Segueix
Joshua Guttman
Joshua Guttman
Research Professor, Computer Science, Worcester Polytechnic Institute
Correu electrònic verificat a wpi.edu - Pàgina d'inici
Títol
Citada per
Citada per
Any
Strand spaces: Proving security protocols correct
FJT Fábrega, JC Herzog, JD Guttman
Journal of computer security 7 (2/3), 191-230, 1999
9511999
Strand spaces: Why is a security protocol correct?
FJT Fábrega, JC Herzog, JD Guttman
Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998
7981998
Security for mobile agents: Authentication and state appraisal
WM Farmer, JD Guttman, V Swarup
Computer Security—ESORICS 96: 4th European Symposium on Research in …, 1996
4231996
Security for mobile agents: Issues and requirements
WM Farmer, JD Guttman, V Swarup
Proceedings of the 19th national information systems security conference 2 …, 1996
3871996
Principles of remote attestation
G Coker, J Guttman, P Loscocco, A Herzog, J Millen, B O’Hanlon, ...
International journal of information security 10, 63-81, 2011
3242011
IMPS: An interactive mathematical proof system
WM Farmer, JD Guttman, FJ Thayer
Journal of Automated Reasoning 11, 213-248, 1993
3071993
Authentication tests and the structure of bundles
JD Guttman, FJ Thayer
Theoretical computer science 283 (2), 333-380, 2002
2712002
Filtering postures: Local enforcement for global policies
JD Guttman
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
2501997
Honest ideals on strand spaces
FJT Fábrega, JC Herzog, JD Guttman
Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No …, 1998
2481998
Little theories
WM Farmer, JD Guttman, F Javier Thayer
International Conference on Automated Deduction, 567-581, 1992
1941992
Protocol independence through disjoint encryption
JD Guttman, FJF Thayer
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 24-34, 2000
1932000
Authentication tests
JD Guttman, FJ Thayer
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 96-109, 2000
1692000
Authentication for mobile agents
S Berkovits, JD Guttman, V Swarup
Mobile agents and security, 114-136, 1998
1631998
Secure ad hoc trust initialization and key management in wireless body area networks
M Li, S Yu, JD Guttman, W Lou, K Ren
ACM Transactions on sensor Networks (TOSN) 9 (2), 1-35, 2013
1542013
Verifying information flow goals in security-enhanced Linux
JD Guttman, AL Herzog, JD Ramsdell, CW Skorupka
Journal of Computer Security 13 (1), 115-134, 2005
1292005
Searching for shapes in cryptographic protocols
SF Doghmi, JD Guttman, FJ Thayer
International conference on tools and algorithms for the construction and …, 2007
1262007
Security protocol design via authentication tests
JD Guttman
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 92-103, 2002
1242002
Rigorous automated network security management
JD Guttman, AL Herzog
International Journal of Information Security 4, 29-48, 2005
1082005
Trust management in strand spaces: A rely-guarantee method
JD Guttman, FJ Thayer, JA Carlson, JC Herzog, JD Ramsdell, BT Sniffen
European Symposium on Programming, 325-339, 2004
962004
VLISP: A verified implementation of Scheme
JD Guttman, JD Ramsdell, M Wand
Lisp and Symbolic Computation 8 (1), 5-32, 1995
961995
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20