Publications 2005
- E. Abraham and B. Becker and F. Klaedtke and M. Steffen.
Optimizing Bounded Model Checking for Linear Hybrid Systems.
In 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI 2005)., 3385.
Springer-Verlag, 2005.
[Download BibTeX (TXT, 530 Bytes) | external page DOI] - Alessandro Armando and David Basin and Yohan Boichut and Yannick Chevalier and Luca Compagna and Jorge Cuellar and Paul Hankes Drielsma and Pierre-Cyrille Heám and Olga Kouchnarenko and Jacopo Mantovani and Sebastian Mödersheim and von Oheimb, David and Michael Rusinowitch and Judson Santiago and Mathieu Turuani and Luca Viganò and Laurent Vigneron.
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
In Proceedings of CAV'2005. LNCS 3576 Springer-Verlag, 2005.
[Download abstract (TXT, 947 Bytes) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 193 KB) | external page DOI] - Alessandro Armando and Luca Viganò.
Preface (Editorial).
In Electronic Notes in Theoretical Computer Science (Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA 2004), 125 (1), pages 1, 2005.
[Download BibTeX (TXT, 502 Bytes)]
- David Aspinall and Christoph Lüth and Burkhart Wolff.
Assisted Proof Document Authoring.
In Fourth International Conference on Mathematical Knowledge Management (MKM 05). LNCS 3863. Springer Verlag, 2005.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | external page DOI] - David Basin and Martin Buchheit and Jürgen Doser and Bernhard Hollunder and Torsten Lodderstedt.
Model Driven Security.
In DACH Security 2005.Syssec Verlag, 2005.
[Download BibTeX | Download PDF (PDF, 217 KB)]
- David Basin and Jürgen Doser and Torsten Lodderstedt.
Model Driven Security. Springer, 2005.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 393 KB) | external page DOI] - David Basin and Hironobu Kuruma and Kazuo Takaragi and Burkhart Wolff.
Specifying and Verifying Hysteresis Signature System with HOL-Z.
Computer Security Group, ETH Zürich, Technical Report 471, 2005.
[Download abstract (TXT, 897 Bytes) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 924 KB) | URL] - David Basin and Hironobu Kuruma and Kazuo Takaragi and Burkhart Wolff.
Verification of a Signature Architecture with HOL-Z.
In Formal Methods 2005. LNCS 3582 Springer Verlag, 2005.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | external page DOI] - David Basin and Sebastian Mödersheim and Luca Viganò.
Algebraic Intruder Deductions (Extended Version).
ETH Zürich, Computer Science, Technical Report 485, 2005.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 310 KB) | Download gzip'ed Postscript (GZ, 167 KB) | URL] - David Basin and Sebastian Mödersheim and Luca Viganò.
Algebraic Intruder Deductions.
In LPAR 2005.
LNAI, 3835. Springer-Verlag, 2005.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 216 KB) | Download gzip'ed Postscript (GZ, 167 KB)] - Achim D. Brucker and Burkhart Wolff.
A Verification Approach for Applied System Security.
In International Journal on Software Tools for Technology Transfer (STTT), 7 (3), pages 233-247, 2005.
[Download abstract (TXT, 1002 Bytes) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 325 KB) | external page DOI] - Achim D. Brucker and Burkhart Wolff.
Symbolic Test Case Generation for Primitive Recursive Functions.
In Formal Approaches to Testing of Software (FATES 04). LNCS 3395 Springer-Verlag, 2005.
[Download abstract (TXT, 860 Bytes) | Download BibTeX (TXT, 1 KB) | external page DOI] - Achim D. Brucker and Burkhart Wolff.
HOL-TestGen 1.0.0 User Guide.
Computer Security Group, ETH Zürich, Technical Report 482, 2005.
[Download BibTeX (TXT, 292 Bytes) | URL] - Achim D. Brucker and Burkhart Wolff.
Interactive Testing using HOL-TestGen.
In Formal Approaches to Testing of Software (FATES 05).
LNCS 3997 Springer-Verlag, 2005.
[Download abstract (TXT, 924 Bytes) | Download BibTeX (TXT, 1 KB) | external page DOI] - Carlos Caleiro and Luca Viganò and David Basin.
Metareasoning about Security Protocols using Distributed Temporal Logic.
In Electronic Notes in Theoretical Computer Science
Proceedings of the Workshop on Automated Reasoning for Security
Protocol Analysis, ARSPA 2004), 125 (1), pages 67-89, 2005.
[Download BibTeX (TXT, 528 Bytes) | external page DOI] - Carlos Caleiro and Luca Viganò and David Basin.
Deconstructing Alice and Bob.
In Electronic Notes in Theoretical Computer Science (Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA 2005), 135 (1), pages 3-22, 2005.
[Download BibTeX (TXT, 522 Bytes) | external page DOI] - Carlos Caleiro and Luca Viganò and David Basin.
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis.
In Logic Journal of the IGPL, 13 (6), pages 637-663, 2005.
[Download abstract (TXT, 958 Bytes) | Download BibTeX (TXT, 1 KB) | external page DOI] - S.-K. Chen and H. Lei and M. Wahler and H. Chang and K. Bhaskaran and J. Frank.
A Model Driven XML Transformation Framework for Business Performance Management.
In Proceedings of the IEEE Conference on e-Business Engineering.
IEEE Computer Society, 2005.
[Download BibTeX (TXT, 439 Bytes) | external page DOI] - Michael Näf und David Basin.
Konflikt oder Review - Zwei Ansätze für Labors in angewandter Informationssicherheit.
Information Security, Technical Report 497, 2005.
[Download BibTeX (TXT, 382 Bytes) | Download PDF (PDF, 1 MB) | URL] - Michael Näf und David Basin.
Konflikt oder Review - Zwei Ansätze für Labors in angewandter Informationssicherheit.
In Informatik Spektrum, 5 (28), 2005.
[Download BibTeX (TXT, 364 Bytes) | external page DOI] - Pierpaolo Degano and Luca Viganò.
Preface (Editorial).
In Electronic Notes in Theoretical Computer Science (Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA 2005), 135 (1), pages 1-2, 2005.
[Download BibTeX (TXT, 549 Bytes) | external page DOI] - Paul Hankes Drielsma and Sebastian Mödersheim and Luca Viganò.
A Formalization of Off-Line Guessing for Security Protocol Analysis.
In Proceedings of LPAR'04.LNAI, 3452. Springer, 2005.
[Download abstract (TXT, 2 KB) | Download BibTeX (TXT, 2 KB) | external page DOI] - Christopher Giblin and Alice Y Liu and Samuel Müller and Birgit Pfitzmann and Xin Zhou.
Regulations Expressed As Logical Models (REALM).
IBM Research, Technical Report RZ 3616, 2005.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 284 KB)]
- Christopher Giblin and Alice Y Liu and Samuel Müller and Birgit Pfitzmann and Xin Zhou.
Regulations Expressed As Logical Models (REALM).
In Proceedings of the 18th Annual Conference on Legal Knowledge and Information Systems (JURIX 2005).
IOS Press, 2005.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 178 KB)]
- Manuel Hilty and David Basin and Alexander Pretschner.
On Obligations.
In 10th European Symposium on Research in Computer Security (ESORICS 2005).LNCS, 3679. Springer-Verlag, 2005.
[Download abstract (TXT, 1008 Bytes) | Download BibTeX (TXT, 2 KB) | external page DOI] - M. Hilty and A. Pretschner and T. Walter and C. Schaefer.
Usage Control Requirements in Mobile and Ubiquitous Computing Applications.
DoCoMo Euro-Labs Internal Technical Report, Technical Report I-ST-015, 2005.
[Download BibTeX (TXT, 373 Bytes)] - Dieter Hutter and Heiko Mantel and Ina Schaefer and Axel Schairer.
Security of Multiagent Systems: A Case Study on Comparison Shopping.
In Journal of Applied Logic 2005, Elsevier, 2005.
[Download BibTeX (TXT, 2 KB) | external page DOI] - Jana Koehler and Rainer Hauser and Shane Sendall and Michael Wahler.
Declarative Techniques for Model-Driven Business Process Integration.
In IBM Systems Journal, 44 (1), pages 47-65, 2005.
[Download BibTeX (TXT, 412 Bytes) | Download PDF (PDF, 216 KB)]
- Boris Köpf and Heiko Mantel.
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
ETH Zürich, Technical Report 498, 2005.
[Download BibTeX (TXT, 411 Bytes) | Download PDF (PDF, 373 KB) | Download gzip'ed Postscript (GZ, 214 KB) | URL] - Boris Köpf and Heiko Mantel.
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In Workshop on Formal Aspects in Security and Trust.LNCS, 3866. Springer, 2005.
[Download BibTeX (TXT, 476 Bytes) | Download PDF (PDF, 247 KB) | Download gzip'ed Postscript (GZ, 96 KB) | external page DOI] - Heiko Mantel and Axel Schairer.
Exploiting Generic Aspects of Security Models in Formal Developments.
In Mechanizing Mathematical Reasoning. LNCS 2605 Springer, 2005.
[Download BibTeX (TXT, 366 Bytes) | external page DOI] - Thomas Meyer and Burkhart Wolff.
Tactic-based Optimized Compilation of Functional Programs.
In Types for Proofs and Programs (TYPES 2004). LNCS 3839 Springer Verlag, 2005.
[Download abstract (TXT, 925 Bytes) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 1.4 MB) | external page DOI] - Kunihiko Miyazaki and David Basin and Hironobu Kuruma and Kazuo Takaragi and Satoru Tezuka.
A formal analysis of a digital signature system.
In Computer Software - Journal of the Japanese Society for Software Science and Technology, 22 (2), pages 74-84, 2005.
in Japanese
[Download BibTeX (TXT, 508 Bytes) | Download PDF (PDF, 758 KB)]
- Alexander Pretschner.
Model-Based Testing in Practice.
In Formal Methods 2005.
Springer LNCS 3582, 2005.
[Download BibTeX (TXT, 334 Bytes) | external page DOI] - A. Pretschner.
Model-Based Testing.
In ICSE'05., 2005.
[Download BibTeX (TXT, 242 Bytes) | external page DOI] - A. Pretschner and J. Philipps.
Methodological Issues in Model-Based Testing.
Springer LNCS 3472, 2005.
[Download BibTeX (TXT, 1 KB) | external page DOI] - A. Pretschner and W. Prenninger.
Computing Refactorings of Behavior Models.
In MODELS 2005.
Springer LNCS 3713, 2005.
[Download PDF (PDF, 193 KB) | external page DOI] - A. Pretschner and W. Prenninger and S. Wagner and C. Kuehnel and M. Baumgartner and B. Sostawa and R. Zoelch and T. Stauner.
One Evaluation of Model-Based Testing and its Automation.
In ICSE'05., 2005.
[Download BibTeX (TXT, 390 Bytes)] - C. Salzmann and T. Stauner and A. Pretschner.
ICSE workshop: Software Engineering for Automotive Systems.
In ICSE'05., 2005.
[Download BibTeX (TXT, 301 Bytes)] - Diana Senn and David Basin and Germano Caronni.
Firewall Conformance Testing.
In TestCom 2005.Lecture Notes in Computer Science, 3502. Springer-Verlag GmbH, 2005.
[Download abstract (TXT, 897 Bytes) | Download BibTeX (TXT, 2 KB) | external page DOI] - David Basin and Sebastian Mödersheim and Luca Viganò.
OFMC: A symbolic model checker for security protocols.
In International Journal of Information Security, 4 (3), pages 181-208, 2005.
Published online December 2004
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 772 KB) | external page DOI] - Alessandro Armando and Luca Viganò.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2004).
In Electronic Notes in Theoretical Computer Science 125 (Elsevier Science Direct), 2005.
[Download BibTeX (TXT, 502 Bytes) | external page DOI] - Pierpaolo Degano and Luca Viganò.
Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA 2005).
In Electronic Notes in Theoretical Computer Science 135 (Elsevier Science Direct), 2005.
[Download BibTeX (TXT, 549 Bytes) | external page DOI] - Serge Autexier and Iliano Cervesato and Heiko Mantel
International Journal of Information Security.
Springer, 2005.
[Download BibTeX (TXT, 402 Bytes) | external page DOI] - A. Pretschner and C. Salzmann and T. Stauner.
Proceedings of the 2nd Intl. ICSE workshop on Software Engineering for Automotive Systems.
In ACM, 2005.
ISBN 1-59593-128-7
[Download BibTeX (TXT, 351 Bytes) | external page DOI] - M. Broy and B. Jonsson and J.-P. Katoen and M. Leucker and A. Pretschner
Model-Based Testing of Reactive Systems.
Springer, 2005.
[Download BibTeX (TXT, 507 Bytes) | Download cover (JPEG, 7 KB) | external page URL] - Alan Bundy and David Basin and Dieter Hutter and Andrew Ireland
Rippling: Meta-level Guidance for Mathematical Reasoning.
Cambridge University Press, 2005.
[Download abstract (TXT, 2 KB) | Download BibTeX (TXT, 2 KB) | Download cover (JPEG, 6 KB) | Download PDF (PDF, 189 KB) | external page DOI]