Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Joshua D.
    Last name: Guttman
    DBLP: 91/7024
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 84 of 84  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Joshua D. Guttman.
    Information Flow, Distributed Systems, and Refinement, by Example.
    Concurrency, Security, and Puzzles - Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday 2017 (0) 2017
    Conference paper
    Megumi Ando, Joshua D. Guttman, Alberto R. Papaleo, John Scire.
    Hash-Based TPM Signatures for the Quantum World.
    Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings 2016 (0) 2016
    Conference paper
    Pedro Adão, Riccardo Focardi, Joshua D. Guttman, Flaminia L. Luccio.
    Localizing Firewall Security Policies.
    IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016 2016 (0) 2016
    Conference paper
    Paul D. Rowe, Joshua D. Guttman, Moses D. Liskov.
    Measuring protocol strength with security goals.
    Int. J. Inf. Sec. 2016, Volume 15 (0) 2016
    Conference paper
    Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe.
    Cross-Tool Semantics for Protocol Security Goals.
    Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Joshua D. Guttman, Paul D. Rowe.
    A Cut Principle for Information Flow.
    IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015 2015 (0) 2015
    Journal article
    Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe.
    Formal Support for Standardizing Protocols with State.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Joshua D. Guttman.
    Limited Disclosure and Locality in Graphs.
    Programming Languages with Applications to Biology and Security - Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday 2015 (0) 2015
    Conference paper
    Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe.
    Formal Support for Standardizing Protocols with State.
    Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Megumi Ando, Joshua D. Guttman.
    Composable Bounds on Information Flow from Distribution Differences.
    Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers 2016 (0) 2015
    Conference paper
    Joshua D. Guttman.
    Establishing and preserving protocol security goals.
    Journal of Computer Security 2014, Volume 22 (0) 2014
    Journal article
    John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman, Paul D. Rowe.
    A Hybrid Analysis for Security Protocols with State.
    CoRR 2014, Volume 0 (0) 2014
    Conference paper
    John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman, Paul D. Rowe.
    A Hybrid Analysis for Security Protocols with State.
    Integrated Formal Methods - 11th International Conference, IFM 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings 2014 (0) 2014
    Journal article
    Joshua D. Guttman, Paul D. Rowe.
    A Cut Principle for Information Flow.
    CoRR 2014, Volume 0 (0) 2014
    Conference paper
    Daniel J. Dougherty, Joshua D. Guttman.
    Decidability for Lightweight Diffie-Hellman Protocols.
    IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014 2014 (0) 2014
    Conference paper
    Joshua D. Guttman, Moses D. Liskov, Paul D. Rowe.
    Security Goals and Evolving Standards.
    Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Ming Li, Shucheng Yu, Joshua D. Guttman, Wenjing Lou, Kui Ren.
    Secure ad hoc trust initialization and key management in wireless body area networks.
    TOSN 2012, Volume 9 (0) 2013
    Conference paper
    Marco Carbone, Joshua D. Guttman.
    Sessions and Separability in Security Protocols.
    Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Yantian Hou, Ming Li 0003, Joshua D. Guttman.
    Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel.
    Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013 2013 (0) 2013
    Conference paper
    Chuan Lei, Elke A. Rundensteiner, Joshua D. Guttman.
    Robust distributed stream processing.
    29th IEEE International Conference on Data Engineering, ICDE 2013, Brisbane, Australia, April 8-12, 2013 2013 (0) 2013
    Conference paper
    Pierpaolo Degano, Joshua D. Guttman.
    Preface.
    Journal of Computer Security 2013, Volume 21 (0) 2013
    Conference paper
    Joshua D. Guttman.
    State and Progress in Strand Spaces: Proving Fair Exchange.
    J. Autom. Reasoning 2012, Volume 48 (0) 2012
    Conference paper
    John D. Ramsdell, Joshua D. Guttman, Jonathan K. Millen, Brian O'Hanlon.
    An Analysis of the CAVES Attestation Protocol using CPSA
    CoRR 2012, Volume 0 (0) 2012
    Conference paper
    Daniel J. Dougherty, Joshua D. Guttman.
    Symbolic Protocol Analysis for Diffie-Hellman
    CoRR 2012, Volume 0 (0) 2012
    Conference paper
    Joshua D. Guttman.
    Trust Engineering via Security Protocols.
    2nd Workshop on Socio-Technical Aspects in Security and Trust, STAST 2012, Cambridge, MA, USA, June 25, 2012 2012 (0) 2012
    Conference paper
    Daniel J. Dougherty, Joshua D. Guttman.
    An Algebra for Symbolic Diffie-Hellman Protocol Analysis.
    Trustworthy Global Computing - 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers 2013 (0) 2012
    Conference paper
    George Coker, Joshua D. Guttman, Peter Loscocco, Amy L. Herzog, Jonathan Millen, Brian O'Hanlon, John D. Ramsdell, Ariel Segall, Justin Sheehy, Brian T. Sniffen.
    Principles of remote attestation.
    Int. J. Inf. Sec. 2011, Volume 10 (0) 2011
    Conference paper
    Joshua D. Guttman.
    Security Goals and Protocol Transformations.
    Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers 2012 (0) 2011
    Conference paper
    F. Javier Thayer, Vipin Swarup, Joshua D. Guttman.
    Metric Strand Spaces for Locale Authentication Protocols.
    Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Marco Carbone, Joshua D. Guttman.
    Execution Models for Choreographies and Cryptoprotocols
    CoRR 2010, Volume 0 (0) 2010
    Conference paper
    Joshua D. Guttman.
    Introduction.
    Journal of Computer Security 2009, Volume 17 (0) 2009
    Conference paper
    Joshua D. Guttman.
    Cryptographic Protocol Composition via the Authentication Tests.
    Foundations of Software Science and Computational Structures, 12th International Conference, FOSSACS 2009, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009, York, UK, March 22-29, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Joshua D. Guttman.
    Transformations between Cryptographic Protocols.
    Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers 2009 (0) 2009
    Conference paper
    Joshua D. Guttman.
    Fair Exchange in Strand Spaces
    CoRR 2009, Volume 0 (0) 2009
    Conference paper
    Joshua D. Guttman.
    Security Theorems via Model Theory
    CoRR 2009, Volume 0 (0) 2009
    Conference paper
    Marco Carbone, Joshua D. Guttman.
    Choreographies with Secure Boxes and Compromised Principals
    CoRR 2009, Volume 0 (0) 2009
    Conference paper
    Joshua D. Guttman.
    Cryptographic Protocol Composition via the Authentication Tests.
    IACR Cryptology ePrint Archive 2008, Volume 2008 (0) 2008
    Conference paper
    George Coker, Joshua D. Guttman, Peter Loscocco, Justin Sheehy, Brian T. Sniffen.
    Attestation: Evidence and Trust.
    Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Joshua D. Guttman.
    How to do Things with Cryptographic Protocols.
    Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer.
    Completeness of the Authentication Tests.
    Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer.
    Searching for Shapes in Cryptographic Protocols.
    Tools and Algorithms for the Construction and Analysis of Systems, 13th International Conference, TACAS 2007, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2007 Braga, Portugal, March 24 - April 1, 2007, Proceedi 2007 (0) 2007
    Conference paper
    Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. Guttman, John D. Ramsdell.
    Compiling cryptographic protocols for deployment on the web.
    Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007 2007 (0) 2007
    Conference paper
    Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer.
    Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions.
    Electr. Notes Theor. Comput. Sci. 2007, Volume 173 (0) 2007
    Conference paper
    Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer.
    Searching for Shapes in Cryptographic Protocols (extended version).
    IACR Cryptology ePrint Archive 2006, Volume 2006 (0) 2006
    Conference paper
    Joshua D. Guttman, Jonathan C. Herzog, John D. Ramsdell, Brian T. Sniffen.
    Programming Cryptographic Protocols.
    Trustworthy Global Computing, International Symposium, TGC 2005, Edinburgh, UK, April 7-9, 2005, Revised Selected Papers 2005 (0) 2005
    Conference paper
    Joshua D. Guttman, Amy L. Herzog.
    Rigorous automated network security management.
    Int. J. Inf. Sec. 2005, Volume 4 (0) 2005
    Conference paper
    Joshua D. Guttman, Amy L. Herzog, John D. Ramsdell, Clement W. Skorupka.
    Verifying information flow goals in Security-Enhanced Linux.
    Journal of Computer Security 2005, Volume 13 (0) 2005
    Conference paper
    Joshua D. Guttman, F. Javier Thayer, Jay A. Carlson, Jonathan C. Herzog, John D. Ramsdell, Brian T. Sniffen.
    Trust Management in Strand Spaces: A Rely-Guarantee Method.
    Programming Languages and Systems, 13th European Symposium on Programming, ESOP 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings 2004 (0) 2004
    Conference paper
    Joshua D. Guttman.
    Security, Protocols, and Trust.
    Verification, Model Checking, and Abstract Interpretation, 5th International Conference, VMCAI 2004, Venice, January 11-13, 2004, Proceedings 2004 (0) 2004
    Conference paper
    Joshua D. Guttman.
    A New Column: Information Security.
    Bulletin of the EATCS 2004, Volume 82 (0) 2004
    Conference paper
    Joshua D. Guttman.
    Authentication tests and disjoint encryption: A design method for security protocols.
    Journal of Computer Security 2004, Volume 12 (0) 2004
    Conference paper
    Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck.
    The faithfulness of abstract protocol analysis: Message authentication.
    Journal of Computer Security 2004, Volume 12 (0) 2004
    Journal article
    Li Gong, Joshua D. Guttman, Peter Y. A. Ryan, Steve A. Schneider.
    Guest editorial overview.
    IEEE Journal on Selected Areas in Communications 2003, Volume 21 (0) 2003
    Conference paper
    Joshua D. Guttman.
    Security Protocol Design via Authentication Tests.
    15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada 2002 (0) 2002
    Conference paper
    Joshua D. Guttman, F. Javier Thayer.
    Authentication tests and the structure of bundles.
    Theor. Comput. Sci. 2002, Volume 283 (0) 2002
    Conference paper
    Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck.
    The faithfulness of abstract protocol analysis: message authentication.
    ACM Conference on Computer and Communications Security 2001 (0) 2001
    Conference paper
    Andre Scedrov, Ran Canetti, Joshua D. Guttman, David Wagner, Michael Waidner.
    Relating Cryptography and Cryptographic Protocols.
    14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada 2001 (0) 2001
    Conference paper
    Joshua D. Guttman.
    Key Compromise, Strand Spaces, and the Authentication Tests.
    Electr. Notes Theor. Comput. Sci. 2001, Volume 45 (0) 2001
    Conference paper
    Joshua D. Guttman, F. Javier Thayer.
    Protocol Independence through Disjoint Encryption.
    CSFW 2000 (0) 2000
    Conference paper
    Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer.
    Authentication and Confidentiality via IPSEC.
    Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings 2000 (0) 2000
    Conference paper
    Joshua D. Guttman.
    Security Goals: Packet Trajectories and Strand Spaces.
    Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000] 2001 (0) 2000
    Conference paper
    Joshua D. Guttman, F. Javier Thayer.
    Authentication Tests.
    IEEE Symposium on Security and Privacy 2000 (0) 2000
    Conference paper
    William M. Farmer, Joshua D. Guttman.
    A Set Theory with Support for Partial Functions.
    Studia Logica 2000, Volume 66 (0) 2000
    Conference paper
    F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman.
    Mixed Strand Spaces.
    CSFW 1999 (0) 1999
    Conference paper
    F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman.
    Strand Spaces: Proving Security Protocols Correct.
    Journal of Computer Security 1999, Volume 7 (0) 1999
    Conference paper
    F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman.
    Honest Ideals on Strand Spaces.
    CSFW 1998 (0) 1998
    Conference paper
    Shimshon Berkovits, Joshua D. Guttman, Vipin Swarup.
    Authentication for Mobile Agents.
    Mobile Agents and Security 1998 (0) 1998
    Conference paper
    F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman.
    Strand Spaces: Why is a Security Protocol Correct?
    Security and Privacy - 1998 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 3-6, 1998, Proceedings 1998 (0) 1998
    Conference paper
    Joshua D. Guttman.
    Filtering Postures: Local Enforcement for Global Policies.
    1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA 1997 (0) 1997
    Conference paper
    William M. Farmer, Joshua D. Guttman, F. Javier Thayer.
    IMPS: An Updated System Description.
    Automated Deduction - CADE-13, 13th International Conference on Automated Deduction, New Brunswick, NJ, USA, July 30 - August 3, 1996, Proceedings 1996 (0) 1996
    Conference paper
    William M. Farmer, Joshua D. Guttman, Vipin Swarup.
    Security for Mobile Agents: Authentication and State Appraisal.
    Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings 1996 (0) 1996
    Conference paper
    William M. Farmer, Joshua D. Guttman, F. Javier Thayer.
    Context in Mathematical Reasoning and Computation.
    J. Symb. Comput. 1995, Volume 19 (0) 1995
    Conference paper
    Joshua D. Guttman, John D. Ramsdell, Vipin Swarup.
    The VLISP Verified Scheme System.
    Lisp and Symbolic Computation 1995, Volume 8 (0) 1995
    Conference paper
    Joshua D. Guttman, John D. Ramsdell, Mitchell Wand.
    VLISP: A Verified Implementation of Scheme.
    Lisp and Symbolic Computation 1995, Volume 8 (0) 1995
    Conference paper
    William M. Farmer, Joshua D. Guttman, Mark E. Nadel, F. Javier Thayer.
    Proof Script Pragmatics in IMPS.
    Automated Deduction - CADE-12, 12th International Conference on Automated Deduction, Nancy, France, June 26 - July 1, 1994, Proceedings 1994 (0) 1994
    Conference paper
    Joshua D. Guttman, Dale M. Johnson.
    Three Applications of Formal Methods at MITRE.
    FME '94: Industrial Benefit of Formal Methods, Second International Symposium of Formal Methods Europe, Barcelona, Spain, October 24-18, 1994, Proceedings 1994 (0) 1994
    Conference paper
    William M. Farmer, Joshua D. Guttman, F. Javier Thayer.
    Reasoning with Contexts.
    Design and Implementation of Symbolic Computation Systems, International Symposium, DISCO '93, Gmunden, Austria, September 15-17, 1993, Proceedings 1993 (0) 1993
    Conference paper
    William M. Farmer, Joshua D. Guttman, F. Javier Thayer.
    IMPS: An Interactive Mathematical Proof System.
    J. Autom. Reasoning 1993, Volume 11 (0) 1993
    Conference paper
    William M. Farmer, Joshua D. Guttman, F. Javier Thayer.
    Little Theories.
    Automated Deduction - CADE-11, 11th International Conference on Automated Deduction, Saratoga Springs, NY, USA, June 15-18, 1992, Proceedings 1992 (0) 1992
    Conference paper
    William M. Farmer, Joshua D. Guttman, F. Javier Thayer.
    IMPS: System Description.
    Automated Deduction - CADE-11, 11th International Conference on Automated Deduction, Saratoga Springs, NY, USA, June 15-18, 1992, Proceedings 1992 (0) 1992
    Conference paper
    Joshua D. Guttman.
    Panel: Use of Formal Methods in the Analysis of Cryptographic Protocols.
    CSFW 1992 (0) 1992
    Conference paper
    William M. Farmer, Joshua D. Guttman, F. Javier Thayer.
    IMPS: An Interactive Mathematical Proof System.
    10th International Conference on Automated Deduction, Kaiserslautern, FRG, July 24-27, 1990, Proceedings 1990 (0) 1990
    Conference paper
    Joshua D. Guttman, H.-P. Ko.
    Verifying a Hardware Security Architecture.
    IEEE Symposium on Security and Privacy 1990 (0) 1990
    Conference paper
    Joshua D. Guttman, Mark E. Nadel.
    What Needs Securing.
    CSFW 1988 (0) 1988
    Show item 1 to 84 of 84  

    Your query returned 84 matches in the database.