The Interrogator: Protocol Secuity Analysis
Millen, J.K., Clark, S.C., Freedman, S.B.
Published in IEEE transactions on software engineering (01.02.1987)
Published in IEEE transactions on software engineering (01.02.1987)
Get full text
Journal Article
Local reconfiguration policies
Millen, J.K.
Published in Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344) (1999)
Published in Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344) (1999)
Get full text
Conference Proceeding
Example of a formal flow violation
Millen, J.K.
Published in The IEEE Computer Society's Second International Computer Software and Applications Conference, 1978. COMPSAC '78 (1978)
Published in The IEEE Computer Society's Second International Computer Software and Applications Conference, 1978. COMPSAC '78 (1978)
Get full text
Conference Proceeding
Certificate revocation the responsible way
Millen, J.K., Wright, R.N.
Published in Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358) (1998)
Published in Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358) (1998)
Get full text
Conference Proceeding
Reasoning about trust and insurance in a public key infrastructure
Millen, J.K., Wright, R.N.
Published in Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13 (2000)
Published in Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13 (2000)
Get full text
Conference Proceeding
Optimizing protocol rewrite rules of CIL specifications
Denker, G., Millen, J.K., Grau, A., Kuster Filipe, J.
Published in Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13 (2000)
Published in Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13 (2000)
Get full text
Conference Proceeding
The cascading problem for interconnected networks
Millen, J.K., Schwartz, M.W.
Published in [Proceedings 1988] Fourth Aerospace Computer Security Applications (1988)
Published in [Proceedings 1988] Fourth Aerospace Computer Security Applications (1988)
Get full text
Conference Proceeding
A resource allocation model for denial of service
Millen, J.K.
Published in Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy (01.01.1992)
Published in Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy (01.01.1992)
Get full text
Conference Proceeding
Journal Article
Narrowing terminates for encryption
Millen, J.K., Hai-Ping Ko
Published in Proceedings 9th IEEE Computer Security Foundations Workshop (1996)
Published in Proceedings 9th IEEE Computer Security Foundations Workshop (1996)
Get full text
Conference Proceeding
Security for object-oriented database systems
Millen, J.K., Lunt, T.F.
Published in Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy (01.01.1992)
Published in Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy (01.01.1992)
Get full text
Conference Proceeding
Journal Article