Completeness of Discovery Protocols

Completeness of Discovery Protocols
Alwyn Goodloe and Carl A. Gunter
Assurable and Usable Security Configuration (SafeConfig ’09), Chicago, IL, November 2009.

Last updated on Thursday, June 26, 2014, 1:00 pm

A Foundation for Tunnel-Complex Protocols

A Foundation for Tunnel-Complex Protocols
Alwyn E. Goodloe
Doctoral Thesis, University of Pennsylvania, March 2008. [BIB]

Last updated on Thursday, June 26, 2014, 12:59 pm

Reasoning about Concurrency for Security Tunnels

Reasoning about Concurrency for Security Tunnels
Alwyn E. Goodloe and Carl A. Gunter
IEEE Computer Security Foundations (CSF ’07), Venice, Italy, July 2007. [PPT][BBT]

Last updated on Thursday, June 26, 2014, 12:58 pm

L3A: A Protocol for Layer Three Accounting

L3A: A Protocol for Layer Three Accounting
Alwyn Goodloe, Carl A. Gunter, Matthew Jacobs and Gaurav Shah
IEEE Workshop on Secure Network Protocols (NPsec ’05), Boston, MA, November 2005. [PPT][BIB]

Last updated on Monday, July 25, 2011, 4:28 pm

Formal Prototyping in Early Stages of Protocol Design

Formal Prototyping in Early Stages of Protocol Design
Alwyn Goodloe, Carl A. Gunter and Mark-Oliver Stehr
IFIP/ACM Workshop on Issues in the Theory of Security (WITS ’05), Long Beach, CA, January 2005. [PPT][BIB]

Last updated on Thursday, June 26, 2014, 12:49 pm

Design and Analysis of Sectrace: A Protocol to Set up Security Associations and Policies in IPSec Networks

Design and Analysis of Sectrace: A Protocol to Set up Security Associations and Policies in IPSec Networks,
Alwyn Goodloe, Michael McDougall, Carl A. Gunter, and Mark-Oliver Stehr.
Technical Report, September, 2004.

Last updated on Monday, July 25, 2011, 4:30 pm