Found 190 results
2003
Meadows, C., "Formal Methods for Cryptographic Protocol Analysis: Emerging Issues and Trends", IEEE Journal on Selected Areas in Communication, vol. 21, issue 1, pp. 44-54, 2003. PDF icon Meadows2003d.pdf (106.87 KB)
Meadows, C., P. Syverson, and I. Cervesato, "Formal Specification and Analysis of the Group Domain of Interpretation Protocol Using NPATRL and the NRL Protocol Analyzer", Journal of Computer Security, 2003. PDF icon Meadows etal2003.pdf (334.45 KB)
Bharadwaj, R., "A Framework for the Formal Analysis of Multi-Agent Systems", Formal Approaches to Multi-Agent Systems (FAMAS), affiliated with ETAPS 2003, Warsaw, Poland, 2003. PDF icon Bharadwaj2003c.pdf (228.44 KB)
Bharadwaj, R., "How to Fake a Rational Design Process using the SCR Method", Software Engineering for High Assurance Systems (SEHAS 2003), Portland, Oregon, 2003. PDF icon Bharadwaj2003b.pdf (75.62 KB)
Newman, R., I. S. Moskowitz, P. Syverson, and A. Serjantov, "Metrics for Traffic Analysis Prevention", PET 2003 Workshop on Privacy Enhancing Technologies, Dresden, Germany, 2003. PDF icon Newman etal2003.pdf (218.12 KB)
Archer, M., E. Leonard, and M. Pradella, "Modeling Security-Enchanced Linux Policy Specifications for Analysis", Research Summaries for DISCEX III, Washington, D.C., 2003. PDF icon Archer etal2003.pdf (192.2 KB)
Shyu, M-L., S-C. Chen, K. Sarinnapakorn, and LW. Chang, "A Novel Anomaly Detection Scheme Based on Principal Component Classifier", ICDM Foundation and New Direction of Data Mining workshop, pp. 172-179, 2003. PDF icon Shyu etal2003.pdf (359.15 KB)
Syverson, P., "The Paradoxical Value of Privacy", 2nd Annual Workshop on Economics and Information Security (WEIS 2003), College Park, Maryland, 2003. PDF icon Syverson2003.pdf (89.15 KB)
"Privacy-preserving Collaborative Data Mining", ICDM Foundation and New Directions of Data Mining workshop, pp. 228-235, 2003.
Meadows, C., "A Procedure for Verifying Security Against Type Confusion Attacks", 16th IEEE Computer Security Foundations Workshop: IEEE Computer Society Press, 2003. PDF icon Meadows2003c.pdf (145.43 KB)
Leonard, E., and C. L. Heitmeyer, "Program Synthesis from Formal Requirements Specifications using APTS", Higher-Order and Symbolic Computation, vol. 16, issue 1-2, pp. 63-92, 2003. PDF icon LeonardHeitmeyer2003.pdf (164.15 KB)
Moskowitz, I. S., R. Newman, and P. Syverson, "Quasi-Anonymous Channels", CNIS 2003, New York City, New York, 2003. PDF icon Moskowitz etal2003.pdf (60.86 KB)
Bharadwaj, R., "Secure Middleware for Situation-Aware Naval C2 and Combat Systems", 9th International Workshop on Future Trends of Distributed Comput ing Systems (FTDCS 2003), San Juan, Puerto Rico, 2003. PDF icon Bharadwaj2003.pdf (169.53 KB)
Chang, LW., "Statistical Sensitive Data Protection And Inference Prevention with Decision Tree Methods", Joint Statistical Meeting 2003, 2003. PDF icon Chang2003.pdf (119.01 KB)
Jeffords, R., and C. L. Heitmeyer, "A Strategy for Efficiently Verifying Requirements Specifications Using Composition and Invariants", European Software Engineering Conference/ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2003), Helsinki, Finland, 2003. PDF icon JeffordsHeitmeyer2003.pdf (211.53 KB)
Meadows, C., "Towards a Hierarchy of Cryptographic Protocol Models", FMSE 2003: Formal Methods in Security Engineering: ACM Press, 2003. PDF icon Meadows2003.pdf (49.02 KB)
Bharadwaj, R., "Verifiable Middleware for Secure Agent Interoperability", 2nd Goddard IEEE Workshop on Formal Approaches to Agent-Based Systems, Greenbelt, Maryland, 2003. PDF icon Bharadwaj2003d.pdf (183.81 KB)
Meadows, C., "What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis", ESOP 03, 2003. PDF icon Meadows2003b.pdf (168.07 KB)
2002
Tracy, J., LW. Chang, and I. S. Moskowitz, "An Agent-based Approach to Inference Prevention in Distributed Database Systems", 14th IEEE International Conference on Tools with Artificial Intelligence, Washington, D.C., pp. 413-422, 2002. PDF icon Tracy etal2002.pdf (220.93 KB)
Moskowitz, I. S., LW. Chang, and R. Newman, "Capacity is the Wrong Paradigm", New Security Paradigms Workshop (NSPW), Virginia Beach, Virginia, 2002. PDF icon Moskowitz etal2002b.pdf (247.04 KB)
Moskowitz, I. S., N. F. Johnson, and M. Jacobs, "A Detection Study of an NRL Steganographic Method", NRL Memorandum Report, no. NRL/MR/554002-8635, 2002. PDF icon Moskowitz etal2002.pdf (14.22 MB)
Canetti, R., C. Meadows, and P. Syverson, "Environmental Requirements for Authentication Protocols", International Symposium on Software Security, vol. Springer-Verlag LNCS 2609, pp. 339-355, 2002. PDF icon Canetti etal2002.pdf (186.26 KB)
Bharadwaj, R., "Formal Analysis of Domain Models", International Workshop on Requirements for High Assurance Systems (RHAS'02), Essen, Germany, 2002. PDF icon Bharadwaj2002.pdf (200.72 KB)
Serjantov, A., R. Dingledine, and P. Syverson, "From a Trickle to a Flood: Active Attacks on Several Mix Types", Information Hiding, vol. Springer-Verlag LNCS 2578, pp. 36-52, 2002. PDF icon Serjantov etal2002.pdf (222.02 KB)
Meadows, C., "Identifying Potential Type Confusion in Authenticated Messages", Workshop on Foundations of Computer Security, Copenhagen, Denmark, 2002. PDF icon Meadows2002b.pdf (125.64 KB)

Pages