Active Trust Management for Autonomous Adaptive Survivable Systems. In Self-Adaptive Software, Springer-Verlag Lecture-Notes in Computer Science #1936, February 2001, Robertson, Laddaga, Shrobe, eds
Howard Shrobe, Jon Doyle, Peter Szolovits

Agile Monitoring for Cyber Defense. In Proceedings of the Second DARPA Information Survivability Conference and Exposition (DISCEX-II), June 12-14, 2001, Anaheim, California
Jon Doyle, William Long, Howard Shrobe, Isaac Kohane, Peter Szolovits

Improving Application Security with Data Flow Assertions
Alexander Yip, Xi Wang, Nickolai Zeldovich, Frans Kaashoek

An Ideal-Security Protocol for Order-Preserving Encoding
Raluca Ada Popa, Frank H. Li, Nickolai Zeldovich

Proxy-Based Security Protocols in Networked Mobile Devices
Matthew Burnside, Dwaine Clarke, Todd Mills, Srinivas Devadas, Ronald Rivest

Report of the IAB Workshop on Security in the Internet Architecture" RFC-1636, June 1994
R. Braden, D. Clark, S. Crocker, C. Huitemat


Efficient Memory Integrity Verification and Encryption for Secure Processors
G. Edward Suh, Dwaine Clarke, Blaise Gassend,Marten van Dijk, Srini Devadas

Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond." IACR Cryptology ePrint Archive 2012: 733, 2012
Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and Nickolai Zeldovich


The Blast Query Language for Software Verification
Dirk Beyer, Adam Chlipala, Thomas Henzinger, Ranjit Jhala, Rupak Majumdar

Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM
Christopher W. Fletchery, Ling Reny, Albert Kwony, Marten van Dijkz, Srinivas Devadas

A Noise Bifurcation Architecture for Linear Additive Physical Functions
Meng-Day (Mandel) Yu, David Raihi, Ingrid Verbauwhede, Srinivas Devadas

Suppressing the Oblivious RAM Timing Channel While Making Information Leakage and Program Efficiency Trade-offs
Fletcher, Ren, Yu, van Dijk, Khan, Devadas