Found 196 results
2005
"Point/Counterpoint", IEEE Software, vol. 22, issue 1, pp. 48-51, 2005.
Kang, M., I. S. Moskowitz, and S. Chincheck, "The Pump: A Decade of Covert Fun", 21st Annual Computer Security Applications Conference, 2005. PDF icon Kang etal 2005.pdf (535.23 KB)
Mitra, S., and M. Archer, "PVS Proof Strategies for Proving Abstraction Properties of Automata", Electronic Notes in Theoretical Computer Science, vol. 125, pp. 45-65, 2005. PDF icon MitraArcher2005.pdf (486.64 KB)
Kim, A., J. Luo, and M. Kang, "Security Ontology for Annotating Resources", 4th International Conference on Ontologies, Databases, and Applications of Semantics (ODBASE'05), Agia Napa, Cyprus, 2005. PDF icon Kim etal2005.pdf (249.7 KB)
Heitmeyer, C. L., M. Archer, R. Bharadwaj, and R. Jeffords, "Tools for constructing requirements specifications: The SCR toolset at the age of ten", International Journal of Computer Systems Science and Engineering, vol. 20, issue 1, pp. 19-35, 2005. PDF icon Heitmeyer etal2005.pdf (774.15 KB)
McDermott, J., "Visual Security Protocol Modeling", New Security Paradigms Workshop (NSPW), Lake Arrowhead, California, 2005. PDF icon McDermott2005.pdf (414.47 KB)
2004
Newman, R., V. R. Nalla, and I. S. Moskowitz, "Anonymity and Covert Channels in Simple Timed Mix-firewalls", PET2004, Toronto, Canada, 2004. PDF icon Newman etal2004.pdf (312.75 KB)
Archer, M., "Basing a Modeling Environment on a General Purpose Theorem Prover", 2004 Monterey Workshop on Software Engineering Tools: Compatibility and Integration, Baden, Austria, 2004. PDF icon Archer2004.pdf (10.51 MB)
Ahmed, F., and I. S. Moskowitz, "The Binary Phase Only Filter as an Image Watermark", NRL CHACS Tech Memo, no. 5540-38TM, 2004. PDF icon AhmedMoskowitz2004b.pdf (192.31 KB)
Ahmed, F., and I. S. Moskowitz, "Correlation-Based Watermarking Method for Image Authentication Applications", Optical Engineering, vol. 43, issue 8, 2004. PDF icon AhmedMoskowitz2004.pdf (424.74 KB)
"Covert Channels and Simple Timed Mix-firewalls", NRL Memorandum Report, 2004.
Miller, A. R., and I. S. Moskowitz, Difference of Sums Containing Products of Binomial Coefficients and their Logarithms, , 2004. PDF icon MillerMoskowitz2004.pdf (671.78 KB)
Heitmeyer, C. L., "Managing complexity in software development with formally based tools", ETAPS Workshop on Formal Foundations of Software and Component-Based Software Architectures (FESCA 2004), Barcelona, Spain, 2004. PDF icon Heitmeyer2004.pdf (175.67 KB)
"A New Framework for Shannon Information Theory", NRL Memorandum Report, no. NRL/MR/5540-04-8748, 2004.
"Phase signature-based umage authentication watermark robust to compression and coding", Mathematics of Data/Image Coding, Compression and Encrption VII, with Applications, pp. 133-144, 2004.
Zhan, Z., and LW. Chang, "Privacy-Preserving Collaborative Sequential Pattern Mining", Workshop on Link Analysis, Counter-terrorism and Privacy, 2004. PDF icon ZhanChang2004.pdf (131.54 KB)
Zhan, Z., LW. Chang, and S. Matwin, "Privacy-Preserving Naive Bayesian Classification", IASTED conference on AIA, Austria, 2004. PDF icon Zhan etal2004.pdf (132.97 KB)
Mitra, S., and M. Archer, "Reusable PVS Proof Strategies for Proving Abstraction Properties of I/O Automata", Fourth International Workshop on Strategies in Automated Deduction (STRATEGIES 2004), Cork, Ireland, 2004. PDF icon MitraArcher2004.pdf (486.64 KB)
Dingledine, R., V. Shmatikov, and P. Syverson, "Synchronous Batching: From Cascades to Free Routes", Privacy Enhancing Technologies workshop (PET 2004), 2004. PDF icon Dingledine etal2004b.pdf (303.49 KB)
Dingledine, R., N. Mathewson, and P. Syverson, "Tor: The Second-Generation Onion Router", 13th USENIX Security Symposium, 2004. PDF icon Dingledine etal2004.pdf (214.58 KB)
Jeffords, R., and E. Leonard, "Using Invariants to Optimize Formal Specifications Before Code Synthesis", 2nd ACM/IEEE Int'l Conf. on Formal Methods and Models for Co-Design (MEMOCODE 2004), San Diego, California, 2004. PDF icon JeffordsLeonard2004.pdf (127.34 KB)
Shostack, A., and P. Syverson, "What Price Privacy? (and why identity theft is about neither identity nor theft)", Economics of Information Security: Kluwer Academic Publishers, pp. 129-142, 2004. PDF icon ShostackSyverson2004.pdf (65.66 KB)
2003
Tracy, J., LW. Chang, and I. S. Moskowitz, "An Agent-based Approach to Inference Prevention in Distributed Database Systems", International Journal on Artificial Intelligence Tools, vol. 12, issue 3, pp. 297-314, 2003. PDF icon Tracy etal2003.pdf (220.93 KB)
"Analyzing Security-Enhanced Linux Policy Specifications", NRL Memorandum Report, no. MR-8659, 2003.
"Analyzing Security-Enhanced Linux Policy Specifications", IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy, 2003.

Pages