    STOC, 1974, pp:242-247 [Conf]
  23. Jonathan K. Millen
    Models of Multilevel Computer Security. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 1989, v:29, n:, pp:1-45 [Journal]
  24. Maureen Harris Cheheyl, Morrie Gasser, George A. Huff, Jonathan K. Millen
    Verifying Security. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1981, v:13, n:3, pp:279-339 [Journal]
  25. Grit Denker, Jonathan K. Millen
    Modeling Group Communication Protocols Using Multiset Term Rewriting. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2002, v:71, n:, pp:- [Journal]
  26. Jonathan K. Millen
    Applications of Term Rewriting to Cryptographic Protocol Analysis overview of the invited talk. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2000, v:36, n:, pp:- [Journal]
  27. Jonathan K. Millen
    On the freedom of decryption. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2003, v:86, n:6, pp:329-333 [Journal]
  28. Jonathan K. Millen
    A Resource Allocation Model for Denial of Service Protection. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1993, v:2, n:2-3, pp:89-106 [Journal]
  29. Jonathan K. Millen
    Unwinding Forward Correctability. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1995, v:3, n:1, pp:35-54 [Journal]
  30. Jonathan K. Millen, Vitaly Shmatikov
    Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:3, pp:515-564 [Journal]
  31. Jonathan K. Millen, Vitaly Shmatikov
    Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:4, pp:695-0 [Journal]
  32. Rebecca N. Wright, Patrick Lincoln, Jonathan K. Millen
    Depender Graphs: A Method of Fault-Tolerant Certificate Distribution. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2001, v:9, n:4, pp:323-338 [Journal]
  33. Richard A. Kemmerer, Catherine Meadows, Jonathan K. Millen
    Three System for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1994, v:7, n:2, pp:79-130 [Journal]
  34. Jonathan K. Millen, David L. Drake
    An experiment with affirm and HDM. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1981, v:2, n:2, pp:159-175 [Journal]
  35. Jonathan K. Millen, Sidney C. Clark, Sheryl B. Freedman
    The Interrogator: Protocol Security Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:274-288 [Journal]

  36. Rewriting Techniques in the Constraint Solver. [Citation Graph (, )][DBLP]


Search in 0.021secs, Finished in 0.023secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002