Fuller Laboratories, 137
Joshua D. Guttman
Often, if you excavate below some real-world problem, you'll find a few principles that make up its theoretical core. They allow you to understand and control many aspects of the problem. This urge to find a theoretical core is mainly what makes real-world problems interesting. Much of my information security research has been motivated by this urge, and has led to ways to control cryptographic protocols, operating system security mechanisms, and network routing and filtering.
In my teaching, I try to supply tools for getting below the surface of problems--shovels and pickaxes, or even backhoes, scientifically speaking--and an insight into the structures you'll often find when you get to the core.
- Information Security
- Theoretical Computer Science
- Formal Methods
- Programming Languages
- A.B., Princeton University, 1975
- M.A., University of Chicago, 1976
- Ph.D., University of Chicago, 1984
- Joshua D. Guttman. “Fair Exchange in Strand Spaces,” Journal of Automated Reasoning, 2012
- George S. Coker, Joshua D. Guttman, et. al. “Attestation: Evidence and Trust,” International Journal for Information Security, 2011.
- Joshua D. Guttman, Amy L. Herzog, John D. Ramsdell, and Clement W. Skorupka. “Verifying Information-Flow Goals in Security-Enhanced Linux,” Journal of Computer Security, 13(1), 2005.
- J. D. Guttman and F. J. Thayer. “Authentication Tests and the Structure of Bundles,” Theoretical Computer Science, June 2002.
- F. J. Thayer, J. C. Herzog, and J. D. Guttman. “Strand Spaces: Proving Security Protocols Correct,” Journal of Computer Security, 7(2/3):191--230, 1999.