default search action
Joshua D. Guttman
Person information
- affiliation: The MITRE Corporation, Bedford, MA, USA
- affiliation: Worcester Polytechnic Institute, MA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i12]Scott L. Dyer, Christian A. Femrite, Joshua D. Guttman, Julian P. Lanson, Moses D. Liskov:
Cryptographically Assured Information Flow: Assured Remote Execution. CoRR abs/2402.02630 (2024) - 2023
- [i11]Daniel J. Dougherty, Joshua D. Guttman:
Molly: A Verified Compiler for Cryptoprotocol Roles. CoRR abs/2311.13692 (2023) - 2020
- [c63]Paul D. Rowe, Joshua D. Guttman, John D. Ramsdell:
Assumption-Based Analysis of Distance-Bounding Protocols with cpsa. Logic, Language, and Security 2020: 146-166 - [c62]Joshua D. Guttman, Sebastian Mödersheim:
HotSpot: Hot Issues in Security Principles and Trust 2020. EuroS&P Workshops 2020: 260 - [e7]Vivek Nigam, Tajana Ban Kirigin, Carolyn L. Talcott, Joshua D. Guttman, Stepan L. Kuznetsov, Boon Thau Loo, Mitsuhiro Okada:
Logic, Language, and Security - Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday. Lecture Notes in Computer Science 12300, Springer 2020, ISBN 978-3-030-62076-9 [contents]
2010 – 2019
- 2019
- [c61]Moses D. Liskov, Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe, F. Javier Thayer:
Enrich-by-Need Protocol Analysis for Diffie-Hellman. Foundations of Security, Protocols, and Equational Reasoning 2019: 135-155 - [c60]Joshua D. Guttman, John D. Ramsdell:
Understanding Attestation: Analyzing Protocols that Use Quotes. STM 2019: 89-106 - [e6]Joshua D. Guttman, Carl E. Landwehr, José Meseguer, Dusko Pavlovic:
Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows. Lecture Notes in Computer Science 11565, Springer 2019, ISBN 978-3-030-19051-4 [contents] - 2018
- [c59]Daniel J. Dougherty, Joshua D. Guttman, John D. Ramsdell:
Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA. IFM 2018: 130-150 - [i10]Moses D. Liskov, Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe, F. Javier Thayer:
Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version). CoRR abs/1804.05713 (2018) - [i9]Daniel J. Dougherty, Joshua D. Guttman, John D. Ramsdell:
Homomorphisms and Minimality for Enrich-by-Need Security Analysis. CoRR abs/1804.07158 (2018) - 2017
- [c58]Joshua D. Guttman:
Information Flow, Distributed Systems, and Refinement, by Example. Concurrency, Security, and Puzzles 2017: 88-103 - 2016
- [j20]Paul D. Rowe, Joshua D. Guttman, Moses D. Liskov:
Measuring protocol strength with security goals. Int. J. Inf. Sec. 15(6): 575-596 (2016) - [c57]Megumi Ando, Joshua D. Guttman, Alberto R. Papaleo, John Scire:
Hash-Based TPM Signatures for the Quantum World. ACNS 2016: 77-94 - [c56]Pedro Adão, Riccardo Focardi, Joshua D. Guttman, Flaminia L. Luccio:
Localizing Firewall Security Policies. CSF 2016: 194-209 - [c55]Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe:
Cross-Tool Semantics for Protocol Security Goals. SSR 2016: 32-61 - [i8]Stephen Chong, Joshua D. Guttman, Anupam Datta, Andrew C. Myers, Benjamin C. Pierce, Patrick Schaumont, Tim Sherwood, Nickolai Zeldovich:
Report on the NSF Workshop on Formal Methods for Security. CoRR abs/1608.00678 (2016) - 2015
- [c54]Joshua D. Guttman:
Limited Disclosure and Locality in Graphs. Programming Languages with Applications to Biology and Security 2015: 44-46 - [c53]Joshua D. Guttman, Paul D. Rowe:
A Cut Principle for Information Flow. CSF 2015: 107-121 - [c52]Megumi Ando, Joshua D. Guttman:
Composable Bounds on Information Flow from Distribution Differences. DPM/QASA@ESORICS 2015: 13-29 - [c51]Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe:
Formal Support for Standardizing Protocols with State. SSR 2015: 246-265 - [i7]Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe:
Formal Support for Standardizing Protocols with State. CoRR abs/1509.07552 (2015) - 2014
- [j19]Joshua D. Guttman:
Establishing and preserving protocol security goals. J. Comput. Secur. 22(2): 203-267 (2014) - [c50]Daniel J. Dougherty, Joshua D. Guttman:
Decidability for Lightweight Diffie-Hellman Protocols. CSF 2014: 217-231 - [c49]John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman, Paul D. Rowe:
A Hybrid Analysis for Security Protocols with State. IFM 2014: 272-287 - [c48]Joshua D. Guttman, Moses D. Liskov, Paul D. Rowe:
Security Goals and Evolving Standards. SSR 2014: 93-110 - [i6]John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman, Paul D. Rowe:
A Hybrid Analysis for Security Protocols with State. CoRR abs/1404.3899 (2014) - [i5]Joshua D. Guttman, Paul D. Rowe:
A Cut Principle for Information Flow. CoRR abs/1410.4617 (2014) - 2013
- [j18]Pierpaolo Degano, Joshua D. Guttman:
Preface. J. Comput. Secur. 21(6): 779-780 (2013) - [j17]Ming Li, Shucheng Yu, Joshua D. Guttman, Wenjing Lou, Kui Ren:
Secure ad hoc trust initialization and key management in wireless body area networks. ACM Trans. Sens. Networks 9(2): 18:1-18:35 (2013) - [c47]Chuan Lei, Elke A. Rundensteiner, Joshua D. Guttman:
Robust distributed stream processing. ICDE 2013: 817-828 - [c46]Marco Carbone, Joshua D. Guttman:
Sessions and Separability in Security Protocols. POST 2013: 267-286 - [c45]Yantian Hou, Ming Li, Joshua D. Guttman:
Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel. WISEC 2013: 167-178 - 2012
- [j16]Joshua D. Guttman:
State and Progress in Strand Spaces: Proving Fair Exchange. J. Autom. Reason. 48(2): 159-195 (2012) - [c44]Joshua D. Guttman:
Trust Engineering via Security Protocols. STAST 2012: 1-2 - [c43]Daniel J. Dougherty, Joshua D. Guttman:
An Algebra for Symbolic Diffie-Hellman Protocol Analysis. TGC 2012: 164-181 - [e5]Pierpaolo Degano, Joshua D. Guttman:
Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings. Lecture Notes in Computer Science 7215, Springer 2012, ISBN 978-3-642-28640-7 [contents] - [i4]Daniel J. Dougherty, Joshua D. Guttman:
Symbolic Protocol Analysis for Diffie-Hellman. CoRR abs/1202.2168 (2012) - [i3]John D. Ramsdell, Joshua D. Guttman, Jonathan K. Millen, Brian O'Hanlon:
An Analysis of the CAVES Attestation Protocol using CPSA. CoRR abs/1207.0418 (2012) - 2011
- [j15]George Coker, Joshua D. Guttman, Peter A. Loscocco, Amy L. Herzog, Jonathan K. Millen, Brian O'Hanlon, John D. Ramsdell, Ariel Segall, Justin Sheehy, Brian T. Sniffen:
Principles of remote attestation. Int. J. Inf. Sec. 10(2): 63-81 (2011) - [c42]Joshua D. Guttman:
Security Goals and Protocol Transformations. TOSCA 2011: 130-147 - [p1]Joshua D. Guttman:
Shapes: Surveying Crypto Protocol Runs. Formal Models and Techniques for Analyzing Security Protocols 2011: 222-257 - [e4]Pierpaolo Degano, Sandro Etalle, Joshua D. Guttman:
Formal Aspects of Security and Trust - 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6561, Springer 2011, ISBN 978-3-642-19750-5 [contents] - [e3]Aslan Askarov, Joshua D. Guttman:
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, PLAS 2011, San Jose, CA, USA, 5 June, 2011. ACM 2011, ISBN 978-1-4503-0830-4 [contents] - 2010
- [c41]F. Javier Thayer, Vipin Swarup, Joshua D. Guttman:
Metric Strand Spaces for Locale Authentication Protocols. IFIPTM 2010: 79-94 - [e2]Pierpaolo Degano, Joshua D. Guttman:
Formal Aspects in Security and Trust, 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5983, Springer 2010, ISBN 978-3-642-12458-7 [contents]
2000 – 2009
- 2009
- [j14]Joshua D. Guttman:
Introduction. J. Comput. Secur. 17(5): 515 (2009) - [c40]Joshua D. Guttman:
Cryptographic Protocol Composition via the Authentication Tests. FoSSaCS 2009: 303-317 - [c39]Joshua D. Guttman:
Transformations between Cryptographic Protocols. ARSPA-WITS 2009: 107-123 - [c38]Marco Carbone, Joshua D. Guttman:
Choreographies with Secure Boxes and Compromised Principals. ICE 2009: 1-15 - [c37]Marco Carbone, Joshua D. Guttman:
Execution Models for Choreographies and Cryptoprotocols. PLACES 2009: 31-41 - [c36]Joshua D. Guttman:
Fair Exchange in Strand Spaces. SECCO 2009: 46-60 - [c35]Joshua D. Guttman:
Security Theorems via Model Theory. EXPRESS 2009: 51-65 - [e1]Pierpaolo Degano, Joshua D. Guttman, Fabio Martinelli:
Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5491, Springer 2009 [contents] - 2008
- [c34]George Coker, Joshua D. Guttman, Peter A. Loscocco, Justin Sheehy, Brian T. Sniffen:
Attestation: Evidence and Trust. ICICS 2008: 1-18 - [i2]Joshua D. Guttman:
Cryptographic Protocol Composition via the Authentication Tests. IACR Cryptol. ePrint Arch. 2008: 430 (2008) - 2007
- [c33]Joshua D. Guttman:
How to do Things with Cryptographic Protocols. ASIAN 2007: 142-149 - [c32]Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer:
Completeness of the Authentication Tests. ESORICS 2007: 106-121 - [c31]Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer:
Searching for Shapes in Cryptographic Protocols. TACAS 2007: 523-537 - [c30]Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. Guttman, John D. Ramsdell:
Compiling cryptographic protocols for deployment on the web. WWW 2007: 687-696 - [c29]Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer:
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions. MFPS 2007: 85-102 - 2006
- [i1]Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer:
Searching for Shapes in Cryptographic Protocols (extended version). IACR Cryptol. ePrint Arch. 2006: 435 (2006) - 2005
- [j13]Joshua D. Guttman, Amy L. Herzog:
Rigorous automated network security management. Int. J. Inf. Sec. 4(1-2): 29-48 (2005) - [j12]Joshua D. Guttman, Amy L. Herzog, John D. Ramsdell, Clement W. Skorupka:
Verifying information flow goals in Security-Enhanced Linux. J. Comput. Secur. 13(1): 115-134 (2005) - [c28]Joshua D. Guttman, Jonathan C. Herzog, John D. Ramsdell, Brian T. Sniffen:
Programming Cryptographic Protocols. TGC 2005: 116-145 - 2004
- [j11]Joshua D. Guttman:
A New Column: Information Security. Bull. EATCS 82: 242-252 (2004) - [j10]Joshua D. Guttman:
Authentication tests and disjoint encryption: A design method for security protocols. J. Comput. Secur. 12(3-4): 409-433 (2004) - [j9]Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck:
The faithfulness of abstract protocol analysis: Message authentication. J. Comput. Secur. 12(6): 865-891 (2004) - [c27]Joshua D. Guttman, F. Javier Thayer, Jay A. Carlson, Jonathan C. Herzog, John D. Ramsdell, Brian T. Sniffen:
Trust Management in Strand Spaces: A Rely-Guarantee Method. ESOP 2004: 325-339 - [c26]Joshua D. Guttman:
Security, Protocols, and Trust. VMCAI 2004: 1 - 2003
- [j8]Li Gong, Joshua D. Guttman, Peter Y. A. Ryan, Steve A. Schneider:
Guest editorial overview. IEEE J. Sel. Areas Commun. 21(1): 1-4 (2003) - 2002
- [j7]Joshua D. Guttman, F. Javier Thayer:
Authentication tests and the structure of bundles. Theor. Comput. Sci. 283(2): 333-380 (2002) - [c25]Joshua D. Guttman:
Security Protocol Design via Authentication Tests. CSFW 2002: 92-103 - 2001
- [c24]Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck:
The faithfulness of abstract protocol analysis: message authentication. CCS 2001: 186-195 - [c23]Andre Scedrov, Ran Canetti, Joshua D. Guttman, David A. Wagner, Michael Waidner:
Relating Cryptography and Cryptographic Protocols. CSFW 2001: 111-114 - [c22]Joshua D. Guttman:
Key Compromise, Strand Spaces, and the Authentication Tests. MFPS 2001: 141-161 - 2000
- [j6]William M. Farmer, Joshua D. Guttman:
A Set Theory with Support for Partial Functions. Stud Logica 66(1): 59-78 (2000) - [c21]Joshua D. Guttman, F. Javier Thayer:
Protocol Independence through Disjoint Encryption. CSFW 2000: 24-34 - [c20]Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer:
Authentication and Confidentiality via IPSEC. ESORICS 2000: 255-272 - [c19]Joshua D. Guttman:
Security Goals: Packet Trajectories and Strand Spaces. FOSAD 2000: 197-261 - [c18]Joshua D. Guttman, F. Javier Thayer:
Authentication Tests. S&P 2000: 96-109
1990 – 1999
- 1999
- [j5]F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman:
Strand Spaces: Proving Security Protocols Correct. J. Comput. Secur. 7(1): 191-230 (1999) - [c17]F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman:
Mixed Strand Spaces. CSFW 1999: 72-82 - 1998
- [c16]F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman:
Honest Ideals on Strand Spaces. CSFW 1998: 66-77 - [c15]Shimshon Berkovits, Joshua D. Guttman, Vipin Swarup:
Authentication for Mobile Agents. Mobile Agents and Security 1998: 114-136 - [c14]F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman:
Strand Spaces: Why is a Security Protocol Correct? S&P 1998: 160-171 - 1997
- [c13]Joshua D. Guttman:
Filtering Postures: Local Enforcement for Global Policies. S&P 1997: 120-129 - 1996
- [c12]William M. Farmer, Joshua D. Guttman, F. Javier Thayer:
IMPS: An Updated System Description. CADE 1996: 298-302 - [c11]William M. Farmer, Joshua D. Guttman, Vipin Swarup:
Security for Mobile Agents: Authentication and State Appraisal. ESORICS 1996: 118-130 - 1995
- [j4]William M. Farmer, Joshua D. Guttman, F. Javier Thayer:
Context in Mathematical Reasoning and Computation. J. Symb. Comput. 19(1-3): 210-206 (1995) - [j3]Joshua D. Guttman, John D. Ramsdell, Mitchell Wand:
VLISP: A Verified Implementation of Scheme. LISP Symb. Comput. 8(1-2): 5-32 (1995) - [j2]Joshua D. Guttman, John D. Ramsdell, Vipin Swarup:
The VLISP Verified Scheme System. LISP Symb. Comput. 8(1-2): 33-110 (1995) - 1994
- [c10]William M. Farmer, Joshua D. Guttman, Mark E. Nadel, F. Javier Thayer:
Proof Script Pragmatics in IMPS. CADE 1994: 356-370 - [c9]Joshua D. Guttman, Dale M. Johnson:
Three Applications of Formal Methods at MITRE. FME 1994: 55-65 - 1993
- [j1]William M. Farmer, Joshua D. Guttman, F. Javier Thayer:
IMPS: An Interactive Mathematical Proof System. J. Autom. Reason. 11(2): 213-248 (1993) - [c8]William M. Farmer, Joshua D. Guttman, F. Javier Thayer:
Reasoning with Contexts. DISCO 1993: 216-228 - 1992
- [c7]William M. Farmer, Joshua D. Guttman, F. Javier Thayer:
Little Theories. CADE 1992: 567-581 - [c6]William M. Farmer, Joshua D. Guttman, F. Javier Thayer:
IMPS: System Description. CADE 1992: 701-705 - [c5]Joshua D. Guttman:
Panel: Use of Formal Methods in the Analysis of Cryptographic Protocols. CSFW 1992: 112 - 1990
- [c4]William M. Farmer, Joshua D. Guttman, F. Javier Thayer:
IMPS: An Interactive Mathematical Proof System. CADE 1990: 653-654 - [c3]Joshua D. Guttman, H.-P. Ko:
Verifying a Hardware Security Architecture. S&P 1990: 333-344
1980 – 1989
- 1988
- [c2]Joshua D. Guttman, Mark E. Nadel:
What Needs Securing. CSFW 1988: 34-57 - 1987
- [c1]Joshua D. Guttman:
Information Flow and Invariance. S&P 1987: 67-73
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint