Collaborative planning with confidentiality M Kanovich, P Rowe, A Scedrov Journal of Automated Reasoning 46 (3), 389-421, 2011 | 28 | 2011 |
Flexible mechanisms for remote attestation SC Helble, ID Kretz, PA Loscocco, JD Ramsdell, PD Rowe, P Alexander ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-23, 2021 | 21 | 2021 |
A hybrid analysis for security protocols with state JD Ramsdell, DJ Dougherty, JD Guttman, PD Rowe International Conference on Integrated Formal Methods, 272-287, 2014 | 20 | 2014 |
Policy compliance in collaborative systems M Kanovich, P Rowe, A Scedrov 2009 22nd IEEE Computer Security Foundations Symposium, 218-233, 2009 | 19 | 2009 |
Measuring protocol strength with security goals PD Rowe, JD Guttman, MD Liskov International Journal of Information Security 15 (6), 575-596, 2016 | 18 | 2016 |
A cut principle for information flow JD Guttman, PD Rowe 2015 IEEE 28th Computer Security Foundations Symposium, 107-121, 2015 | 18 | 2015 |
Analysis of EAP-GPSK authentication protocol JC Mitchell, A Roy, P Rowe, A Scedrov Applied Cryptography and Network Security: 6th International Conference …, 2008 | 18 | 2008 |
Orchestrating layered attestations JD Ramsdell, PD Rowe, P Alexander, SC Helble, P Loscocco, ... Principles of Security and Trust: 8th International Conference, POST 2019 …, 2019 | 14 | 2019 |
Bundling evidence for layered attestation PD Rowe Trust and Trustworthy Computing: 9th International Conference, TRUST 2016 …, 2016 | 14 | 2016 |
The CPSA Specification: A Reduction System for Searching for Shapes in Cryptographic Protocols JD Ramsdell, JD Guttman, MD Liskov, PD Rowe The MITRE Corporation, 2009 | 14 | 2009 |
Confining adversary actions via measurement PD Rowe International Workshop on Graphical Models for Security, 150-166, 2016 | 13 | 2016 |
Completeness of CPSA MD Liskov, PD Rowe, FJ Thayer Technical Report MTR110479, The MITRE Corporation, 2011 | 13 | 2011 |
Collaborative planning with privacy M Kanovich, P Rowe, A Scedrov 20th IEEE Computer Security Foundations Symposium (CSF'07), 265-278, 2007 | 11 | 2007 |
Limitations on observability of effects in cyber-physical systems SK Damodaran, PD Rowe Proceedings of the 6th Annual Symposium on Hot Topics in the Science of …, 2019 | 10 | 2019 |
The cryptographic protocol shapes analyzer: A manual MD Liskov, JD Ramsdell, JD Guttman, PD Rowe The MITRE Corporation, 2016 | 9 | 2016 |
Policy compliance, confidentiality and complexity in collaborative systems PD Rowe University of Pennsylvania, 2009 | 8 | 2009 |
Automated Trust Analysis of Copland Specifications for Layered Attestations✱ PD Rowe, JD Ramsdell, ID Kretz Proceedings of the 23rd International Symposium on Principles and Practice …, 2021 | 6 | 2021 |
Resilience of critical infrastructure systems to hybrid threats with information disruption H Thorisson, F Baiardi, DG Angeler, K Taveter, A Vasheasta, PD Rowe, ... Resilience and Hybrid Threats, 13-26, 2019 | 6 | 2019 |
Enrich-by-need protocol analysis for Diffie-Hellman MD Liskov, JD Guttman, JD Ramsdell, PD Rowe, FJ Thayer Foundations of Security, Protocols, and Equational Reasoning: Essays …, 2019 | 6 | 2019 |
Security goals and evolving standards JD Guttman, MD Liskov, PD Rowe International Conference on Research in Security Standardisation, 93-110, 2014 | 6 | 2014 |