Follow
Paul D. Rowe
Title
Cited by
Cited by
Year
Collaborative planning with confidentiality
M Kanovich, P Rowe, A Scedrov
Journal of Automated Reasoning 46 (3), 389-421, 2011
282011
Flexible mechanisms for remote attestation
SC Helble, ID Kretz, PA Loscocco, JD Ramsdell, PD Rowe, P Alexander
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-23, 2021
212021
A hybrid analysis for security protocols with state
JD Ramsdell, DJ Dougherty, JD Guttman, PD Rowe
International Conference on Integrated Formal Methods, 272-287, 2014
202014
Policy compliance in collaborative systems
M Kanovich, P Rowe, A Scedrov
2009 22nd IEEE Computer Security Foundations Symposium, 218-233, 2009
192009
A cut principle for information flow
JD Guttman, PD Rowe
2015 IEEE 28th Computer Security Foundations Symposium, 107-121, 2015
182015
Analysis of EAP-GPSK authentication protocol
JC Mitchell, A Roy, P Rowe, A Scedrov
Applied Cryptography and Network Security: 6th International Conference …, 2008
182008
Measuring protocol strength with security goals
PD Rowe, JD Guttman, MD Liskov
International Journal of Information Security 15 (6), 575-596, 2016
172016
Orchestrating layered attestations
JD Ramsdell, PD Rowe, P Alexander, SC Helble, P Loscocco, ...
Principles of Security and Trust: 8th International Conference, POST 2019 …, 2019
142019
Bundling evidence for layered attestation
PD Rowe
Trust and Trustworthy Computing: 9th International Conference, TRUST 2016 …, 2016
142016
The CPSA Specification: A Reduction System for Searching for Shapes in Cryptographic Protocols
JD Ramsdell, JD Guttman, MD Liskov, PD Rowe
The MITRE Corporation, 2009
142009
Confining adversary actions via measurement
PD Rowe
International Workshop on Graphical Models for Security, 150-166, 2016
132016
Completeness of CPSA
MD Liskov, PD Rowe, FJ Thayer
Technical Report MTR110479, The MITRE Corporation, 2011
112011
Collaborative planning with privacy
M Kanovich, P Rowe, A Scedrov
20th IEEE Computer Security Foundations Symposium (CSF'07), 265-278, 2007
112007
Limitations on observability of effects in cyber-physical systems
SK Damodaran, PD Rowe
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of …, 2019
102019
Policy compliance, confidentiality and complexity in collaborative systems
PD Rowe
University of Pennsylvania, 2009
82009
The cryptographic protocol shapes analyzer: A manual
MD Liskov, JD Ramsdell, JD Guttman, PD Rowe
The MITRE Corporation, 2016
72016
Automated Trust Analysis of Copland Specifications for Layered Attestations✱
PD Rowe, JD Ramsdell, ID Kretz
Proceedings of the 23rd International Symposium on Principles and Practice …, 2021
62021
Resilience of critical infrastructure systems to hybrid threats with information disruption
H Thorisson, F Baiardi, DG Angeler, K Taveter, A Vasheasta, PD Rowe, ...
Resilience and Hybrid Threats, 13-26, 2019
62019
Enrich-by-need protocol analysis for Diffie-Hellman
MD Liskov, JD Guttman, JD Ramsdell, PD Rowe, FJ Thayer
Foundations of Security, Protocols, and Equational Reasoning: Essays …, 2019
62019
Security goals and evolving standards
JD Guttman, MD Liskov, PD Rowe
International Conference on Research in Security Standardisation, 93-110, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20