Publications 2003
- Abdelwaheb Ayari and David Basin and Felix Klaedtke.
Decision Procedures for Inductive Boolean Functions based on Alternating Automata.
In Theoretical Computer Science, 300 (1-3), pages 301-329, 2003.
[Download abstract (TXT, 765 Bytes) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 388 KB) | Download gzip'ed Postscript (GZ, 169 KB) | external page DOI]
- David Basin and Jürgen Doser and Torsten Lodderstedt.
Model Driven Security for Process-Oriented Systems.
In 8th ACM Symposium on Access Control Models and Technologies.
ACM Press, 2003.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 215 KB) | Download gzip'ed Postscript (GZ, 182 KB) | external page DOI]
- David Basin and Jürgen Doser and Torsten Lodderstedt.
Model Driven Security: from UML Models to Access Control Infrastructures. ETH Zürich, Technical Report 414, 2003.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 434 KB) | Download gzip'ed Postscript (GZ, 581 KB)]
- David Basin and Stefan Friedrich and Marek Gawkowski.
Bytecode Verification by Model Checking.
In Journal of Automated Reasoning, 30 (3-4), pages 399-444, 2003.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 518 KB) | external page DOI]
- David Basin and Sebastian Mödersheim and Luca Viganò.
An On-The-Fly Model-Checker for Security Protocol Analysis.
In Proceedings of Esorics'03. LNCS 2808 Springer-Verlag, 2003.
[Download abstract (TXT, 712 Bytes) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 245 KB) | Download gzip'ed Postscript (GZ, 239 KB) | external page DOI]
- David Basin and Sebastian Mödersheim and Luca Viganò.
Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols (Extended Abstract).
In SPV'03. 2003.
[Download abstract (TXT, 992 Bytes) | Download BibTeX (TXT, 1 KB)]
- David Basin and Sebastian Mödersheim and Luca Viganò.
Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols.
In CCS'03. ACM Press, 2003.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 194 KB) | Download gzip'ed Postscript (GZ, 176 KB) | external page DOI]
- David Basin and Sebastian Mödersheim and Luca Viganò.
An On-The-Fly Model-Checker for Security Protocol Analysis.
ETH Zürich, Computer Science, Technical Report 404, 2003.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 373 KB) | Download gzip'ed Postscript (GZ, 374 KB) | URL]
- David Basin and Sebastian Mödersheim and Luca Viganò.
Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols.
ETH Zürich, Computer Science, Technical Report 405, 2003.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 324 KB) | Download gzip'ed Postscript (GZ, 299 KB)]
- Achim D. Brucker and Frank Rittinger and Burkhart Wolff.
HOL-Z 2.0: A Proof Environment for Z-Specifications.
In Journal of Universal Computer Science, 9 (2), pages 152-172, 2003.
[Download abstract (TXT, 939 Bytes) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 259 KB) | Download gzip'ed Postscript (GZ, 257 KB) | external page © J.UCS]
- Achim D. Brucker and Burkhart Wolff.
A Case Study of a Formalized Security Architecture.
In Eighth International Workshop onFormal Methods for Industrial Critical Systems (FMICS'03), 80.
Elsevier Science Publishers, 2003.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 246 KB) | Download gzip'ed Postscript (GZ, 257 KB) | external page DOI]
- Achim D. Brucker and Burkhart Wolff.
Using Theory Morphisms for Implementing Formal Methods Tools.
In Types 2002, Proceedings of the workshop Types for Proof and Programs.
LNCS 2646. Springer-Verlag, 2003.
[Download abstract (TXT, 954 Bytes) | Download BibTeX (TXT, 1 KB) | external page DOI]
- S. Gauch and J. Chaffee and A. Pretschner.
Ontology-Based Personalized Search and Browsing.
In J. Web Intelligence and Agent Systems, 1 (3-4), pages 219-234, 2003.
[Download BibTeX (TXT, 334 Bytes)]
- G. Hahn and J. Philipps and A. Pretschner and T. Stauner.
Prototype-based Tests for Hybrid Reactive Systems.
In Proceeding of the 14th IEEE International workshop on Rapid System Prototyping. IEEE, 2003.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | external page DOI]
- Heiko Mantel.
A Uniform Framework for the Formal Specification and Verification of Information Flow Security.
Saarland University, 2003.
[Download BibTeX (TXT, 292 Bytes)]
- Heiko Mantel and Andrei Sabelfeld.
A Unifying Approach to the Security of Distributed and Multi-threaded Programs.
In Journal of Computer Security, 11 (4), 2003.
[Download BibTeX (TXT, 313 Bytes) | URL]
- J. Philipps and A. Pretschner and O. Slotosch and E. Aiglstorfer.
Model-Based Test Case Generation for Smart Cards.
In Electronic Notes in Theoretical Computer Science, 80, pages 168-182, 2003.
[Download abstract (TXT, 750 Bytes) | Download BibTeX (TXT, 1 KB) | external page DOI]
- A. Pretschner.
Compositional Generation of MC/DC Integration Test Suites.
In Electronic Notes in Theoretical Computer Science, 82 (6), pages 1-11, 2003.
[Download abstract (TXT, 496 Bytes) | Download BibTeX (TXT, 777 Bytes) | external page DOI]
- Nicole Rauch and Burkhart Wolff.
Formalizing Java's Two's-Complement Integral Type in Isabelle/HOL.
In Electronic Notes in Theoretical Computer Science, 80. Elsevier Science Publishers, 2003.
[Download abstract (TXT, 743 Bytes) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 204 KB) | external page DOI]
- Anindya Banerjee and Heiko Mantel and David Naumann and Andrei Sabelfeld.
Final Report on Seminar 03411: Language-Based Security.
Dagstuhl, 2003.
[Download BibTeX (TXT, 292 Bytes)]
- Dieter Hutter and Heiko Mantel and Axel Schairer.
Informationsflusskontrolle als Grundlage für die Sicherheit von Multiagentensystemen.
In Praxis der Informationsverarbeitung und Kommunikation (PIK), 26 (1), pages 39-47, 2003.
[Download BibTeX (TXT, 414 Bytes) | external page DOI]
- David Basin and Burkhart Wolff.
Theorem Proving in Higher Order Logics, 16th International Conference (TPHOLs 2003).
In Springer-Verlag, 2003.
LNCS 2758.
[Download abstract (TXT, 1007 Bytes) | Download BibTeX (TXT, 1 KB) | Download cover (JPEG, 5 KB) | external page DOI]
- Michael Backes and David Basin and Michael Waidner.
Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering.
In ACM Press, 2003.
[Download BibTeX (TXT, 665 Bytes) | Download cover (PNG, 7 KB) | external page ACM, Inc.]