John D. Ramsdell

Orcid: 0000-0002-5547-0427

According to our database1, John D. Ramsdell authored at least 31 papers between 1979 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Evidence Tampering and Chain of Custody in Layered Attestations.
Proceedings of the 26th International Symposium on Principles and Practice of Declarative Programming, 2024

2021
Flexible Mechanisms for Remote Attestation.
ACM Trans. Priv. Secur., 2021

Automated Trust Analysis of Copland Specifications for Layered Attestations✱.
Proceedings of the PPDP 2021: 23rd International Symposium on Principles and Practice of Declarative Programming, 2021

Cryptographic Protocol Analysis and Compilation Using CPSA and Roletran.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
Assumption-Based Analysis of Distance-Bounding Protocols with cpsa.
Proceedings of the Logic, 2020

2019
Understanding Attestation: Analyzing Protocols that Use Quotes.
Proceedings of the Security and Trust Management - 15th International Workshop, 2019

Orchestrating Layered Attestations.
Proceedings of the Principles of Security and Trust - 8th International Conference, 2019

Enrich-by-Need Protocol Analysis for Diffie-Hellman.
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019

2018
Homomorphisms and Minimality for Enrich-by-Need Security Analysis.
CoRR, 2018

Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version).
CoRR, 2018

Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA.
Proceedings of the Integrated Formal Methods - 14th International Conference, 2018

2016
Cross-Tool Semantics for Protocol Security Goals.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

2015
Formal Support for Standardizing Protocols with State.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

2014
Proving Security Goals With Shape Analysis Sentences.
CoRR, 2014

A Hybrid Analysis for Security Protocols with State.
Proceedings of the Integrated Formal Methods - 11th International Conference, 2014

2012
An Analysis of the CAVES Attestation Protocol using CPSA
CoRR, 2012

Deducing Security Goals From Shape Analysis Sentences
CoRR, 2012

2011
Principles of remote attestation.
Int. J. Inf. Sec., 2011

2007
Compiling cryptographic protocols for deployment on the web.
Proceedings of the 16th International Conference on World Wide Web, 2007

2005
Verifying information flow goals in Security-Enhanced Linux.
J. Comput. Secur., 2005

Programming Cryptographic Protocols.
Proceedings of the Trustworthy Global Computing, International Symposium, 2005

2004
Trust Management in Strand Spaces: A Rely-Guarantee Method.
Proceedings of the Programming Languages and Systems, 2004

1999
The Tail-Recursive SECD Machine.
J. Autom. Reason., 1999

1995
CST: C State Transformers.
ACM SIGPLAN Notices, 1995

The VLISP Verified PreScheme Compiler.
LISP Symb. Comput., 1995

VLISP: A Verified Implementation of Scheme.
LISP Symb. Comput., 1995

The VLISP Verified Scheme System.
LISP Symb. Comput., 1995

1990
A Correctness Proof for Combinator Reduction with Cycles.
ACM Trans. Program. Lang. Syst., 1990

1989
The Alonzo functional programming language.
ACM SIGPLAN Notices, 1989

1986
The CURRY Chip.
Proceedings of the 1986 ACM Conference on LISP and Functional Programming, 1986

1979
Prettyprinting structured programs with connector lines.
ACM SIGPLAN Notices, 1979


  Loading...