Joshua D. Guttman and Moses D. Liskov and Paul D. Rowe.
Measuring Protocol Strength with Security Goals. Forthcoming,
International Journal of Information Security. DOI
10.1007/s10207-016-0319-z, February 2016. Springer Link to
view-anywhere version: https://rdcu.be/5sw0. Author’s
preliminary version:
pubs/ijis_measuring-security.pdf
Joshua D. Guttman. Establishing and Preserving Protocol
Security Goals. Journal of Computer Security, 22(2),
pp. 203–267, 2014. pubs/goals_xtended.pdf
Ming Li, Sucheng Yu, Joshua D. Guttman, Wenjing Lou, and Kui
Ren. Secure ad-hoc trust initialization and key management in
wireless body area networks. ACM Transactions on Sensor
Networks (TOSN). 9(2), 2013.
http://doi.acm.org/10.1145/2422966.2422975. pubs/Li_TOSN_2012.pdf
George S. Coker, Joshua D. Guttman, Peter A. Loscocco, Amy
Herzog, Jonathan Millen, Brian O’Hanlon, John Ramsdell, Ariel
Segall, Justin Sheehy, and Brian Sniffen. Principles of Remote
Attestation. International Journal for Information Security.
10(2): 63-81, 2011. pubs/remote_attest.pdf
Joshua D. Guttman, Amy L. Herzog, John D. Ramsdell, and
Clement W. Skorupka. Verifying Information-Flow Goals in
Security-Enhanced Linux. Journal of Computer
Security, 13(1), 2005. Winner, MITRE Best Paper
Competition.
pubs/selinux_jcs_published_version.pdf
Joshua D. Guttman and Amy L. Herzog. Rigorous
automated network security management. International
Journal for Information Security, 3(3), 2005.
pubs/ransm_galley_IJIS0052.pdf
Joshua D. Guttman, F. Javier Thayer, and Lenore D. Zuck.
The faithfulness of abstract protocol analysis: Message
authentication. Journal of Computer Security,
12(6):865–891, 2004.
pubs/faithfulness_abstract_encr.pdf
Joshua D. Guttman. Authentication tests and
disjoint encryption: a design method for security protocols.
Journal of Computer Security, 12(3–4):409–433,
2004.
pubs/at-design-jcs.pdf
J. D. Guttman and F. J. Thayer. Authentication
Tests and the Structure of Bundles. Theoretical
Computer Science, June, 2002. Winner, MITRE Best Paper
Competition.
pubs/auth_tests_long.pdf
W. M. Farmer and J. D. Guttman. A set theory with
support for partial functions. Studia Logica,
66:59–78, 2000.
pubs/set_theory_partial_fns.pdf
F. J. Thayer, J. C. Herzog, and J. D. Guttman. Strand spaces: Proving security protocols correct. Journal of Computer Security, 7(2/3):191–230, 1999. Winner,
MITRE Best Paper Competition. pubs/jcs_strand_spaces.pdf
Joshua D. Guttman, John D. Ramsdell, and Mitchell Wand.
VLISP: A verified implementation of Scheme. Lisp and Symbolic Computation, 8(1/2):5–32,
1995.
pubs/vlisp_overview.ps
Joshua D. Guttman, John D. Ramsdell, and Vipin Swarup.
The VLISP verified Scheme system. Lisp
and Symbolic Computation, 8(1/2):33–110, 1995.
pubs/vlisp_scheme.ps
W. M. Farmer, J. D. Guttman, and F. J. Thayer. Contexts in mathematical reasoning and computation. Journal of Symbolic Computation, 19:201–216, 1995.
pubs/jsc_contexts.ps
W. M. Farmer and J. D. Guttman. A simple theory of
types with partial functions and subtypes. Journal of
Symbolic Logic, 58:754, 1993. Abstract.
W. M. Farmer, J. D. Guttman, and F. J. Thayer. imps: An Interactive Mathematical Proof System.
Journal of Automated Reasoning, 11:213–248, 1993.
Winner, MITRE Best Paper Competition.
pubs/imps-overview.pdf
Books and Special Journal Issues Edited
Pierpaolo Degano and Joshua D. Guttman. Principles of
Security and Trust: Special issue. Journal of Computer
Security. 21(6), 2013.
Pierpaolo Degano and Joshua D. Guttman, eds. Principles
of Security and Trust. First International Conference, POST
2012, held as part of the European Joint Conferences on Theory and
Practice of Software, ETAPS 2012. Tallinn, Estonia. Proceedings,
Springer LNCS, 2012.
Pierpaolo Degano, Sandro Etalle, and Joshua D. Guttman, eds.
Formal Aspects of Security and Trust: Revised Selected
Papers. 7th International Workshop, FAST 2010. Pisa, Italy.
Springer LNCS, 2011.
Pierpaolo Degano and Joshua D. Guttman, eds. Formal
Aspects of Security and Trust: Revised Selected Papers. 6th
International Workshop, FAST 2009. Eindhoven, Netherlands.
Springer LNCS, 2010.
Pierpaolo Degano, Joshua D. Guttman, and Fabio Martinelli, eds.
Formal Aspects of Security and Trust: Revised Selected
Papers. 5th International Workshop, FAST 2008. Malaga, Spain.
Springer LNCS, 2009.
Joshua D. Guttman, ed. Journal of Computer Security.
Special issue, selected revised papers. Computer Security
Foundations Workshop. 17(5). 2009.
Joshua D. Guttman, ed. Journal of Computer Security.
Special issue, selected revised papers. Workshop on Issues in the
Theory of Security. 12(1). 2004
Li Gong, Joshua D. Guttman, Peter Y. A. Ryan, Steve
A. Schneider, eds. IEEE Journal on Selected Areas in
Communications. Special Issue on Information Security. 21(1).
2003.
Joshua D. Guttman and Mitchell Wand, eds. VLISP: A
Verified Implementation of Scheme. (Special double issue of
Lisp and Symbolic Computation, 8(1–2).) Kluwer Academic
Publishers. 1995.
Refereed Conferences and Invited
Publications
Scott L. Dyer, Christian
A. Femrite, Joshua D. Guttman, Julian P. Lanson, Moses
D. Liskov.
Cryptographically Assured Information Flow: Assured Remote
Execution. IEEE Symp. Computer Security
Foundations.. 2025.
pubs/article_arex.pdf
Daniel J. Dougherty and Joshua D. Guttman and John
D. Ramsdell. Security Protocol Analysis in Context: Computing
Minimal Executions Using SMT and CPSA. Integrated
Formal Methods. Springer Lecture Notes in Computer Science.
Sep. 2018.
Joshua D. Guttman. Information Flow, Distributed Systems, and
Refinement, by Example. Concurrency, Security, and Puzzles.
Springer Lecture Notes in Computer Science. Jan. 2017.
Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe.
Cross-Tool Semantics for Protocol Security Goals. Security
Standardisation Research. Gaithersburg, MD.
Springer Lecture Notes in Computer Science. Dec. 2016.
pubs/cross_tool_ssr16.pdf
Stephen Chong, Joshua Guttman, Anupam Datta, Andrew Myers,
Benjamin Pierce, Patrick Schaumont, Tim Sherwood, Nickolai
Zeldovich. Report on the NSF Workshop on Formal Methods for
Security. arXiv:1608.00678
Pedro Adão, Riccardo Focardi, Joshua D. Guttman, and
Flaminia L. Luccio. Localizing Firewall Security Policies.
pubs/localizer_csf16.pdfIEEE Symposium on Computer Security Foundations. June 2016.
Megumi Ando, Joshua D. Guttman, Alberto R. Papaleo, and John
Scire. Hash-based TPM Signatures for the Quantum World.
Intl. Conf. Applied Cryptography and Network Security.
Springer LNCS. June 2016.
pubs/qTPM_acns2016.pdf
Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell and Paul
D. Rowe. Formal Support for Standardizing Protocols with State.
Security Standardisation Research. Springer LNCS 9497.
December 2015. arxiv.org/abs/1509.07552
Joshua D Guttman and Paul D Rowe. A Cut Principle for
Information Flow. IEEE Symposium on Computer Security
Foundations. July 2015.
pubs/csf-ccut.pdf
Joshua D. Guttman. Limited Disclosure and Locality in
Graphs. Programming Languages with Applications to Biology
and Security - Essays Dedicated to Pierpaolo Degano on the
Occasion of His 65th Birthday. Springer LNCS 9465, pp. 44–46.
November, 2015.
Megumi Ando and Joshua D Guttman. Composable Bounds on
Information Flow from Distribution Differences. Data
Privacy Management, and Security Assurance, DPM 2015 and QASA
2015. Springer LNCS 9481, pp. 13–29. September, 2015.
Joshua D Guttman and Moses D Liskov and Paul D Rowe.
Security Goals and Evolving Standards. Security
Standardisation Research. Springer LNCS 8893. December, 2014.
pubs/ssr_evolving-standards.pdf
John D. Ramsdell and Daniel J. Dougherty and Joshua D. Guttman
and Paul D. Rowe. A Hybrid Analysis for Security Protocols with
State. Integrated Formal Methods. LNCS 8739. September
2014.
pubs/iFM_stateful_protocols.pdf
Daniel J. Dougherty and Joshua D. Guttman. Decidability for
Lightweight Diffie-Hellman Protocols. IEEE Symposium on
Computer Security Foundations. July 2014.
pubs/decidable_dh.pdf
Yantian Hou, Ming Li and Joshua Guttman. Chorus: Scalable
In-band Trust Initialization for Multiple Constrained Devices over
the Insecure Wireless Channel. ACM Conference on Security and
Privacy in Wireless and Mobile Networks (WiSec). April 2013.
pubs/WiSec13-HouMingGuttman.pdf
Marco Carbone and Joshua D. Guttman. Sessions and
Separability in Security Protocols. Principles of Security
and Trust, an ETAPS main conference. To appear, LNCS
ARCoSS series. March 2013.
pubs/CG13_short.pdf,
extended version at
pubs/CG13_long.pdf.
Chuan Lei, Elke A. Rundensteiner and Joshua D. Guttman.
Robust Distributed Stream Processing. IEEE International
Conference on Data Engineering. April, 2013. pubs/ICDE13_conf_full_684.pdf
Daniel J. Dougherty and Joshua D. Guttman. An Algebra for
Symbolic Diffie-Hellman Protocol Analysis. Trustworthy Global
Computing, Newcastle, September 2012. Post-proceedings to appear
in LNCS.
pubs/dh_algebra.pdf
Joshua D. Guttman. Security Goals and Protocol
Transformations. In Theory of Security and Applications
(TOSCA), an ETAPS associated event, March 2011, LNCS.
pubs/goals_transformations.pdf
Joshua D. Guttman. Shapes: Surveying Crypto Protocol Runs.
Invited chapter in Formal Models and Techniques for Analyzing
Security Protocols, ed. Véronique Cortier and Steve Kremer.
IOS Press, 2011, Cryptology and Information Security Series.
pubs/shapes_surveying.pdf
F. Javier Thayer, Vipin Swarup, and Joshua D. Guttman. Metric
Strand Spaces for Locale Authentication Protocols. IFIP Trust
Management. pp. 79–94. 2010.
pubs/metric_strands.pdf
Marco Carbone and Joshua Guttman. Choreographies with Secure
Boxes and Compromised Principals. Interaction and Concurrency
Experience (ICE 09). Workshop affiliated with Concur. September
2009. Electronic Proceedings in Theoretical Computer Science,
http://eptcs.org/content.cgi?ICE2009.
Joshua D. Guttman. Security Theorems via Model Theory. In
Express 2009: Expressiveness in Concurrency. Bologna,
Sept. 2009. Electronic Proceedings in Theoretical Computer Science.
http://eptcs.org/content.cgi?EXPRESS2009.
Joshua D. Guttman. Fair Exchange in Strand Spaces.
SecCo: 7th International Workshop on Security Issues in
Concurrency. Bologna, Sept. 2009. Electronic Proceedings in
Theoretical Computer Science.
http://eptcs.org/content.cgi?SECCO2009.
Joshua D. Guttman. Transformations between Cryptographic
Protocols. In Joint Workshop on Automated Reasoning for
Security Protocol Analysis and Issues in the Theory of Security,
ETAPS, March 2009. LNCS.
pubs/arpsa-wits-transformations.pdf
Joshua D. Guttman. Cryptographic Protocol Composition via the
Authentication Tests. In Foundations of Software Science and
Computation Structures (FOSSACS, 2009), LNCS, March 2009.
pubs/fossacs_disjoint.pdf
George S. Coker, Joshua D. Guttman, Peter A. Loscocco, Justin
Sheehy, and Brian T. Sniffen. Attestation: Evidence and
Trust. In International Conference on Information
and Communications Security, LNCS 5308, October 2008. Invited
lecture.
pubs/icics_attestation.pdf
Joshua D. Guttman. How to Do Things with
Cryptographic Protocols. In Asian Computer Science
Conference, LNCS 4846. December 2007. Invited lecture.
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. Guttman, and
John D. Ramsdell. Compiling cryptographic protocols for
deployment on the web. In 16th International Conference on
World Wide Web, WWW. ACM. 2007.
pubs/www-compiling-web.pdf
Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer.
Completeness of the Authentication Tests. In
European Symposium on Research in Computer Security (ESORICS),
Springer Lecture Notes in Computer Science, September 2007.
pubs/esorics-at-completeness.pdf
Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer.
Skeletons, Homomorphisms, and Shapes: Characterizing
Protocol Executions. In Mathematical Foundations of
Program Semantics, Electronic Notes in Theoretical Computer
Science, North Holland, April 2007.
pubs/mfps_characterizing.pdf
Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier
Thayer. Skeletons and the Shapes of Bundles. In Workshop on Issues in the Theory of Security (WITS), ETAPS,
Braga, Portugal, March 2007.
pubs/wits_skeletons.pdf
Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer.
Searching for shapes in cryptographic protocols.
In Tools and Algorithms for Construction and Analysis
of Systems (TACAS), number 4424 in LNCS, pages
523–538. Springer, March 2007. Extended version at
URL: http://eprint.iacr.org/2006/435. Published version at
pubs/tacas_shapes.pdf
Joshua D. Guttman, Jonathan C. Herzog, John D. Ramsdell, and
Brian T. Sniffen. Programming cryptographic protocols.
In Rocco De Nicola and Davide Sangiorgi, editors, Trust in Global Computing, LNCS 3705, pages
116–145. Springer, 2005.
pubs/pcp_final.pdf
Joshua D. Guttman, F. Javier Thayer, Jay C. Carlson, Jonathan
C. Herzog, John D. Ramsdell, and Brian T. Sniffen. Trust
Management in Strand Spaces. European Symposium on
Programming. Springer Verlag LNCS, March 2004.
pubs/trust_mgt_in_strand_spaces.pdf
Joshua D. Guttman. Security protocol design via
authentication tests. In Proceedings, 15th Computer
Security Foundations Workshop. IEEE Computer Society Press,
June 2002.
pubs/at_design.pdf
Joshua D. Guttman, F. Javier Thayer, and Lenore D. Zuck.
The Faithfulness of Abstract Protocol Analysis: Message
Authentication. Proceedings, Eighth ACM Conference
on Computer and Communications Security. November 2001.
pubs/ccs_faithful.pdf
Joshua D. Guttman. Key compromise and the
authentication tests. Electronic Notes in
Theoretical Computer Science, 47, 2001. Editor,
M. Mislove. Invited lecture, Mathematical
Foundations of Programming Semantics.
pubs/compromise.pdf
Joshua D. Guttman. Security goals: Packet
trajectories and strand spaces, in: R. Gorrieri and R. Focardi,
editors, Foundations of Security Analysis and Design, LNCS
2171, Springer Verlag, 2001.
pubs/fosad.pdf
Joshua D. Guttman, Amy L. Herzog and F. Javier Thayer.
Authentication and Confidentiality via IPsec.
In ESORICS 2000: European Symposium on Research in
Computer Security. Springer Verlag, LNCS 1895, October 2000.
pubs/esorics-ipsec.pdf
Joshua D. Guttman and F. Javier Thayer. Authentication tests. In Proceedings, 2000 IEEE
Symposium on Security and Privacy. May 2000.
pubs/auth_tests.pdf
Joshua D. Guttman and F. Javier Thayer. Protocol Independence via Disjoint Encryption. In Proceedings of the 13th IEEE Computer Security Foundations
Workshop. July 2000.
pubs/disjoint.pdf
F. Javier Thayer, Jonathan C. Herzog, and Joshua D.
Guttman. Mixed strand spaces. In Proceedings of the 12th IEEE Computer Security Foundations
Workshop. IEEE Computer Society Press, June 1999.
pubs/mixed_protocols.pdf
F. Javier Thayer, Jonathan C. Herzog, and
Joshua D. Guttman. Strand Spaces: Why is a Security
Protocol Correct? In Proceedings, 1998 IEEE
Symposium on Security and Privacy. May 1998.
pubs/strands_oakland.pdf
F. Javier Thayer, Jonathan C. Herzog, and Joshua D.
Guttman. Honest ideals on strand spaces. In
Proceedings of the 11th IEEE Computer Security Foundations
Workshop. IEEE Computer Society Press, June 1998.
pubs/honest.pdf
Joshua D. Guttman. Filtering Postures: Local
enforcement for global security policies. In Proceedings, 1997 IEEE Symposium on Security and Privacy. May
1997.
pubs/npt-oakland.pdf
Shimshon Berkovits, Joshua D. Guttman, and Vipin Swarup.
Authentication for Mobile Agents. In Mobile Agents and
Security, G. Vigna (Ed.). Springer, LNCS 1419. 1998.
pubs/sema-lncs98.pdf
William M. Farmer, Joshua D. Guttman, and Vipin Swarup.
Security for mobile agents: authentication and state
appraisal. In ESORICS ’96. Springer Verlag Lecture
Notes in Computer Science, September 1996.
pubs/sema-esorics96.pdf
William M. Farmer, Joshua D. Guttman, and Vipin Swarup.
Security for mobile agents: Issues and Requirements.
In 19th National Information Systems Security
Conference. National Institute of Standards and Technology.
1996.
pubs/sema-nissc96.pdf
William M. Farmer, Joshua D. Guttman, Mark E. Nadel, and
F. Javier Thayer. Proof Script Pragmatics in IMPS. In Automated Deduction: CADE-12. LNCS 814. 1994.
pubs/cade_pragmatics.pdf
Joshua D. Guttman and Dale M. Johnson. Three Applications of
Formal Methods at MITRE. In Symposium of Formal Methods
Europe, FME. LNCS 873. 1994.
William M. Farmer, Joshua D. Guttman, and F. Javier Thayer.
Reasoning with Contexts. In Design and Implementation of Symbolic
Computation Systems, International Symposium, DISCO ’93. LNCS
722. 1993.
William M. Farmer, Joshua D. Guttman, and F. Javier Thayer.
Little theories. In Automated Deduction:
CADE-11, LNCS 607. 1992.
pubs/cade_little-theories.pdf
William M. Farmer, Joshua D. Guttman, and F. Javier Thayer.
IMPS: An Interactive Mathematical Proof System. System Description.
In Conference on Automated Deduction (CADE). LNCS 449.
1990. (Updated in CADE 1992 and 1996.)
Joshua D. Guttman. A Proposed Interface Logic for
Verification Environments. The MITRE Corporation, MITRE Product
number M91-19. March 1991.
pubs/interface_logic.pdf
Joshua D. Guttman and H.-P. Ko. Verifying a
Hardware Security Architecture. In Proceedings, 1990 IEEE Symposium on Security and Privacy. May
1990.
Joshua D. Guttman and Mark E. Nadel. What Needs
Securing. in Computer Security Foundations Workshop,
I. 1988.
Joshua D. Guttman. Information Flow and Invariance.
In Proceedings, 1987 IEEE Symposium on Security and
Privacy. May 1987.