Richard A. Kemmerer Home Page Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2010
90Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPaul Z. Kolano, Carlo A. Furia, Richard A. Kemmerer, Dino Mandrioli: Refinement and Verification of Real-Time Systems CoRR abs/1002.1796: (2010)
2009
89Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBrett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: Your botnet is my botnet: analysis of a botnet takeover. ACM Conference on Computer and Communications Security 2009: 635-647
88Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: How to Steal a Botnet and What Can Happen When You Do. ICICS 2009: 1
87Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGeorg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov: Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008. Computer Science - R&D 23(1): 15-25 (2009)
2008
86no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGeorg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel: Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008
85Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna: Are your votes really counted?: testing the security of real-world electronic voting systems. ISSTA 2008: 237-248
84Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGeorg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel: 08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008
83Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGeorg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov: 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008
82Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage: 08102 Outcome Working Group -- Situational Awareness. Network Attack Detection and Defense 2008
2007
81Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: So You Think You Can Dance? ACSAC 2007: 3-17
80Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDarren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer: Exploiting Execution Context for the Detection of Anomalous System Calls. RAID 2007: 1-20
79Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAndré Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer: Using a virtual security testbed for digital forensic reconstruction. Journal in Computer Virology 2(4): 275-289 (2007)
2006
78Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAndré Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer: Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. DIMVA 2006: 144-163
77Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGreg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna: SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. ISC 2006: 343-358
76Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilliam K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. NDSS 2006
75Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAndré Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Using Hidden Markov Models to Evaluate the Risks of Intrusions. RAID 2006: 145-164
2005
74Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Designing and implementing a family of intrusion detection systems. ASE 2005: 3
2004
73Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGiovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer: An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. ACSAC 2004: 16-27
72Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. Dependable Sec. Comput. 1(3): 146-169 (2004)
71Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer: Past pushdown timed automata and safety verification. Theor. Comput. Sci. 313(1): 57-71 (2004)
2003
70Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGiovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer: A Stateful Intrusion Detection System for World-Wide Web Servers. ACSAC 2003: 34-45
69Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDarren Mutz, Giovanni Vigna, Richard A. Kemmerer: An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. ACSAC 2003: 374-383
68Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGiovanni Vigna, Fredrik Valeur, Richard A. Kemmerer: Designing and implementing a family of intrusion detection systems. ESEC / SIGSOFT FSE 2003: 88-97
67Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Cybersecurity. ICSE 2003: 705-717
66Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer, Giovanni Vigna: Internet Security and Intrusion Detection. ICSE 2003: 748-749
65Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhe Dang, Pierluigi San Pietro, Richard A. Kemmerer: Presburger liveness verification of discrete timed automata. Theor. Comput. Sci. 1-3(299): 413-438 (2003)
64Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhe Dang, Oscar H. Ibarra, Richard A. Kemmerer: Generalized discrete timed automata: decidable approximations for safety verificatio. Theor. Comput. Sci. 296(1): 59-74 (2003)
2002
63Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. ACSAC 2002: 109-118
62Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGiovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer: Composable Tools For Network Discovery and Security Analysis. ACSAC 2002: 14-24
61Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChristopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Stateful Intrusion Detection for High-Speed Networks. IEEE Symposium on Security and Privacy 2002: 285-
60no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSteve T. Eckmann, Giovanni Vigna, Richard A. Kemmerer: STATL: An Attack Language for State-Based Intrusion Detection. Journal of Computer Security 10(1/2): 71-104 (2002)
59no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLOscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer: Counter Machines and Verification Problems. Theor. Comput. Sci. 289(1): 165-189 (2002)
2001
58Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer: Past Pushdown Timed Automata. CIAA 2001: 74-86
57Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhe Dang, Oscar H. Ibarra, Richard A. Kemmerer: Decidable Approximations on Generalized and Parameterized Discrete Timed Automata. COCOON 2001: 529-539
56Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSebastian Fischmeister, Giovanni Vigna, Richard A. Kemmerer: Evaluating the Security of Three Java-Based Mobile Agent Systems. Mobile Agents 2001: 31-41
55Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGiovanni Vigna, Richard A. Kemmerer, Per Blix: Designing a Web of Highly-Configurable Intrusion Detection Sensors. Recent Advances in Intrusion Detection 2001: 69-84
54Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhe Dang, Pierluigi San Pietro, Richard A. Kemmerer: On Presburger Liveness of Discrete Timed Automata. STACS 2001: 132-143
2000
53Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAndré L. M. dos Santos, Richard A. Kemmerer: Implementing Security Policies using the Safe Areas of Computation Approach. ACSAC 2000: 90-99
52no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhe Dang, Oscar H. Ibarra, Tevfik Bultan, Richard A. Kemmerer, Jianwen Su: Binary Reachability Analysis of Discrete Pushdown Timed Automata. CAV 2000: 69-84
51Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPaul Z. Kolano, Richard A. Kemmerer, Dino Mandrioli: Parallel Refinement Mechanisms for Real-Time Systems. FASE 2000: 35-50
50Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhe Dang, Richard A. Kemmerer: Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems. ICSE 2000: 345-354
49Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPaul Z. Kolano, Richard A. Kemmerer: Classification schemes to aid in the analysis of real-time systems. ISSTA 2000: 86-95
48Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLOscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer: Conter Machines: Decidable Properties and Applications to Verification Problems. MFCS 2000: 426-435
47Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Editorial. IEEE Trans. Software Eng. 26(2): 97 (2000)
1999
46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAndré L. M. dos Santos, Richard A. Kemmerer: Safe Areas of Computation for Secure Computing with Insecure Applications. ACSAC 1999: 35-44
45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhe Dang, Richard A. Kemmerer: Using the ASTRAL Model Checker to Analyze Mobile IP. ICSE 1999: 132-142
44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhe Dang, Richard A. Kemmerer: A Symbolic Model Checker for Testing ASTRAL Real-Time Specifications. RTCSA 1999: 174-181
43no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPaul Z. Kolano, Zhe Dang, Richard A. Kemmerer: The Design and Analysis of Real-Time Systems Using the ASTRAL Software Development Environment. Ann. Software Eng. 7: 177-210 (1999)
42Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Editor's Note. IEEE Trans. Software Eng. 25(4): 433-434 (1999)
41Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Editorial. IEEE Trans. Software Eng. 25(6): 745-746 (1999)
40no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGiovanni Vigna, Richard A. Kemmerer: NetSTAT: A Network-based Intrusion Detection System. Journal of Computer Security 7(1): (1999)
1998
39Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGiovanni Vigna, Richard A. Kemmerer: NetSTAT: A Network-Based Intrusion Detection Approach. ACSAC 1998: 25-
38Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard G. Hamlet, Richard A. Kemmerer, Edward F. Miller, Debra J. Richardson: The Most Influential Papers from the ISSTA Research Community (Panel). ISSTA 1998: 49
37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFlavio De Paoli, André L. M. dos Santos, Richard A. Kemmerer: Web Browsers and Security. Mobile Agents and Security 1998: 235-256
1997
36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Security Issues in Distributed Software. ESEC / SIGSOFT FSE 1997: 52-59
35no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Formally Specifying and Verifying Real-Time Systems. ICFEM 1997: 112-
34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAlberto Coen-Porisini, Carlo Ghezzi, Richard A. Kemmerer: Specification of Realtime Systems Using ASTRAL. IEEE Trans. Software Eng. 23(9): 572-598 (1997)
1996
33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer, Tad Taylor: A Modular Covert Channel Analysis Methodology for Trusted DG/UX/sup TM/. ACSAC 1996: 224-235
32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard Denney, Richard A. Kemmerer, Nancy G. Leveson, Alberto Savoia: Why State-of-the-Art is not State-of-the-Practice (Panel Abstract). ISSTA 1996: 293
1995
31no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAlberto Coen-Porisini, Richard A. Kemmerer, Dino Mandrioli: A Formal Framework for ASTRAL Inter-level Proof Obligations. ESEC 1995: 90-108
30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKoral Ilgun, Richard A. Kemmerer, Phillip A. Porras: State Transition Analysis: A Rule-Based Intrusion Detection Approach. IEEE Trans. Software Eng. 21(3): 181-199 (1995)
1994
29Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJeffrey Douglas, Richard A. Kemmerer: Aslantest: A Symbolic Execution Tool for Testing Aslan Formal Specifications. ISSTA 1994: 15-27
28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAlberto Coen-Porisini, Richard A. Kemmerer, Dino Mandrioli: A Formal Framework for ASTRAL Intralevel Proof Obligations. IEEE Trans. Software Eng. 20(8): 548-561 (1994)
27no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer, Catherine Meadows, Jonathan K. Millen: Three System for Cryptographic Protocol Analysis. J. Cryptology 7(2): 79-130 (1994)
1993
26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAlberto Coen-Porisini, Richard A. Kemmerer: The Composability of ASTRAL Realtime Specifications. ISSTA 1993: 128-138
1992
25no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJonathan D. Reichbach, Richard A. Kemmerer: SoundWorks: An Object-Oriented Distributed System for Digital Sound. IEEE Computer 25(3): 25-37 (1992)
24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer, Carlo Ghezzi: Guest Editors' Introduction: Specification and Analysis of Real-Time Systems. IEEE Trans. Software Eng. 18(9): 766-767 (1992)
1991
23no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCarlo Ghezzi, Richard A. Kemmerer: ASTRAL: An Assertion Language for Specifying Realtime Systems. ESEC 1991: 122-146
22no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPhillip A. Porras, Richard A. Kemmerer: Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels. IEEE Symposium on Security and Privacy 1991: 36-51
21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer, Phillip A. Porras: Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. IEEE Trans. Software Eng. 17(11): 1166-1185 (1991)
1990
20no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: A Multilevel Formal Specification of a Mental Health Care Database. DBSec 1990: 27-52
19no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Integrating Formal Methods into the Development Process. IEEE Software 7(5): 37-50 (1990)
1989
18no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Formal Specification of a Mental Health Delivery System. DBSec 1989: 341-351
17no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Completely Validated Software. ICSE 1989: 359-360
1987
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. CRYPTO 1987: 289-305
15no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Formal Specification and Verification Techniques for Secure Database Systems. DBSec 1987: 229-240
14no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Using Formal Verification Techniques to Analyze Encryption Protocols. IEEE Symposium on Security and Privacy 1987: 134-139
13no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJ. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young: An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Trans. Software Eng. 13(2): 157-168 (1987)
1986
12no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Analyzing Encryption Protocols Using Formal Verification Techniques. EUROCRYPT 1986: 48
11no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJ. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young: An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Symposium on Security and Privacy 1986: 14-24
10no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBrent Auernheimer, Richard A. Kemmerer: RT-ASLAN: A Specification Language for Real-Time Systems. IEEE Trans. Software Eng. 12(9): 879-889 (1986)
1985
9no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Testing Formal Specifications to Detect Design Errors. IEEE Trans. Software Eng. 11(1): 32-43 (1985)
8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJ. David Blaine, Richard A. Kemmerer: Complexity measures for assembly language programs. Journal of Systems and Software 5(3): 229-245 (1985)
7no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer, Steven T. Eckman: UNISEX: A UNIX-based Symbolic EXecutor for Pascal. Softw., Pract. Exper. 15(5): 439-458 (1985)
1983
6no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLThomas H. Hinke, Jose Althouse, Richard A. Kemmerer: SDC Secure Release Terminal Project. IEEE Symposium on Security and Privacy 1983: 113-119
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels ACM Trans. Comput. Syst. 1(3): 256-277 (1983)
1982
4no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer: A Practical Approach to Identifying Storage and Timing Channels. IEEE Symposium on Security and Privacy 1982: 66-73
1980
3no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBruce J. Walker, Richard A. Kemmerer, Gerald J. Popek: Specification and Verification of the UCLA Unix Security Kernel. Commun. ACM 23(2): 118-131 (1980)
2no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel M. Berry, Richard A. Kemmerer, Arndt von Staa, Shaula Yemini: Toward Modular Verifiable Exception Handling. Comput. Lang. 5(2): 77-101 (1980)
1979
1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBruce J. Walker, Richard A. Kemmerer, Gerald J. Popek: Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract). SOSP 1979: 64-65

Coauthor Index

1Kevin C. Almeroth [77]
2Jose Althouse [6]
3André Årnes [75] [78] [79]
4Brent Auernheimer [10]
5Davide Balzarotti [85]
6Greg Banks [77] [85]
7Elizabeth M. Belding-Royer (Elizabeth M. Belding) [73]
8Daniel M. Berry [2]
9J. David Blaine [8]
10Per Blix [55]
11Tevfik Bultan [48] [52] [58] [59] [71]
12Roland Büschkes [82]
13Georg Carle [83] [84] [86] [87]
14Lorenzo Cavallaro [89]
15Alberto Coen-Porisini [26] [28] [31] [34]
16Marco Cova [77] [85] [89]
17Zhe Dang [43] [44] [45] [48] [50] [52] [54] [57] [58] [59] [64] [65] [71]
18Hervé Debar [82]
19Richard Denney [32]
20Jeffrey Douglas [29]
21Falko Dressler [83] [84] [86] [87]
22Steven T. Eckman [7]
23Steve T. Eckmann [60]
24Viktoria Felmetsger [77] [85]
25Ali Fessi [82]
26Sebastian Fischmeister [56]
27Carlo A. Furia [90]
28Carlo Ghezzi [23] [24] [34]
29Bob Gilbert [89]
30Sumit Gwalani [73]
31Dirk Haage [82]
32Paul Haas [78] [79]
33J. Thomas Haigh [11] [13]
34Richard G. Hamlet [38]
35Peter Herrmann [82]
36Thomas H. Hinke [6]
37Ralph Holz [82]
38Oscar H. Ibarra [48] [52] [57] [58] [59] [64] [71]
39Koral Ilgun [30]
40Marko Jahnke [82]
41Vishal Kher [70]
42Paul Z. Kolano [43] [49] [51] [90]
43Hartmut König [82] [83] [84] [86] [87]
44Christopher Krügel (Christopher Kruegel) [61] [72] [76] [83] [84] [86] [87] [89]
45Pavel Laskov [83] [87]
46Nancy G. Leveson [32]
47Dino Mandrioli [28] [31] [51] [90]
48John McHugh [11] [13]
49Catherine Meadows [27]
50Jonathan K. Millen [27]
51Edward F. Miller [38]
52Darren Mutz [69] [80]
53Flavio De Paoli [37]
54Pierluigi San Pietro [54] [65]
55Gerald J. Popek [1] [3]
56Phillip A. Porras [21] [22] [30]
57Jonathan D. Reichbach [25]
58Debra J. Richardson [38]
59William K. Robertson [70] [76] [80] [85]
60André L. M. dos Santos [37] [46] [53]
61Alberto Savoia [32]
62Kavitha Srinivasan [73]
63Arndt von Staa [2]
64Brett Stone-Gross [89]
65Jianwen Su [48] [52] [59]
66Martin Szydlowski [89]
67Tad Taylor [33]
68Fredrik Valeur [61] [62] [68] [72] [75] [85]
69Giovanni Vigna [39] [40] [55] [56] [60] [61] [62] [66] [68] [69] [70] [72] [73] [75] [76] [77] [78] [79] [80] [85] [89]
70Bruce J. Walker [1] [3]
71Stephen D. Wolthusen [82]
72Shaula Yemini [2]
73William D. Young [11] [13]
74Jingyu Zhou [62]
75Tanja Zseby [82]

Colors in the list of coauthors

Copyright © Sun Mar 14 22:39:24 2010 by Michael Ley (ley@uni-trier.de)