Found 173 results
2001
Jeffords, R., and C. L. Heitmeyer, "An Algorithm for Strengthening State Invariants Generated from Requirements Specifications", Fifth IEEE Int'l Symp. on Requirements Engineering (RE'01), Toronto, Canada, 2001. JeffordsHeitmeyer2001.pdf (344.59 KB)
Heitmeyer, C. L., "Applying 'Practical' Formal Methods to the Specification and Analysis of Security Properties", Information Assurance in Computer Networks (MMM-ACNS 2001), St. Petersburg, Russia, 2001. Heitmeyer2001.pdf (137.38 KB)
Chang, LW., and I. S. Moskowitz, "A Bayesian Network Schema for Lessoning Database Inference", International Conference on Computational Intelligence for Modeling, Control and Automation, Las Vegas, Nevada, 2001. ChangMoskowitz2001.pdf (151.37 KB)
Meadows, C., P. Syverson, and I. Cervesato, "Formalizing GDOI Group Key Management Requirements in NPATRL", 8th ACM Computer and Communications Security Conference - CCS'01: ACM Press, pp. 235-244, 2001. Meadows etal2001.pdf (148.49 KB)
"An Integrated Framework for Database Privacy Protection", Data And Applications Security: Developments and Directions: Kluwer Academic Publishers, pp. 161-172, 2001.
Syverson, P., and I. Cervesato, "The Logic of Authentication Protocols", Foundations of Security Analysis and Design --- FOSAD'00, vol. Springer-Verlag LNCS 2171, pp. 63-136, 2001. SyversonCervesato2001.pdf (492.12 KB)
Moskowitz, I. S., M. Kang, LW. Chang, and G. E. Longdon, "Randomly Roving Agents for Intrusion Detection", 15th IFIP WG 11.3 Working Conference on Database and Application Security, Niagra on the Lake, Canada, Kluwer Press, 2001. Moskowitz etal2001.pdf (257.73 KB)
2000
Riccobene, E., M. Archer, and C. L. Heitmeyer, "Applying TAME to I/O Automata: A User's Perspective", NRL Memorandum Report, no. 5540-00-8848, 2000. Riccobene etal2000.pdf (318 KB)
Heitmeyer, C. L., and R. Bharadwaj, "Applying the SCR Requirements Method to the Light Control Case Study", Journal of Universal Computer Science, 2000. HeitmeyerBharadwaj2000.pdf (363.13 KB)
Stubblebine, S., and P. Syverson, "Authentic Attributes with Fine-Grained Anonymity Protection", Financial Cryptography, 2000. StubblebineSyverson2000.pdf (286.58 KB)
Meadows, C., "A Cost-Based Framework for Analysis of Denial of Service in Networks", Journal of Computer Security, 2000. Meadows2000.pdf (245.87 KB)
"A Decision Based System for Information Downgrading", JCIS, Atlantic City, New Jersey, 2000.
Bharadwaj, R., and C. L. Heitmeyer, "Developing High Assurance Avionics Systems with the SCR Requirements Method", 19th Digital Avionics Systems Conference, Philadelphia, Pennsylvania, 2000. BharadwajHeitmeyer2000.pdf (71.48 KB)
Syverson, P., C. Meadows, and I. Cervesato, "Dolev-Yao is no better than Machiavelli", First Workshop on Issues in the Theory of Security - WITS'00, Geneva, Switzerland, pp. 87-92, 2000. Syverson etal2000.pdf (169.38 KB)
Meadows, C., "Extending Formal Cryptographic Protocol Analysis Techniques for Group Protocols and Low-Level Cryptographic Primitives", First Workshop on Issues in the Theory of Security - WITS'00, Geneva, Switzerland, pp. 87-92, 2000. Meadows2000b.pdf (21.31 KB)
Meadows, C., "Invariant Generation Techniques in Cryptographic Protocol Analysis", 13th Computer Security Foundations Workshop: IEEE Computer Society Press, 2000. Meadows2000c.pdf (100.12 KB)
"Network Pump (NP) Security Target", NRL Memorandum Report, no. 5540-00-8459, 2000.
Moskowitz, I. S., G. E. Longdon, and LW. Chang, "A New Paradigm Hidden in Steganography", New Security Paradigms Workshop, Cork, Ireland, Ballycotton, Co., 2000. Moskowitz etal2000.pdf (247.73 KB)
Syverson, P., M. Reed, and D. Goldschlag, "Onion Routing Access Configurations", DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition, vol. 1, Hilton Head, South Carolina, IEEE Computer Society Press, pp. 34-40, 2000. Syverson etal2000c.pdf (154.68 KB)
Meadows, C., "Open Issues in Formal Methods for Cryptographic Protocol Analysis", DISCEX 2000: IEEE Computer Society Press, pp. 237-250, 2000. Meadows2000d.pdf (168.94 KB)
Bharadwaj, R., and S. Sims, "Salsa: Combining Constraint Solvers with BDDs for Automatic Invariant Checking", Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2000): Springer, 2000. BharadwajSims2000.pdf (265.25 KB)
Archer, M., "TAME: Using PVS Strategies for Special-Purpose Theorem Proving", Annals of Mathematics and Artificial Intelligence, vol. 29, issue 1-4, pp. 139-181, 2000. Archer2000.pdf (462.98 KB)
Syverson, P., G. Tsudik, M. Reed, and C. Landwehr, "Towards an Analysis of Onion Routing Security", Workshop on Design Issues in Anonymity and Unobservability, Berkeley, California, 2000. Syverson etal2000b.pdf (252.37 KB)
"Using TAME to Prove Invariants of Automata Models: Two Case Studies", Third ACM Workshop on Formal Methods in Software Practice (FMSP'00), Portland, Oregon, pp. 25-36, 2000.
1999
Bharadwaj, R., and C. L. Heitmeyer, "Model Checking Complete Requirements Specifications Using Abstraction", Automated Software Engineering, vol. 6, issue 1, pp. 37-68, 1999. BharadwajHeitmeyer1999.pdf (171.03 KB)

Pages