Found 181 results
Heitmeyer, C. L., and J. J. Marciniak, "Software Cost Reduction", Encyclopedia of Software Engineering, vol. 2, 2002. PDF icon Heitmeyer2002.pdf (220.45 KB)
Bharadwaj, R., "SOL: A Verifiable Synchronous Language for Reactive Systems", Synchronous Languages, Applications, and Programming (SLAP'02), ETAPS'2002, Grenoble, France, 2002. PDF icon Bharadwaj2002c.pdf (219.78 KB)
Newman, R., I. S. Moskowitz, LW. Chang, and M. M. Brahmadesam, "A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis", Information Hiding, 2002. PDF icon Newman etal2002.pdf (251.68 KB)
Chang, LW., and I. S. Moskowitz, "A Study of Inference Problems in Distributed Databases", IFIP 11.3 WG in Data Security and Applications, Kings College, UK, 2002. PDF icon ChangMoskowitz2002.pdf (256.28 KB)
"Towards a Methodology and Tool for the Analysis of Security-Enhanced Linux Security Policies", NRL Memorandum Report, no. 5540--02-8629, 2002.
"A Unification Algorithm for the Group Diffie-Hellman Protocol", WITS '02, 2002.
Meadows, C., "Using a Declarative Language to Build an Experimental Analysis Tool", PADL '02, vol. Springer Verlag LNCS 2257, pp. 1-2, 2002. PDF icon Meadows2002.pdf (1.55 MB)
"Verifiable Middleware for Secure Agent Interoperability", Second Goddard IEEE Workshop on Formal Approaches to Agent-Based Systems (FAABS II), Greenbelt, Maryland, 2002.
Jeffords, R., and C. L. Heitmeyer, "An Algorithm for Strengthening State Invariants Generated from Requirements Specifications", Fifth IEEE Int'l Symp. on Requirements Engineering (RE'01), Toronto, Canada, 2001. PDF icon JeffordsHeitmeyer2001.pdf (344.59 KB)
Heitmeyer, C. L., "Applying 'Practical' Formal Methods to the Specification and Analysis of Security Properties", Information Assurance in Computer Networks (MMM-ACNS 2001), St. Petersburg, Russia, 2001. PDF icon Heitmeyer2001.pdf (137.38 KB)
Chang, LW., and I. S. Moskowitz, "A Bayesian Network Schema for Lessoning Database Inference", International Conference on Computational Intelligence for Modeling, Control and Automation, Las Vegas, Nevada, 2001. PDF icon ChangMoskowitz2001.pdf (151.37 KB)
Meadows, C., P. Syverson, and I. Cervesato, "Formalizing GDOI Group Key Management Requirements in NPATRL", 8th ACM Computer and Communications Security Conference - CCS'01: ACM Press, pp. 235-244, 2001. PDF icon Meadows etal2001.pdf (148.49 KB)
"An Integrated Framework for Database Privacy Protection", Data And Applications Security: Developments and Directions: Kluwer Academic Publishers, pp. 161-172, 2001.
Syverson, P., and I. Cervesato, "The Logic of Authentication Protocols", Foundations of Security Analysis and Design --- FOSAD'00, vol. Springer-Verlag LNCS 2171, pp. 63-136, 2001. PDF icon SyversonCervesato2001.pdf (492.12 KB)
Moskowitz, I. S., M. Kang, LW. Chang, and G. E. Longdon, "Randomly Roving Agents for Intrusion Detection", 15th IFIP WG 11.3 Working Conference on Database and Application Security, Niagra on the Lake, Canada, Kluwer Press, 2001. PDF icon Moskowitz etal2001.pdf (257.73 KB)
Riccobene, E., M. Archer, and C. L. Heitmeyer, "Applying TAME to I/O Automata: A User's Perspective", NRL Memorandum Report, no. 5540-00-8848, 2000. PDF icon Riccobene etal2000.pdf (318 KB)
Heitmeyer, C. L., and R. Bharadwaj, "Applying the SCR Requirements Method to the Light Control Case Study", Journal of Universal Computer Science, 2000. PDF icon HeitmeyerBharadwaj2000.pdf (363.13 KB)
Stubblebine, S., and P. Syverson, "Authentic Attributes with Fine-Grained Anonymity Protection", Financial Cryptography, 2000. PDF icon StubblebineSyverson2000.pdf (286.58 KB)
Meadows, C., "A Cost-Based Framework for Analysis of Denial of Service in Networks", Journal of Computer Security, 2000. PDF icon Meadows2000.pdf (245.87 KB)
"A Decision Based System for Information Downgrading", JCIS, Atlantic City, New Jersey, 2000.
Bharadwaj, R., and C. L. Heitmeyer, "Developing High Assurance Avionics Systems with the SCR Requirements Method", 19th Digital Avionics Systems Conference, Philadelphia, Pennsylvania, 2000. PDF icon BharadwajHeitmeyer2000.pdf (71.48 KB)
Syverson, P., C. Meadows, and I. Cervesato, "Dolev-Yao is no better than Machiavelli", First Workshop on Issues in the Theory of Security - WITS'00, Geneva, Switzerland, pp. 87-92, 2000. PDF icon Syverson etal2000.pdf (169.38 KB)
Meadows, C., "Extending Formal Cryptographic Protocol Analysis Techniques for Group Protocols and Low-Level Cryptographic Primitives", First Workshop on Issues in the Theory of Security - WITS'00, Geneva, Switzerland, pp. 87-92, 2000. PDF icon Meadows2000b.pdf (21.31 KB)
Meadows, C., "Invariant Generation Techniques in Cryptographic Protocol Analysis", 13th Computer Security Foundations Workshop: IEEE Computer Society Press, 2000. PDF icon Meadows2000c.pdf (100.12 KB)
"Network Pump (NP) Security Target", NRL Memorandum Report, no. 5540-00-8459, 2000.