Paul D. Rowe
Paul D. Rowe
Dirección de correo verificada de mitre.org - Página principal
Título
Citado por
Citado por
Año
Collaborative planning with confidentiality
M Kanovich, P Rowe, A Scedrov
Journal of Automated Reasoning 46 (3-4), 389-421, 2011
222011
Policy compliance in collaborative systems
M Kanovich, P Rowe, A Scedrov
2009 22nd IEEE Computer Security Foundations Symposium, 218-233, 2009
192009
A hybrid analysis for security protocols with state
JD Ramsdell, DJ Dougherty, JD Guttman, PD Rowe
International Conference on Integrated Formal Methods, 272-287, 2014
152014
Analysis of EAP-GPSK authentication protocol
JC Mitchell, A Roy, P Rowe, A Scedrov
International Conference on Applied Cryptography and Network Security, 309-327, 2008
152008
Measuring protocol strength with security goals
PD Rowe, JD Guttman, MD Liskov
International Journal of Information Security 15 (6), 575-596, 2016
122016
A cut principle for information flow
JD Guttman, PD Rowe
2015 IEEE 28th Computer Security Foundations Symposium, 107-121, 2015
122015
Completeness of CPSA
MD Liskov, PD Rowe, FJ Thayer
MITRE CORP BEDFORD MA CENTER FOR INTEGRATED INTELLIGENCE SYSTEMS, 2011
112011
The CPSA Specification: A Reduction System for Searching for Shapes in Cryptographic Protocols
JD Ramsdell, JD Guttman, MD Liskov, PD Rowe
The MITRE Corporation, 2009
102009
Collaborative planning with privacy
M Kanovich, P Rowe, A Scedrov
20th IEEE Computer Security Foundations Symposium (CSF'07), 265-278, 2007
102007
Policy compliance, confidentiality and complexity in collaborative systems
P Rowe
University of Pennsylvania, Philadelphia, PA, 2009
72009
Bundling evidence for layered attestation
PD Rowe
International Conference on Trust and Trustworthy Computing, 119-139, 2016
52016
Security goals and evolving standards
JD Guttman, MD Liskov, PD Rowe
International Conference on Research in Security Standardisation, 93-110, 2014
42014
Confining adversary actions via measurement
PD Rowe
International Workshop on Graphical Models for Security, 150-166, 2016
32016
The Cryptographic Protocol Shapes Analyzer: A Manual
MD Liskov, JD Ramsdell, JD Guttman, PD Rowe
The MITRE Corporation, CPSA Version 3, 2016
32016
Enrich-by-need protocol analysis for Diffie-Hellman
MD Liskov, JD Guttman, JD Ramsdell, PD Rowe, FJ Thayer
Foundations of Security, Protocols, and Equational Reasoning, 135-155, 2019
22019
Formal support for standardizing protocols with state
JD Guttman, MD Liskov, JD Ramsdell, PD Rowe
International Conference on Research in Security Standardisation, 246-265, 2015
22015
Mission-focused cyber situational understanding via graph analytics
S Noel, PD Rowe, S Purdy, M Limiero, T Lu, W Mathews
2018 10th International Conference on Cyber Conflict (CyCon), 427-448, 2018
12018
Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version)
MD Liskov, JD Guttman, JD Ramsdell, PD Rowe, FJ Thayer
arXiv preprint arXiv:1804.05713, 2018
12018
Cross-Tool Semantics for Protocol Security Goals
JD Guttman, JD Ramsdell, PD Rowe
International Conference on Research in Security Standardisation, 32-61, 2016
12016
Decision-theoretic approach to designing cyber resilient systems
V Mehta, PD Rowe, G Lewis, A Magalhaes, M Kochenderfer
2016 IEEE 15th International Symposium on Network Computing and Applications …, 2016
12016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20