Found 181 results
Zhan, Z., and LW. Chang, "Privacy-Preserving Collaborative Sequential Pattern Mining", Workshop on Link Analysis, Counter-terrorism and Privacy, 2004. ZhanChang2004.pdf (131.54 KB)
Zhan, Z., LW. Chang, and S. Matwin, "Privacy-Preserving Naive Bayesian Classification", IASTED conference on AIA, Austria, 2004. Zhan etal2004.pdf (132.97 KB)
Mitra, S., and M. Archer, "Reusable PVS Proof Strategies for Proving Abstraction Properties of I/O Automata", Fourth International Workshop on Strategies in Automated Deduction (STRATEGIES 2004), Cork, Ireland, 2004. MitraArcher2004.pdf (486.64 KB)
Dingledine, R., V. Shmatikov, and P. Syverson, "Synchronous Batching: From Cascades to Free Routes", Privacy Enhancing Technologies workshop (PET 2004), 2004. Dingledine etal2004b.pdf (303.49 KB)
Dingledine, R., N. Mathewson, and P. Syverson, "Tor: The Second-Generation Onion Router", 13th USENIX Security Symposium, 2004. Dingledine etal2004.pdf (214.58 KB)
Jeffords, R., and E. Leonard, "Using Invariants to Optimize Formal Specifications Before Code Synthesis", 2nd ACM/IEEE Int'l Conf. on Formal Methods and Models for Co-Design (MEMOCODE 2004), San Diego, California, 2004. JeffordsLeonard2004.pdf (127.34 KB)
Shostack, A., and P. Syverson, "What Price Privacy? (and why identity theft is about neither identity nor theft)", Economics of Information Security: Kluwer Academic Publishers, pp. 129-142, 2004. ShostackSyverson2004.pdf (65.66 KB)
Tracy, J., LW. Chang, and I. S. Moskowitz, "An Agent-based Approach to Inference Prevention in Distributed Database Systems", International Journal on Artificial Intelligence Tools, vol. 12, issue 3, pp. 297-314, 2003. Tracy etal2003.pdf (220.93 KB)
"Analyzing Security-Enhanced Linux Policy Specifications", NRL Memorandum Report, no. MR-8659, 2003.
"Analyzing Security-Enhanced Linux Policy Specifications", IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy, 2003.
Moskowitz, I. S., R. Newman, A. R. Miller, and D. P. Crepeau, "Covert Channels and Anonymizing Networks", WPES'03, Washington, D.C., 2003. Moskowitz etal2003b.pdf (356.86 KB)
"A Detailed Mathematical Analysis of a Class of Covert Channels Arising in Certain Anonymizing Networks", NRL Memorandum Report, no. NRL/MR/5540--03-8691, 2003.
Mitra, S., and M. Archer, "Developing Strategies for Specialized Theorem Proving about Untimed, Timed, and Hybrid I/O Automata", First International Workshop on Design and Application of Strategies/Tactics in Higher Order Logics (STRATA 2003), Rome, Italy, 2003. MitraArcher2003.pdf (159.7 KB)
"Developing User Strategies in PVS: A Tutorial", First International Workshop on Design and Application of Strategies/Tactics in Higher Order Logics (STRATA 2003), Rome, Italy, 2003.
Kim, SE., P. In, and R. Bharadwaj, "An Extended Framework for the Validation and Verification of Situation-Aware Middleware Architectures", Proceedings Ground System Architectures Workshop (GSAW 2003), Manhattan Beach, California, 2003. Kim etal2003.pdf (52.47 KB)
Cervesato, I., and C. Meadows, "A Fault Tree Representation of NPATRL Security Requirements", Workshop on Issues in Theory of Security 2003, 2003. CervesatoMeadows2003.pdf (221.4 KB)
Meadows, C., "Formal Methods for Cryptographic Protocol Analysis: Emerging Issues and Trends", IEEE Journal on Selected Areas in Communication, vol. 21, issue 1, pp. 44-54, 2003. Meadows2003d.pdf (106.87 KB)
Meadows, C., P. Syverson, and I. Cervesato, "Formal Specification and Analysis of the Group Domain of Interpretation Protocol Using NPATRL and the NRL Protocol Analyzer", Journal of Computer Security, 2003. Meadows etal2003.pdf (334.45 KB)
Bharadwaj, R., "A Framework for the Formal Analysis of Multi-Agent Systems", Formal Approaches to Multi-Agent Systems (FAMAS), affiliated with ETAPS 2003, Warsaw, Poland, 2003. Bharadwaj2003c.pdf (228.44 KB)
Bharadwaj, R., "How to Fake a Rational Design Process using the SCR Method", Software Engineering for High Assurance Systems (SEHAS 2003), Portland, Oregon, 2003. Bharadwaj2003b.pdf (75.62 KB)
Newman, R., I. S. Moskowitz, P. Syverson, and A. Serjantov, "Metrics for Traffic Analysis Prevention", PET 2003 Workshop on Privacy Enhancing Technologies, Dresden, Germany, 2003. Newman etal2003.pdf (218.12 KB)
Archer, M., E. Leonard, and M. Pradella, "Modeling Security-Enchanced Linux Policy Specifications for Analysis", Research Summaries for DISCEX III, Washington, D.C., 2003. Archer etal2003.pdf (192.2 KB)
Shyu, M-L., S-C. Chen, K. Sarinnapakorn, and LW. Chang, "A Novel Anomaly Detection Scheme Based on Principal Component Classifier", ICDM Foundation and New Direction of Data Mining workshop, pp. 172-179, 2003. Shyu etal2003.pdf (359.15 KB)
Syverson, P., "The Paradoxical Value of Privacy", 2nd Annual Workshop on Economics and Information Security (WEIS 2003), College Park, Maryland, 2003. Syverson2003.pdf (89.15 KB)
"Privacy-preserving Collaborative Data Mining", ICDM Foundation and New Directions of Data Mining workshop, pp. 228-235, 2003.