Completeness of Discovery Protocols

Completeness of Discovery Protocols
Alwyn Goodloe and Carl A. Gunter
Assurable and Usable Security Configuration (SafeConfig ’09), Chicago, IL, November 2009.

Last updated on Thursday, June 26, 2014, 1:00 pm

Strong and Weak Policy Relations

Strong and Weak Policy Relations
Michael J. May, Insup Lee, Carl A. Gunter and Steve Zdancewic
IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY ’09), London, UK, July 2009.

Last updated on Monday, July 25, 2011, 4:19 pm

Adaptive Selective Verification

Adaptive Selective Verification
Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan and Carl A. Gunter
IEEE Conference on Computer Communications (INFOCOM ’08), Phoenix, AZ, April 2008. [PPT][BIB]

Last updated on Thursday, June 26, 2014, 12:55 pm

Emergency Alerts as RSS Feeds with Interdomain Authorization

Emergency Alerts as RSS Feeds with Interdomain Authorization
Filippo Gioachin, Ravinder Shankesi, Michael J. May, Carl A. Gunter and Wook Shin
IARIA International Conference on Internet Monitoring and Protection (ICIMP ’07), Santa Clara, CA, July 2007. [PPT][BIB]

Last updated on Thursday, June 26, 2014, 12:57 pm

Securing the Drop-Box Architecture for Assisted Living

Securing the Drop-Box Architecture for Assisted Living
Michael J. May, Wook Shin, Carl A. Gunter and Insup Lee
ACM Formal Methods in Security Engineering (FMSE ’06), Alexandria, VA, November 2006. [BIB]

Last updated on Thursday, June 26, 2014, 12:50 pm

Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies

Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
Michael J. May, Carl A. Gunter and Insup Lee
IEEE Computer Security Foundations Workshop (CSFW  ’06), Venice, Italy, July 2006. [PPT][BIB][CITES]

Last updated on Monday, July 25, 2011, 4:28 pm

L3A: A Protocol for Layer Three Accounting

L3A: A Protocol for Layer Three Accounting
Alwyn Goodloe, Carl A. Gunter, Matthew Jacobs and Gaurav Shah
IEEE Workshop on Secure Network Protocols (NPsec ’05), Boston, MA, November 2005. [PPT][BIB]

Last updated on Monday, July 25, 2011, 4:28 pm

Mitigating DoS Attack Through Selective Bin Verification

Mitigating DoS Attack Through Selective Bin Verification
Micah Sherr, Michael Greenwald, Carl A. Gunter, Sanjeev Khanna and Santosh Venkatesh
IEEE Workshop on Secure Network Protocols (NPsec ’05), Boston, MA, November 2005. [PPT][BIB]

Last updated on Monday, July 25, 2011, 4:28 pm

WSEmail: Secure Internet Messaging Based on Web Services

WSEmail: Secure Internet Messaging Based on Web Services
Kevin D. Lux, Michael J. May, Nayan L. Bhattad and Carl A. Gunter
IEEE International Conference on Web Services (ICWS ’05), Orlando, FL, July 2005. [PPT][BIB]

Last updated on Thursday, June 26, 2014, 12:50 pm

Formal Prototyping in Early Stages of Protocol Design

Formal Prototyping in Early Stages of Protocol Design
Alwyn Goodloe, Carl A. Gunter and Mark-Oliver Stehr
IFIP/ACM Workshop on Issues in the Theory of Security (WITS ’05), Long Beach, CA, January 2005. [PPT][BIB]

Last updated on Thursday, June 26, 2014, 12:49 pm