A Long, Slow Conversation
Cathy has always been an inspiration for me, because of the example she has set for quality in her research work, and more personally for her interest in my own attempts in the same area. In all her professional activities, I admire her humility, energy, constructive ideas, and commitment to serving the research community.
- 2.Meadows, C.: Using narrowing in the analysis of key management protocols. In: IEEE Symposium on Security and Privacy, pp. 138–147. IEEE Computer Society (1989)Google Scholar
- 3.Millen, J., Ko, H.-P.: Narrowing terminates for encryption. In: IEEE Computer Security Foundations, pp. 39–49. IEEE Computer Society (1996)Google Scholar
- 4.Meadows, C.: Extending the Brewer-Nash model to a multilevel context. In: IEEE Symposium on Security and Privacy, pp. 95–102. IEEE Computer Society (1990)Google Scholar
- 5.Millen, J.: Local reconfiguration policies. In: IEEE Symposium on Security and Privacy, pp. 48–56. IEEE Computer Society (1999)Google Scholar