|
Publications by Gavin Lowe
(Most recent publications at bottom.)
-
Probabilities and Priorities in Timed CSP
-
Gavin Lowe. DPhil thesis, Oxford University, 1993.
-
Probabilistic and Prioritized Models of Timed CSP
-
Gavin Lowe. Theoretical Computer Science 138 315-352, 1995. (Special
issue on the Mathematical Foundations of Programming Semantics conference,
1992).
-
Scheduling-Oriented Models for Real-Time Systems
-
Gavin Lowe. The Computer Journal, volume 38, number 6, 1995.
-
Refinement of Complex Systems: A Case Study
-
Gavin Lowe and Hussein Zedan. The Computer Journal, volume 38, number
10, 1995.
-
A Graphical Calculus.
-
Sharon Curtis and Gavin Lowe. Mathematics of Program Construction,
1995, Lecture Notes in Computer Science, 947, 1995.
-
An Attack on the Needham-Schroeder Public-Key Authentication Protocol.
-
Gavin Lowe. Information Processing Letters, volume 56, number 3, pages
131-133, 1995.
-
Breaking
and Fixing the Needham-Schroeder Public-Key Protocol using FDR.
- Gavin Lowe.
In
Tools and Algorithms for the Construction and Analysis of Systems,
Margaria and Steffen (eds.), volume 1055 of Lecture Notes in Computer Science,
Springer Verlag, pages 147-166, 1996.
Also in Software Concepts and Tools,
17:93-102, 1996.
-
Proofs with Graphs.
- Sharon Curtis and Gavin Lowe.
Science of Computer Programming, volume 26, 1996.
-
Some New Attacks upon Security Protocols.
-
Gavin Lowe.
Proceedings of 9th IEEE Computer Security Foundations
Workshop, 1996.
-
A Hierarchy of Authentication Specifications.
-
Gavin Lowe. Proceedings of 10th IEEE Computer Security Foundations
Workshop, 1997.
-
Using CSP to Detect Errors in the TMN Protocol.
-
Gavin Lowe and Bill Roscoe.
In IEEE Transactions on Software
Engineering, volume 23, number 10, 1997.
-
Casper: A
Compiler for the Analysis of Security Protocols.
-
Gavin Lowe.
Proceedings of 10th IEEE Computer Security Foundations
Workshop, 1997.
Also in Journal of Computer Security, Volume 6, pages 53-84, 1998.
-
A Family of Attacks upon
Authentication Protocols.
-
Gavin Lowe.
Department of Mathematics and Computer
Science, Technical Report 1997/5, University of Leicester, 1997.
-
A CSP Approach to Sequential Consistency
-
Gavin Lowe and Jim Davies.
In Distributed Computing, volume 12, numbers 2, 3, pages 91-104, 1999.
-
Towards a Completeness Result for Model
Checking of Security Protocols.
-
Gavin Lowe.
Journal of Computer Security, Volume 7, Numbers 2, 3, pages 89-146,
1999. An earlier version appeared in Proceedings of 11th IEEE Computer Security
Foundations Workshop, pages 96-105, 1998.
-
Simplifying Transformations for Security Protocols.
-
Mei Lin Hui and Gavin Lowe. In Proceedings of 12th IEEE Computer Security
Foundations Workshop, pages 32-43, 1999.
-
Analyzing a Library of Security Protocols using Casper and
FDR.
-
Ben Donovan, Paul Norris and Gavin Lowe. In Proceedings of the Workshop
on Formal Methods and Security Protocols, 1999. Some of the Casper scripts
are available here (gzipped, tarred directory).
-
How to Prevent Type Flaw Attacks on
Security Protocols.
-
James Heather, Gavin Lowe and Steve Schneider. In Proceedings of 13th IEEE
Computer Security Foundations Workshop, pages 255-268, 2000.
-
Data independent verification of crypto-protocols.
-
A. W. Roscoe, Philippa J. Broadfoot and Gavin Lowe. In The First Irish
Conference on the Mathematical Foundations of Computer Science and Information
Technology (MFCSIT2000) Electronic Notes in Theoretical Computer Science,
Volume 40, 2000.
-
Automating Data Independence.
-
Philippa Broadfoot, Gavin Lowe and Bill Roscoe. In Proceedings of
ESORICS 2000, pages 175-190, 2000.
-
Fault-Preserving Simplifying Transformations for
Security Protocols.
-
Mei Lin Hui and Gavin Lowe. Journal of Computer
Security, volume 9, pages 3-46, 2001.
-
Modelling and Analysis of Security Protocols.
-
Peter Ryan, Steve Schneider, Michael Goldsmith, Gavin Lowe and Bill Roscoe.
Addison-Wesley, 2001.
-
Quantifying Information Flow.
-
Gavin Lowe. In Proceedings of the 15th IEEE Computer Security Foundations
Workshop, 2002.
-
Analysing Protocols Subject to Guessing Attacks.
-
Gavin Lowe. In Proceedings of the Workshop on Issues in the Theory of
Security (WITS '02), 2002.
-
Analysing a Stream Authentication Protocol
using Model Checking.
-
Philippa Broadfoot and Gavin Lowe. In Proceedings of the 7th
European Symposium on Research in Computer Security (ESORICS), 2002. The
CSP files associated with this paper are available here.
-
Using CSP to detect Insertion and Evasion
Possibilities within the Intrusion Detection Area.
-
Gordon Rohrmair and Gavin Lowe. In Proceedings of BCS Workshop on Formal
Aspects of Security, 2002.
-
How to Prevent Type Flaw Attacks on
Security Protocols.
-
James Heather, Gavin Lowe and Steve Schneider. In Journal of
Computer Security, Volume 11, Number 2, 2003.
-
On Distributed Security Transactions
that use Secure Transport Protocols.
-
Philippa Broadfoot and Gavin Lowe. In Proceedings of the 16th IEEE
Computer Security Foundations Workshop, 2003.
-
Managing dynamic user communities in a grid of autonomous resources
-
The Security Coordination Group of the EU DataGrid Project. In Conference for
Computing in High Energy and Nuclear Physics, March 2003.
-
Using Data-Independence in the Analysis
of Intrusion Detection Systems.
-
Gordon Rohrmair and Gavin Lowe. In Proceedings of
the Workshop on Issues in the Theory of Security (WITS '03), 2003.
- On the Automatic Verification of Non-Standard
Measures of Consistency.
-
Christie Bolton and Gavin Lowe. In Proceedings of the International
Workshop on Formal Methods, 2003.
- A Hierarchy of Failures-Based Models.
-
Christie Bolton and Gavin Lowe. In Proceedings of EXPRESS: Expressiveness
in Concurrency, 2003.
-
Analysing Protocols Subject to
Guessing Attacks.
-
Gavin Lowe. In Journal of Computer
Security, Volume 12, Number 1, 2004.
-
Semantic Models for Information Flow.
-
Gavin Lowe. In Theoretical Computer Science, Volume 315, pages
209-256, 2004.
-
Defining Information Flow
Quantity.
-
Gavin Lowe. In Journal of Computer Security, Volume 12, Numbers 3, 4,
2004.
-
On the Application of Counterexample-Guided
Abstraction Refinement and Data Independence to the Parameterised Model
Checking Problem.
-
Gavin Lowe. In Proceedings of AVIS'04 - Third International Workshop on
Automatic Verification of Infinite-State Systems, 2004.
-
Analyses of the Reverse Path Forwarding Routing
Algorithm.
-
Christie Bolton and Gavin Lowe. In Proceedings of The International
Conference on Dependable Systems and Networks, 2004.
-
Analysing a Stream Authentication Protocol using Model Checking.
-
Philippa Hopcroft and Gavin Lowe. In International Journal of Information
Security, Volume 3, Number 1, pages 2--13, 2004.
- A Hierarchy of Failures-Based Models.
-
Christie Bolton and Gavin Lowe. In Theoretical Computer Science,
Volume 330, Number 3, pages 407-438, 2005.
-
Using Data-Independence in the
Analysis of Intrusion Detection Systems.
-
Gordon Thomas Rohrmair and Gavin Lowe. In Theoretical Computer
Science, Volume 340, Number 1, pages 82-101, 2005.
-
On Timed Models and Full Abstraction.
-
Gavin Lowe and Joel Ouaknine. In Proceedings of the 21st Annual Conference
on Mathematical Foundations of Programming Semantics (MFPS XXI),
pages 313--332, 2005.
-
A
Computational Justification for Guessing Attack Formalisms.
-
Tom Newcomb and Gavin Lowe. In Proceedings of the Workshop on Issues in
the Theory of Security (WITS '06), 2006.
-
On the Specification of Secure Channels.
-
Christopher Dilloway and Gavin Lowe. To appear in Proceedings of the
Workshop on Issues in the Theory of Security (WITS '07), 2007.
-
On information flow and refinement-closure.
-
Gavin Lowe. In Proceedings of the
Workshop on Issues in the Theory of Security (WITS '07), 2007.
-
Authority Analysis for Least
Privilege Environments.
-
Toby Murray and Gavin Lowe. To appear in Proceedings of Foundations of
Computer Security and Automated Reasoning for Security Protocol Analysis
(FCS-ARSPA'07), 2007.
Gavin Lowe /
gavin.lowe@comlab.ox.ac.uk
|
|
|
|