Found 190 results
Bharadwaj, R., J. Froscher, A. Khashnobish, and J. Tracy, "An Infrastructure for Secure Interoperability of Agents", Sixth World Multiconference on Systemics, Cybernetics, and Informatics, Orlando, Florida, 2002. PDF icon Bharadwaj etal2002.pdf (32.11 KB)
"Issues in Information Hiding Transform Techniques", NRL Memorandum Report, no. 5540-02-8621, 2002.
Chang, LW., and J. Tracy, "Multi-Dimensional Inference and Confidential Data Protection with Decision Tree Methods", ICDM02 Workshop: The Foundation of Data Mining and Knowledge Discovery, Maebashi, Japan, pp. 195-200, 2002. PDF icon ChangTracy2002.pdf (204 KB)
Archer, M., "Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME", WITS '02, Portland, Oregon, 2002. PDF icon Archer2002.pdf (191.65 KB)
Archer, M., C. L. Heitmeyer, and E. Riccobene, "Proving Invariants of I/O Automata with TAME", Automated Software Engineering, vol. 9, pp. 201-232, 2002. PDF icon Archer etal2002.pdf (355.28 KB)
Dingledine, R., and P. Syverson, "Reliable MIX Cascade Networks through Reputation", Financial Cryptography 2002, 2002. PDF icon DingledineSyverson2002.pdf (210 KB)
Dingledine, R., N. Mathewson, and P. Syverson, "Reputation in Privacy Enhancing Technologies", Computer, Freedom, and Privacy, 2002. PDF icon Dingledine etal2002.pdf (25.17 KB)
Kirby, Jr, J., "Rewriting Requirements for Design", IASTED International Conference on Software Engineering and Applications (SEA) 2002, Cambridge, Massachusetts , 2002. PDF icon Kirby2002.pdf (274.15 KB)
Bharadwaj, R., "SINS: A middleware for autonomous agents and secure code mobility", Second International Workshop on Security of Mobile Multi-Agent Systems (SEMAS-02), First International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2002), Bologna, Italy, 2002. PDF icon Bharadwaj2002b.pdf (119.17 KB)
Heitmeyer, C. L., and J. J. Marciniak, "Software Cost Reduction", Encyclopedia of Software Engineering, vol. 2, 2002. PDF icon Heitmeyer2002.pdf (220.45 KB)
Bharadwaj, R., "SOL: A Verifiable Synchronous Language for Reactive Systems", Synchronous Languages, Applications, and Programming (SLAP'02), ETAPS'2002, Grenoble, France, 2002. PDF icon Bharadwaj2002c.pdf (219.78 KB)
Newman, R., I. S. Moskowitz, LW. Chang, and M. M. Brahmadesam, "A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis", Information Hiding, 2002. PDF icon Newman etal2002.pdf (251.68 KB)
Chang, LW., and I. S. Moskowitz, "A Study of Inference Problems in Distributed Databases", IFIP 11.3 WG in Data Security and Applications, Kings College, UK, 2002. PDF icon ChangMoskowitz2002.pdf (256.28 KB)
"Towards a Methodology and Tool for the Analysis of Security-Enhanced Linux Security Policies", NRL Memorandum Report, no. 5540--02-8629, 2002.
"A Unification Algorithm for the Group Diffie-Hellman Protocol", WITS '02, 2002.
Meadows, C., "Using a Declarative Language to Build an Experimental Analysis Tool", PADL '02, vol. Springer Verlag LNCS 2257, pp. 1-2, 2002. PDF icon Meadows2002.pdf (1.55 MB)
"Verifiable Middleware for Secure Agent Interoperability", Second Goddard IEEE Workshop on Formal Approaches to Agent-Based Systems (FAABS II), Greenbelt, Maryland, 2002.
Jeffords, R., and C. L. Heitmeyer, "An Algorithm for Strengthening State Invariants Generated from Requirements Specifications", Fifth IEEE Int'l Symp. on Requirements Engineering (RE'01), Toronto, Canada, 2001. PDF icon JeffordsHeitmeyer2001.pdf (344.59 KB)
Heitmeyer, C. L., "Applying 'Practical' Formal Methods to the Specification and Analysis of Security Properties", Information Assurance in Computer Networks (MMM-ACNS 2001), St. Petersburg, Russia, 2001. PDF icon Heitmeyer2001.pdf (137.38 KB)
Chang, LW., and I. S. Moskowitz, "A Bayesian Network Schema for Lessoning Database Inference", International Conference on Computational Intelligence for Modeling, Control and Automation, Las Vegas, Nevada, 2001. PDF icon ChangMoskowitz2001.pdf (151.37 KB)
Meadows, C., P. Syverson, and I. Cervesato, "Formalizing GDOI Group Key Management Requirements in NPATRL", 8th ACM Computer and Communications Security Conference - CCS'01: ACM Press, pp. 235-244, 2001. PDF icon Meadows etal2001.pdf (148.49 KB)
"An Integrated Framework for Database Privacy Protection", Data And Applications Security: Developments and Directions: Kluwer Academic Publishers, pp. 161-172, 2001.
Syverson, P., and I. Cervesato, "The Logic of Authentication Protocols", Foundations of Security Analysis and Design --- FOSAD'00, vol. Springer-Verlag LNCS 2171, pp. 63-136, 2001. PDF icon SyversonCervesato2001.pdf (492.12 KB)
Moskowitz, I. S., M. Kang, LW. Chang, and G. E. Longdon, "Randomly Roving Agents for Intrusion Detection", 15th IFIP WG 11.3 Working Conference on Database and Application Security, Niagra on the Lake, Canada, Kluwer Press, 2001. PDF icon Moskowitz etal2001.pdf (257.73 KB)
Riccobene, E., M. Archer, and C. L. Heitmeyer, "Applying TAME to I/O Automata: A User's Perspective", NRL Memorandum Report, no. 5540-00-8848, 2000. PDF icon Riccobene etal2000.pdf (318 KB)