The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Joshua D. Guttman" ( http://dblp.L3S.de/Authors/Joshua_D._Guttman )

URL (Homepage):  http://web.cs.wpi.edu/~guttman/  Author page on DBLP  Author page in RDF  Community of Joshua D. Guttman in ASPL-2

Publication years (Num. hits)
1988-1996 (15) 1997-2002 (16) 2003-2007 (15) 2008-2011 (16) 2012-2014 (17) 2015-2019 (15)
Publication types (Num. hits)
article(31) inproceedings(57) proceedings(6)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 12 occurrences of 12 keywords

Results
Found 95 publication records. Showing 94 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Joshua D. Guttman, Carl E. Landwehr, José Meseguer, Dusko Pavlovic (eds.) Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Moses D. Liskov, Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe, F. Javier Thayer Enrich-by-Need Protocol Analysis for Diffie-Hellman. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Daniel J. Dougherty, Joshua D. Guttman, John D. Ramsdell Homomorphisms and Minimality for Enrich-by-Need Security Analysis. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Moses D. Liskov, Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe, F. Javier Thayer Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version). Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Daniel J. Dougherty, Joshua D. Guttman, John D. Ramsdell Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA. Search on Bibsonomy IFM The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Information Flow, Distributed Systems, and Refinement, by Example. Search on Bibsonomy Concurrency, Security, and Puzzles The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Paul D. Rowe, Joshua D. Guttman, Moses D. Liskov Measuring protocol strength with security goals. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pedro Adão, Riccardo Focardi, Joshua D. Guttman, Flaminia L. Luccio Localizing Firewall Security Policies. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Megumi Ando, Joshua D. Guttman, Alberto R. Papaleo, John Scire Hash-Based TPM Signatures for the Quantum World. Search on Bibsonomy ACNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe Cross-Tool Semantics for Protocol Security Goals. Search on Bibsonomy SSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe Formal Support for Standardizing Protocols with State. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
1Joshua D. Guttman Limited Disclosure and Locality in Graphs. Search on Bibsonomy Programming Languages with Applications to Biology and Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Megumi Ando, Joshua D. Guttman Composable Bounds on Information Flow from Distribution Differences. Search on Bibsonomy DPM/QASA@ESORICS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, Paul D. Rowe A Cut Principle for Information Flow. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe Formal Support for Standardizing Protocols with State. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman, Paul D. Rowe A Hybrid Analysis for Security Protocols with State. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
1Joshua D. Guttman, Paul D. Rowe A Cut Principle for Information Flow. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
1Joshua D. Guttman Establishing and preserving protocol security goals. Search on Bibsonomy Journal of Computer Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daniel J. Dougherty, Joshua D. Guttman Decidability for Lightweight Diffie-Hellman Protocols. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman, Paul D. Rowe A Hybrid Analysis for Security Protocols with State. Search on Bibsonomy IFM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, Moses D. Liskov, Paul D. Rowe Security Goals and Evolving Standards. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ming Li 0003, Shucheng Yu, Joshua D. Guttman, Wenjing Lou, Kui Ren 0001 Secure ad hoc trust initialization and key management in wireless body area networks. Search on Bibsonomy TOSN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Pierpaolo Degano, Joshua D. Guttman Preface. Search on Bibsonomy Journal of Computer Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chuan Lei, Elke A. Rundensteiner, Joshua D. Guttman Robust distributed stream processing. Search on Bibsonomy ICDE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marco Carbone, Joshua D. Guttman Sessions and Separability in Security Protocols. Search on Bibsonomy POST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yantian Hou, Ming Li 0003, Joshua D. Guttman Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1John D. Ramsdell, Joshua D. Guttman, Jonathan K. Millen, Brian O'Hanlon An Analysis of the CAVES Attestation Protocol using CPSA Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
1Daniel J. Dougherty, Joshua D. Guttman Symbolic Protocol Analysis for Diffie-Hellman Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
1Joshua D. Guttman State and Progress in Strand Spaces: Proving Fair Exchange. Search on Bibsonomy J. Autom. Reasoning The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Pierpaolo Degano, Joshua D. Guttman (eds.) Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings Search on Bibsonomy POST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daniel J. Dougherty, Joshua D. Guttman An Algebra for Symbolic Diffie-Hellman Protocol Analysis. Search on Bibsonomy TGC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Trust Engineering via Security Protocols. Search on Bibsonomy STAST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1George Coker, Joshua D. Guttman, Peter Loscocco, Amy L. Herzog, Jonathan K. Millen, Brian O'Hanlon, John D. Ramsdell, Ariel Segall, Justin Sheehy, Brian T. Sniffen Principles of remote attestation. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Pierpaolo Degano, Sandro Etalle, Joshua D. Guttman (eds.) Formal Aspects of Security and Trust - 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Security Goals and Protocol Transformations. Search on Bibsonomy TOSCA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Aslan Askarov, Joshua D. Guttman (eds.) Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, PLAS 2011, San Jose, CA, USA, 5 June, 2011 Search on Bibsonomy PLAS The full citation details ... 2011 DBLP  BibTeX  RDF
1F. Javier Thayer, Vipin Swarup, Joshua D. Guttman Metric Strand Spaces for Locale Authentication Protocols. Search on Bibsonomy IFIPTM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pierpaolo Degano, Joshua D. Guttman (eds.) Formal Aspects in Security and Trust, 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Security Theorems via Model Theory Search on Bibsonomy EXPRESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Marco Carbone, Joshua D. Guttman Execution Models for Choreographies and Cryptoprotocols Search on Bibsonomy PLACES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Marco Carbone, Joshua D. Guttman Choreographies with Secure Boxes and Compromised Principals Search on Bibsonomy ICE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Fair Exchange in Strand Spaces Search on Bibsonomy SECCO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Introduction. Search on Bibsonomy Journal of Computer Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Cryptographic Protocol Composition via the Authentication Tests. Search on Bibsonomy FoSSaCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Transformations between Cryptographic Protocols. Search on Bibsonomy ARSPA-WITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Pierpaolo Degano, Joshua D. Guttman, Fabio Martinelli (eds.) Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Cryptographic Protocol Composition via the Authentication Tests. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2008 DBLP  BibTeX  RDF
1George Coker, Joshua D. Guttman, Peter Loscocco, Justin Sheehy, Brian T. Sniffen Attestation: Evidence and Trust. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions. Search on Bibsonomy Electr. Notes Theor. Comput. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer Completeness of the Authentication Tests. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer Searching for Shapes in Cryptographic Protocols. Search on Bibsonomy TACAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. Guttman, John D. Ramsdell Compiling cryptographic protocols for deployment on the web. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF CPPL, cryptographic protocols, HTTP, sessions
1Joshua D. Guttman How to do Things with Cryptographic Protocols. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer Searching for Shapes in Cryptographic Protocols (extended version). Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2006 DBLP  BibTeX  RDF
1Joshua D. Guttman, Amy L. Herzog Rigorous automated network security management. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Filtering routers, IP security protocols, Formal methods, Network security, Security management
1Joshua D. Guttman, Amy L. Herzog, John D. Ramsdell, Clement W. Skorupka Verifying information flow goals in Security-Enhanced Linux. Search on Bibsonomy Journal of Computer Security The full citation details ... 2005 DBLP  BibTeX  RDF
1Joshua D. Guttman, Jonathan C. Herzog, John D. Ramsdell, Brian T. Sniffen Programming Cryptographic Protocols. Search on Bibsonomy TGC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman A New Column: Information Security. Search on Bibsonomy Bulletin of the EATCS The full citation details ... 2004 DBLP  BibTeX  RDF
1Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck The faithfulness of abstract protocol analysis: Message authentication. Search on Bibsonomy Journal of Computer Security The full citation details ... 2004 DBLP  BibTeX  RDF
1Joshua D. Guttman Authentication tests and disjoint encryption: A design method for security protocols. Search on Bibsonomy Journal of Computer Security The full citation details ... 2004 DBLP  BibTeX  RDF
1Joshua D. Guttman Security, Protocols, and Trust. Search on Bibsonomy VMCAI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, F. Javier Thayer, Jay A. Carlson, Jonathan C. Herzog, John D. Ramsdell, Brian T. Sniffen Trust Management in Strand Spaces: A Rely-Guarantee Method. Search on Bibsonomy ESOP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Li Gong, Joshua D. Guttman, Peter Y. A. Ryan, Steve A. Schneider Guest editorial overview. Search on Bibsonomy IEEE Journal on Selected Areas in Communications The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, F. Javier Thayer Authentication tests and the structure of bundles. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Security Protocol Design via Authentication Tests. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Key Compromise, Strand Spaces, and the Authentication Tests. Search on Bibsonomy Electr. Notes Theor. Comput. Sci. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck The faithfulness of abstract protocol analysis: message authentication. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Andre Scedrov, Ran Canetti, Joshua D. Guttman, David A. Wagner 0001, Michael Waidner Relating Cryptography and Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1William M. Farmer, Joshua D. Guttman A Set Theory with Support for Partial Functions. Search on Bibsonomy Studia Logica The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer Authentication and Confidentiality via IPSEC. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, F. Javier Thayer Protocol Independence through Disjoint Encryption. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, F. Javier Thayer Authentication Tests. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Security Goals: Packet Trajectories and Strand Spaces. Search on Bibsonomy FOSAD The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman Strand Spaces: Proving Security Protocols Correct. Search on Bibsonomy Journal of Computer Security The full citation details ... 1999 DBLP  BibTeX  RDF
1F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman Mixed Strand Spaces. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman Honest Ideals on Strand Spaces. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Shimshon Berkovits, Joshua D. Guttman, Vipin Swarup Authentication for Mobile Agents. Search on Bibsonomy Mobile Agents and Security The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman Strand Spaces: Why is a Security Protocol Correct? Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Filtering Postures: Local Enforcement for Global Policies. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 1997 DBLP  DOI  BibTeX  RDF filtering postures, global policy local enforcement, global network access control, optimal service, network topology, security policy, routers, authorisation, packet filtering, prototype implementation
1William M. Farmer, Joshua D. Guttman, Vipin Swarup Security for Mobile Agents: Authentication and State Appraisal. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1William M. Farmer, Joshua D. Guttman, F. Javier Thayer IMPS: An Updated System Description. Search on Bibsonomy CADE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, John D. Ramsdell, Mitchell Wand VLISP: A Verified Implementation of Scheme. Search on Bibsonomy Lisp and Symbolic Computation The full citation details ... 1995 DBLP  BibTeX  RDF
1Joshua D. Guttman, John D. Ramsdell, Vipin Swarup The VLISP Verified Scheme System. Search on Bibsonomy Lisp and Symbolic Computation The full citation details ... 1995 DBLP  BibTeX  RDF
1William M. Farmer, Joshua D. Guttman, F. Javier Thayer Context in Mathematical Reasoning and Computation. Search on Bibsonomy J. Symb. Comput. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, Dale M. Johnson Three Applications of Formal Methods at MITRE. Search on Bibsonomy FME The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1William M. Farmer, Joshua D. Guttman, Mark E. Nadel, F. Javier Thayer Proof Script Pragmatics in IMPS. Search on Bibsonomy CADE The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1William M. Farmer, Joshua D. Guttman, F. Javier Thayer IMPS: An Interactive Mathematical Proof System. Search on Bibsonomy J. Autom. Reasoning The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1William M. Farmer, Joshua D. Guttman, F. Javier Thayer Reasoning with Contexts. Search on Bibsonomy DISCO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Panel: Use of Formal Methods in the Analysis of Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  BibTeX  RDF
1William M. Farmer, Joshua D. Guttman, F. Javier Thayer IMPS: System Description. Search on Bibsonomy CADE The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1William M. Farmer, Joshua D. Guttman, F. Javier Thayer Little Theories. Search on Bibsonomy CADE The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, H.-P. Ko Verifying a Hardware Security Architecture. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1William M. Farmer, Joshua D. Guttman, F. Javier Thayer IMPS: An Interactive Mathematical Proof System. Search on Bibsonomy CADE The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, Mark E. Nadel What Needs Securing. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
Displaying result #1 - #94 of 94 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license