Joshua D. Guttman
http://web.cs.wpi.edu/~guttman
joshua.guttman@gmail.com,  guttman@wpi.edu

Version of October 27, 2013.

Refereed Journal Publications

  1. Joshua D. Guttman. Establishing and Preserving Protocol Security Goals. Forthcoming, Journal of Computer Security, 2013. pubs/goals_xtended.pdf
  2. Ming Li, Sucheng Yu, Joshua D. Guttman, Wenjing Lou, and Kui Ren. Secure ad-hoc trust initialization and key management in wireless body area networks. ACM Transactions on Sensor Networks (TOSN). 9(2), 2013. http://doi.acm.org/10.1145/2422966.2422975.
    pubs/Li_TOSN_2012.pdf
  3. Joshua D. Guttman. State and Progress in Strand Spaces: Proving Fair Exchange. Journal of Automated Reasoning, 48(2): 159--195, 2012. http://dx.doi.org/10.1007/s10817-010-9202-1. pubs/fair_exchange.pdf
  4. George S. Coker, Joshua D. Guttman, Peter A. Loscocco, Amy Herzog, Jonathan Millen, Brian O'Hanlon, John Ramsdell, Ariel Segall, Justin Sheehy, and Brian Sniffen. Principles of Remote Attestation. International Journal for Information Security. 10(2): 63-81, 2011.
    pubs/remote_attest.pdf
  5. Joshua D. Guttman, Amy L. Herzog, John D. Ramsdell, and Clement W. Skorupka. Verifying Information-Flow Goals in Security-Enhanced Linux. Journal of Computer Security, 13(1), 2005. Winner, MITRE Best Paper Competition. pubs/selinux_jcs_published_version.pdf
  6. Joshua D. Guttman and Amy L. Herzog. Rigorous automated network security management. International Journal for Information Security, 3(3), 2005. pubs/ransm_galley_IJIS0052.pdf
  7. Joshua D. Guttman, F. Javier Thayer, and Lenore D. Zuck. The faithfulness of abstract protocol analysis: Message authentication. Journal of Computer Security, 12(6):865--891, 2004. pubs/faithfulness_abstract_encr.pdf
  8. Joshua D. Guttman. Authentication tests and disjoint encryption: a design method for security protocols. Journal of Computer Security, 12(3--4):409--433, 2004. pubs/at-design-jcs.pdf
  9. J. D. Guttman and F. J. Thayer. Authentication Tests and the Structure of Bundles. Theoretical Computer Science, June, 2002. Winner, MITRE Best Paper Competition. pubs/auth_tests_long.pdf
  10. W. M. Farmer and J. D. Guttman. A set theory with support for partial functions. Studia Logica, 66:59--78, 2000. pubs/set_theory_partial_fns.pdf
  11. F. J. Thayer, J. C. Herzog, and J. D. Guttman. Strand spaces: Proving security protocols correct. Journal of Computer Security, 7(2/3):191--230, 1999. Winner, MITRE Best Paper Competition.
    pubs/jcs_strand_spaces.pdf
  12. Joshua D. Guttman, John D. Ramsdell, and Mitchell Wand. VLISP: A verified implementation of Scheme. Lisp and Symbolic Computation, 8(1/2):5--32, 1995. pubs/vlisp_overview.ps
  13. Joshua D. Guttman, John D. Ramsdell, and Vipin Swarup. The VLISP verified Scheme system. Lisp and Symbolic Computation, 8(1/2):33--110, 1995. pubs/vlisp_scheme.ps
  14. W. M. Farmer, J. D. Guttman, and F. J. Thayer. Contexts in mathematical reasoning and computation. Journal of Symbolic Computation, 19:201--216, 1995. pubs/jsc_contexts.ps
  15. W. M. Farmer and J. D. Guttman. A simple theory of types with partial functions and subtypes. Journal of Symbolic Logic, 58:754, 1993. Abstract.
  16. W. M. Farmer, J. D. Guttman, and F. J. Thayer. imps: An Interactive Mathematical Proof System. Journal of Automated Reasoning, 11:213--248, 1993. Winner, MITRE Best Paper Competition. pubs/imps-overview.pdf

Books and Special Journal Issues Edited

  1. Pierpaolo Degano and Joshua D. Guttman, eds. Principles of Security and Trust. First International Conference, POST 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012. Tallinn, Estonia. Proceedings, Springer LNCS, 2012.
  2. Pierpaolo Degano, Sandro Etalle, and Joshua D. Guttman, eds. Formal Aspects of Security and Trust: Revised Selected Papers. 7th International Workshop, FAST 2010. Pisa, Italy. Springer LNCS, 2011.
  3. Pierpaolo Degano and Joshua D. Guttman, eds. Formal Aspects of Security and Trust: Revised Selected Papers. 6th International Workshop, FAST 2009. Eindhoven, Netherlands. Springer LNCS, 2010.
  4. Pierpaolo Degano, Joshua D. Guttman, and Fabio Martinelli, eds. Formal Aspects of Security and Trust: Revised Selected Papers. 5th International Workshop, FAST 2008. Malaga, Spain. Springer LNCS, 2009.
  5. Joshua D. Guttman, ed. Journal of Computer Security. Special issue, selected revised papers. Computer Security Foundations Workshop. 17(5). 2009.
  6. Joshua D. Guttman, ed. Journal of Computer Security. Special issue, selected revised papers. Workshop on Issues in the Theory of Security. 12(1). 2004
  7. Li Gong, Joshua D. Guttman, Peter Y. A. Ryan, Steve A. Schneider, eds. IEEE Journal on Selected Areas in Communications. Special Issue on Information Security. 21(1). 2003.

Refereed Conferences and Invited Publications

  1. Yantian Hou, Ming Li and Joshua Guttman. Chorus: Scalable In-band Trust Initialization for Multiple Constrained Devices over the Insecure Wireless Channel. ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). April 2013. pubs/WiSec13-HouMingGuttman.pdf
  2. Marco Carbone and Joshua D. Guttman. Sessions and Separability in Security Protocols. Principles of Security and Trust, an ETAPS main conference. To appear, LNCS ARCoSS series. March 2013. pubs/CG13_short.pdf, extended version at pubs/CG13_long.pdf.
  3. Chuan Lei, Elke A. Rundensteiner and Joshua D. Guttman. Robust Distributed Stream Processing. IEEE International Conference on Data Engineering. April, 2013. pubs/ICDE13_conf_full_684.pdf
  4. Daniel J. Dougherty and Joshua D. Guttman. An Algebra for Symbolic Diffie-Hellman Protocol Analysis. Trustworthy Global Computing, Newcastle, September 2012. Post-proceedings to appear in LNCS. pubs/dh_algebra.pdf
  5. Joshua D. Guttman. Security Goals and Protocol Transformations. In Theory of Security and Applications (TOSCA), an ETAPS associated event, March 2011, LNCS. pubs/goals_transformations.pdf
  6. Joshua D. Guttman. Shapes: Surveying Crypto Protocol Runs. Invited chapter in Formal Models and Techniques for Analyzing Security Protocols, ed. Véronique Cortier and Steve Kremer. IOS Press, 2011, Cryptology and Information Security Series. pubs/shapes_surveying.pdf
  7. F. Javier Thayer, Vipin Swarup, and Joshua D. Guttman. Metric Strand Spaces for Locale Authentication Protocols. IFIP Trust Management. pp. 79--94. 2010. pubs/metric_strands.pdf
  8. Marco Carbone and Joshua Guttman. Choreographies with Secure Boxes and Compromised Principals. Interaction and Concurrency Experience (ICE 09). Workshop affiliated with Concur. September 2009. Electronic Proceedings in Theoretical Computer Science, http://eptcs.org/content.cgi?ICE2009.
  9. Joshua D. Guttman. Security Theorems via Model Theory. In Express 2009: Expressiveness in Concurrency. Bologna, Sept. 2009. Electronic Proceedings in Theoretical Computer Science. http://eptcs.org/content.cgi?EXPRESS2009.
  10. Joshua D. Guttman. Fair Exchange in Strand Spaces. SecCo: 7th International Workshop on Security Issues in Concurrency. Bologna, Sept. 2009. Electronic Proceedings in Theoretical Computer Science. http://eptcs.org/content.cgi?SECCO2009.
  11. Joshua D. Guttman. Transformations between Cryptographic Protocols. In Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ETAPS, March 2009. LNCS. pubs/arpsa-wits-transformations.pdf
  12. Joshua D. Guttman. Cryptographic Protocol Composition via the Authentication Tests. In Foundations of Software Science and Computation Structures (FOSSACS, 2009), LNCS, March 2009. pubs/fossacs_disjoint.pdf
  13. George S. Coker, Joshua D. Guttman, Peter A. Loscocco, Justin Sheehy, and Brian T. Sniffen. Attestation: Evidence and Trust. In International Conference on Information and Communications Security, LNCS 5308, October 2008. Invited lecture. pubs/icics_attestation.pdf
  14. Joshua D. Guttman. How to Do Things with Cryptographic Protocols. In Asian Computer Science Conference, LNCS 4846. December 2007. Invited lecture.
  15. Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. Guttman, and John D. Ramsdell. Compiling cryptographic protocols for deployment on the web. In 16th International Conference on World Wide Web, WWW. ACM. 2007. pubs/www-compiling-web.pdf
  16. Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer. Completeness of the Authentication Tests. In European Symposium on Research in Computer Security (ESORICS), Springer Lecture Notes in Computer Science, September 2007. pubs/esorics-at-completeness.pdf
  17. Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer. Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions. In Mathematical Foundations of Program Semantics, Electronic Notes in Theoretical Computer Science, North Holland, April 2007. pubs/mfps_characterizing.pdf
  18. Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer. Skeletons and the Shapes of Bundles. In Workshop on Issues in the Theory of Security (WITS), ETAPS, Braga, Portugal, March 2007. pubs/wits_skeletons.pdf
  19. Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer. Searching for shapes in cryptographic protocols. In Tools and Algorithms for Construction and Analysis of Systems (TACAS), number 4424 in LNCS, pages 523--538. Springer, March 2007. Extended version at URL: http://eprint.iacr.org/2006/435. Published version at pubs/tacas_shapes.pdf
  20. Joshua D. Guttman, Jonathan C. Herzog, John D. Ramsdell, and Brian T. Sniffen. Programming cryptographic protocols. In Rocco De Nicola and Davide Sangiorgi, editors, Trust in Global Computing, LNCS 3705, pages 116--145. Springer, 2005. pubs/pcp_final.pdf
  21. Joshua D. Guttman, F. Javier Thayer, Jay C. Carlson, Jonathan C. Herzog, John D. Ramsdell, and Brian T. Sniffen. Trust Management in Strand Spaces. European Symposium on Programming. Springer Verlag LNCS, March 2004. pubs/trust_mgt_in_strand_spaces.pdf
  22. Joshua D. Guttman. Security protocol design via authentication tests. In Proceedings, 15th Computer Security Foundations Workshop. IEEE Computer Society Press, June 2002. pubs/at_design.pdf
  23. Joshua D. Guttman, F. Javier Thayer, and Lenore D. Zuck. The Faithfulness of Abstract Protocol Analysis: Message Authentication. Proceedings, Eighth ACM Conference on Computer and Communications Security. November 2001. pubs/ccs_faithful.pdf
  24. Joshua D. Guttman. Key compromise and the authentication tests. Electronic Notes in Theoretical Computer Science, 47, 2001. Editor, M. Mislove. Invited lecture, Mathematical Foundations of Programming Semantics. pubs/compromise.pdf
  25. Joshua D. Guttman. Security goals: Packet trajectories and strand spaces, in: R. Gorrieri and R. Focardi, editors, Foundations of Security Analysis and Design, LNCS 2171, Springer Verlag, 2001. pubs/fosad.pdf
  26. Joshua D. Guttman, Amy L. Herzog and F. Javier Thayer. Authentication and Confidentiality via IPsec. In ESORICS 2000: European Symposium on Research in Computer Security. Springer Verlag, LNCS 1895, October 2000. pubs/esorics-ipsec.pdf
  27. Joshua D. Guttman and F. Javier Thayer. Authentication tests. In Proceedings, 2000 IEEE Symposium on Security and Privacy. May 2000. pubs/auth_tests.pdf
  28. Joshua D. Guttman and F. Javier Thayer. Protocol Independence via Disjoint Encryption. In Proceedings of the 13th IEEE Computer Security Foundations Workshop. July 2000. pubs/disjoint.pdf
  29. F. Javier Thayer, Jonathan C. Herzog, and Joshua D. Guttman. Mixed strand spaces. In Proceedings of the 12th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, June 1999. pubs/mixed_protocols.pdf
  30. F. Javier Thayer, Jonathan C. Herzog, and Joshua D. Guttman. Strand Spaces: Why is a Security Protocol Correct? In Proceedings, 1998 IEEE Symposium on Security and Privacy. May 1998. pubs/strands_oakland.pdf
  31. F. Javier Thayer, Jonathan C. Herzog, and Joshua D. Guttman. Honest ideals on strand spaces. In Proceedings of the 11th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, June 1998. pubs/honest.pdf
  32. Joshua D. Guttman. Filtering Postures: Local enforcement for global security policies. In Proceedings, 1997 IEEE Symposium on Security and Privacy. May 1997. pubs/npt-oakland.pdf
  33. Shimshon Berkovits, Joshua D. Guttman, and Vipin Swarup. Authentication for Mobile Agents. In Mobile Agents and Security, G. Vigna (Ed.). Springer, LNCS 1419. 1998. pubs/sema-lncs98.pdf
  34. William M. Farmer, Joshua D. Guttman, and Vipin Swarup. Security for mobile agents: authentication and state appraisal. In ESORICS '96. Springer Verlag Lecture Notes in Computer Science, September 1996. pubs/sema-esorics96.pdf
  35. William M. Farmer, Joshua D. Guttman, and Vipin Swarup. Security for mobile agents: Issues and Requirements. In 19th National Information Systems Security Conference. National Institute of Standards and Technology. 1996. pubs/sema-nissc96.pdf
  36. William M. Farmer, Joshua D. Guttman, Mark E. Nadel, and F. Javier Thayer. Proof Script Pragmatics in IMPS. In Automated Deduction: CADE-12. LNCS 814. 1994. pubs/cade_pragmatics.pdf
  37. Joshua D. Guttman and Dale M. Johnson. Three Applications of Formal Methods at MITRE. In Symposium of Formal Methods Europe, FME. LNCS 873. 1994.
  38. William M. Farmer, Joshua D. Guttman, and F. Javier Thayer. Reasoning with Contexts. In Design and Implementation of Symbolic Computation Systems, International Symposium, DISCO '93. LNCS 722. 1993.
  39. William M. Farmer, Joshua D. Guttman, and F. Javier Thayer. Little theories. In Automated Deduction: CADE-11, LNCS 607. 1992. pubs/cade_little-theories.pdf
  40. William M. Farmer, Joshua D. Guttman, and F. Javier Thayer. IMPS: An Interactive Mathematical Proof System. System Description. In Conference on Automated Deduction (CADE). LNCS 449. 1990. (Updated in CADE 1992 and 1996.)
  41. Joshua D. Guttman and H.-P. Ko. Verifying a Hardware Security Architecture. In Proceedings, 1990 IEEE Symposium on Security and Privacy. May 1990.
  42. Joshua D. Guttman and Mark E. Nadel. What Needs Securing. in Computer Security Foundations Workshop, I. 1988.
  43. Joshua D. Guttman. Information Flow and Invariance. In Proceedings, 1987 IEEE Symposium on Security and Privacy. May 1987.

This document was translated from LATEX by HEVEA.