Search the dblp DataBase
Jonathan K. Millen :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jonathan K. Millen Security Kernel Validation in Practice. [Citation Graph (2, 0)][DBLP ] Commun. ACM, 1976, v:19, n:5, pp:243-250 [Journal ] Jonathan K. Millen , Vitaly Shmatikov Constraint solving for bounded-process cryptographic protocol analysis. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:166-175 [Conf ] Rebecca N. Wright , Patrick Lincoln , Jonathan K. Millen Efficient fault-tolerant certificate revocation. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:19-24 [Conf ] Grit Denker , Jonathan K. Millen , Antonio Grau , Juliana Küster Filipe Optimizing Protocol Rewrite Rules of CIL Specifications. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:52-62 [Conf ] Véronique Cortier , Jonathan K. Millen , Harald Rueß Proving Secrecy is Easy Enough. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:97-0 [Conf ] Jonathan K. Millen Finite-State Noiseless Covert Channels. [Citation Graph (0, 0)][DBLP ] CSFW, 1989, pp:81-86 [Conf ] Jonathan K. Millen Hookup Security for Synchronous Machines. [Citation Graph (0, 0)][DBLP ] CSFW, 1990, pp:84-90 [Conf ] Jonathan K. Millen Unwinding Forward Correctability. [Citation Graph (0, 0)][DBLP ] CSFW, 1994, pp:2-10 [Conf ] Jonathan K. Millen , Hai-Ping Ko Narrowing terminates for encryption. [Citation Graph (0, 0)][DBLP ] CSFW, 1996, pp:39-0 [Conf ] Jonathan K. Millen , Vitaly Shmatikov Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. [Citation Graph (0, 0)][DBLP ] CSFW, 2003, pp:47-61 [Conf ] Jonathan K. Millen , Rebecca N. Wright Reasoning about Trust and Insurance in a Public Key Infrastructure. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:16-22 [Conf ] Peter Ryan , John D. McLean , Jonathan K. Millen , Virgil D. Gligor Non-Interference: Who Needs It? [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:237-0 [Conf ] Jonathan K. Millen , Grit Denker MuCAPSL. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:238-0 [Conf ] Grit Denker , Jonathan K. Millen , Yutaka Miyake Cross-Domain Access Control via PKI. [Citation Graph (0, 0)][DBLP ] POLICY, 2002, pp:202-205 [Conf ] Bahaa W. Fam , Jonathan K. Millen The Channel Assignment Problem. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1983, pp:107-112 [Conf ] Jonathan K. Millen Kernel Isolation for the PDP-11/70. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1982, pp:57-65 [Conf ] Jonathan K. Millen The Interrogator: A Tool for Cryptographic Protocol Security. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1984, pp:134-141 [Conf ] Jonathan K. Millen Covert Channel Capacity. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1987, pp:60-66 [Conf ] Jonathan K. Millen Local Reconfiguration Policies. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1999, pp:48-56 [Conf ] Jonathan K. Millen 20 Years of Covert Channel Modeling and Analysis. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1999, pp:113-114 [Conf ] Jonathan K. Millen , Harald Rueß Protocol-Independent Secrecy. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:110-209 [Conf ] Jonathan K. Millen Construction with Parallel Derivatives of the Closure of a Parallel Program Schema [Citation Graph (0, 0)][DBLP ] STOC, 1974, pp:242-247 [Conf ] Jonathan K. Millen Models of Multilevel Computer Security. [Citation Graph (0, 0)][DBLP ] Advances in Computers, 1989, v:29, n:, pp:1-45 [Journal ] Maureen Harris Cheheyl , Morrie Gasser , George A. Huff , Jonathan K. Millen Verifying Security. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1981, v:13, n:3, pp:279-339 [Journal ] Grit Denker , Jonathan K. Millen Modeling Group Communication Protocols Using Multiset Term Rewriting. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2002, v:71, n:, pp:- [Journal ] Jonathan K. Millen Applications of Term Rewriting to Cryptographic Protocol Analysis overview of the invited talk. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2000, v:36, n:, pp:- [Journal ] Jonathan K. Millen On the freedom of decryption. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2003, v:86, n:6, pp:329-333 [Journal ] Jonathan K. Millen A Resource Allocation Model for Denial of Service Protection. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1993, v:2, n:2-3, pp:89-106 [Journal ] Jonathan K. Millen Unwinding Forward Correctability. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1995, v:3, n:1, pp:35-54 [Journal ] Jonathan K. Millen , Vitaly Shmatikov Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:3, pp:515-564 [Journal ] Jonathan K. Millen , Vitaly Shmatikov Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:4, pp:695-0 [Journal ] Rebecca N. Wright , Patrick Lincoln , Jonathan K. Millen Depender Graphs: A Method of Fault-Tolerant Certificate Distribution. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2001, v:9, n:4, pp:323-338 [Journal ] Richard A. Kemmerer , Catherine Meadows , Jonathan K. Millen Three System for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1994, v:7, n:2, pp:79-130 [Journal ] Jonathan K. Millen , David L. Drake An experiment with affirm and HDM. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1981, v:2, n:2, pp:159-175 [Journal ] Jonathan K. Millen , Sidney C. Clark , Sheryl B. Freedman The Interrogator: Protocol Security Analysis. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:274-288 [Journal ] Rewriting Techniques in the Constraint Solver. [Citation Graph (, )][DBLP ] Search in 0.021secs, Finished in 0.023secs