Active Trust Management for Autonomous Adaptive Survivable Systems. In Self-Adaptive Software, Springer-Verlag Lecture-Notes in Computer Science #1936, February 2001, Robertson, Laddaga, Shrobe, eds
Howard Shrobe, Jon Doyle, Peter Szolovits
Agile Monitoring for Cyber Defense. In Proceedings of the Second DARPA Information Survivability Conference and Exposition (DISCEX-II), June 12-14, 2001, Anaheim, California
Jon Doyle, William Long, Howard Shrobe, Isaac Kohane, Peter Szolovits
Improving Application Security with Data Flow Assertions
Alexander Yip, Xi Wang, Nickolai Zeldovich, Frans Kaashoek
An Ideal-Security Protocol for Order-Preserving Encoding
Raluca Ada Popa, Frank H. Li, Nickolai Zeldovich
Proxy-Based Security Protocols in Networked Mobile Devices
Matthew Burnside, Dwaine Clarke, Todd Mills, Srinivas Devadas, Ronald Rivest
Report of the IAB Workshop on Security in the Internet Architecture" RFC-1636, June 1994
R. Braden, D. Clark, S. Crocker, C. Huitemat
Efficient Memory Integrity Verification and Encryption for Secure Processors
G. Edward Suh, Dwaine Clarke, Blaise Gassend,Marten van Dijk, Srini Devadas
Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond." IACR Cryptology ePrint Archive 2012: 733, 2012
Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and Nickolai Zeldovich
The Blast Query Language for Software Verification
Dirk Beyer, Adam Chlipala, Thomas Henzinger, Ranjit Jhala, Rupak Majumdar
Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM
Christopher W. Fletchery, Ling Reny, Albert Kwony, Marten van Dijkz, Srinivas Devadas
A Noise Bifurcation Architecture for Linear Additive Physical Functions
Meng-Day (Mandel) Yu, David Raihi, Ingrid Verbauwhede, Srinivas Devadas
Suppressing the Oblivious RAM Timing Channel While Making Information Leakage and Program Efficiency Trade-offs
Fletcher, Ren, Yu, van Dijk, Khan, Devadas