Search Results - "Guttman, Joshua"

Refine Results
  1. 1

    State and Progress in Strand Spaces: Proving Fair Exchange by Guttman, Joshua D.

    Published in Journal of automated reasoning (01-02-2012)
    “…Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols, for instance, coordinate delivery of new values to…”
    Get full text
    Journal Article
  2. 2

    How many is enough? Measuring the number of FAST exams needed by emergency medicine trainees to reach competence by Bakhribah, Ahmad, Leumas, Jordan, Helland, Gregg, Guttman, Joshua, Arfaj, Yara, Alharbi, Rawan, Bakhsh, Abdullah

    “…Background For patients with blunt abdominal trauma, the Focused Assessment with Sonography in Trauma (FAST) exam is the initial imaging modality employed to…”
    Get full text
    Journal Article
  3. 3

    Use of Point-of-Care Ultrasound for the Diagnosis of Ovarian Hyperstimulation Syndrome by Bellapu, Sowdhamani, MD, Guttman, Joshua, MD, FRCPC, FAAEM

    Published in The Journal of emergency medicine (01-04-2017)
    “…Abstract Background Ovarian hyperstimulation syndrome (OHSS) occurs when ovaries are overstimulated and enlarged due to fertility treatments resulting in a…”
    Get full text
    Journal Article
  4. 4

    Measuring protocol strength with security goals by Rowe, Paul D., Guttman, Joshua D., Liskov, Moses D.

    “…Flaws in published standards for security protocols are found regularly, often after systems implementing those standards have been deployed. Because of…”
    Get full text
    Journal Article
  5. 5

    Localizing Firewall Security Policies by Adao, Pedro, Focardi, Riccardo, Guttman, Joshua D., Luccio, Flaminia L.

    “…In complex networks, filters may be applied at different nodes to control how packets flow. In this paper, we study how to locate filtering functionality…”
    Get full text
    Conference Proceeding Journal Article
  6. 6

    Security Theorems via Model Theory by Guttman, Joshua

    “…A model-theoretic approach can establish security theorems for cryptographic protocols. Formulas expressing authentication and non-disclosure properties of…”
    Get full text
    Journal Article
  7. 7

    Authentication tests and the structure of bundles by Guttman, Joshua D., Thayer, F.Javier

    Published in Theoretical computer science (14-06-2002)
    “…Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic…”
    Get full text
    Journal Article
  8. 8
  9. 9

    Point-of-Care Ultrasound in the Diagnosis of Venous Thoracic Outlet Syndrome by Meyer, Hannah Marie, Guttman, Joshua

    Published in The Journal of emergency medicine (01-12-2022)
    “…Clinicians trained in point-of-care ultrasound (POCUS) use the tool to enhance diagnostic capabilities at the bedside, often excluding or diagnosing conditions…”
    Get full text
    Journal Article
  10. 10

    Choreographies with Secure Boxes and Compromised Principals by Carbone, Marco, Guttman, Joshua

    “…We equip choreography-level session descriptions with a simple abstraction of a security infrastructure. Message components may be enclosed within (possibly…”
    Get full text
    Journal Article
  11. 11

    Execution Models for Choreographies and Cryptoprotocols by Carbone, Marco, Guttman, Joshua

    “…A choreography describes a transaction in which several principals interact. Since choreographies frequently describe business processes affecting substantial…”
    Get full text
    Journal Article
  12. 12

    Fair Exchange in Strand Spaces by Guttman, Joshua D.

    “…Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols coordinate delivery of new values to the…”
    Get full text
    Journal Article
  13. 13

    A Cut Principle for Information Flow by Guttman, Joshua D., Rowe, Paul D.

    “…We view a distributed system as a graph of active locations with unidirectional channels between them, through which they pass messages. In this context, the…”
    Get full text
    Conference Proceeding
  14. 14

    Principles of remote attestation by Coker, George, Guttman, Joshua, Loscocco, Peter, Herzog, Amy, Millen, Jonathan, O’Hanlon, Brian, Ramsdell, John, Segall, Ariel, Sheehy, Justin, Sniffen, Brian

    “…Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. We identify five…”
    Get full text
    Journal Article
  15. 15

    A Set Theory with Support for Partial Functions by Farmer, William M., Guttman, Joshua D.

    Published in Studia logica (01-10-2000)
    “…Partial functions can be easily represented in set theory as certain sets of ordered pairs. However, classical set theory provides no special machinery for…”
    Get full text
    Journal Article
  16. 16

    Diagnostic point-of-care ultrasound: assessment techniques for the pediatric trauma patient by Guttman, Joshua, Nelson, Bret P.

    Published in Pediatric emergency medicine practice (15-07-2019)
    “…Emergency ultrasound is performed at the point of care to quickly answer focused clinical questions. Over the last 25 years, the use of this technique has…”
    Get more information
    Journal Article
  17. 17

    Strand spaces: Why is a security protocol correct? by Fabrega, F Javier Thayer, Herzog, Jonathan C, Guttman, Joshua D

    “…A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator…”
    Get full text
    Journal Article
  18. 18

    Filtering postures: Local enforcement for global policies by Guttman, Joshua D

    “…When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to…”
    Get full text
    Journal Article
  19. 19
  20. 20

    Diagnostic Emergency Ultrasound: Assessment Techniques In The Pediatric Patient by Guttman, Joshua, Nelson, Bret P

    Published in Pediatric emergency medicine practice (01-01-2016)
    “…Emergency ultrasound is performed at the point of care to answer focused clinical questions in a rapid manner. Over the last 20 years, the use of this…”
    Get more information
    Journal Article