Publications 2005
- E. Abraham and B. Becker and F. Klaedtke and M. Steffen.
Optimizing Bounded Model Checking for Linear Hybrid Systems.
In 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI 2005)., 3385.
Springer-Verlag, 2005.
[DownloadBibTeX (TXT, 530 Bytes)vertical_align_bottom | external pageDOIcall_made] - Alessandro Armando and David Basin and Yohan Boichut and Yannick Chevalier and Luca Compagna and Jorge Cuellar and Paul Hankes Drielsma and Pierre-Cyrille Heám and Olga Kouchnarenko and Jacopo Mantovani and Sebastian Mödersheim and von Oheimb, David and Michael Rusinowitch and Judson Santiago and Mathieu Turuani and Luca Viganò and Laurent Vigneron.
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
In Proceedings of CAV'2005. LNCS 3576 Springer-Verlag, 2005.
[Downloadabstract (TXT, 947 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 193 KB)vertical_align_bottom | external pageDOIcall_made] - Alessandro Armando and Luca Viganò.
Preface (Editorial).
In Electronic Notes in Theoretical Computer Science (Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA 2004), 125 (1), pages 1, 2005.
[DownloadBibTeX (TXT, 502 Bytes)vertical_align_bottom]
- David Aspinall and Christoph Lüth and Burkhart Wolff.
Assisted Proof Document Authoring.
In Fourth International Conference on Mathematical Knowledge Management (MKM 05). LNCS 3863. Springer Verlag, 2005.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Martin Buchheit and Jürgen Doser and Bernhard Hollunder and Torsten Lodderstedt.
Model Driven Security.
In DACH Security 2005.Syssec Verlag, 2005.
[DownloadBibTeXvertical_align_bottom | DownloadPDF (PDF, 217 KB)vertical_align_bottom]
- David Basin and Jürgen Doser and Torsten Lodderstedt.
Model Driven Security. Springer, 2005.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 393 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Hironobu Kuruma and Kazuo Takaragi and Burkhart Wolff.
Specifying and Verifying Hysteresis Signature System with HOL-Z.
Computer Security Group, ETH Zürich, Technical Report 471, 2005.
[Downloadabstract (TXT, 897 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 924 KB)vertical_align_bottom | URL] - David Basin and Hironobu Kuruma and Kazuo Takaragi and Burkhart Wolff.
Verification of a Signature Architecture with HOL-Z.
In Formal Methods 2005. LNCS 3582 Springer Verlag, 2005.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Sebastian Mödersheim and Luca Viganò.
Algebraic Intruder Deductions (Extended Version).
ETH Zürich, Computer Science, Technical Report 485, 2005.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 310 KB)vertical_align_bottom | Downloadgzip'ed Postscript (GZ, 167 KB)vertical_align_bottom | URL] - David Basin and Sebastian Mödersheim and Luca Viganò.
Algebraic Intruder Deductions.
In LPAR 2005.
LNAI, 3835. Springer-Verlag, 2005.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 216 KB)vertical_align_bottom | Downloadgzip'ed Postscript (GZ, 167 KB)vertical_align_bottom] - Achim D. Brucker and Burkhart Wolff.
A Verification Approach for Applied System Security.
In International Journal on Software Tools for Technology Transfer (STTT), 7 (3), pages 233-247, 2005.
[Downloadabstract (TXT, 1002 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 325 KB)vertical_align_bottom | external pageDOIcall_made] - Achim D. Brucker and Burkhart Wolff.
Symbolic Test Case Generation for Primitive Recursive Functions.
In Formal Approaches to Testing of Software (FATES 04). LNCS 3395 Springer-Verlag, 2005.
[Downloadabstract (TXT, 860 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | external pageDOIcall_made] - Achim D. Brucker and Burkhart Wolff.
HOL-TestGen 1.0.0 User Guide.
Computer Security Group, ETH Zürich, Technical Report 482, 2005.
[DownloadBibTeX (TXT, 292 Bytes)vertical_align_bottom | URL] - Achim D. Brucker and Burkhart Wolff.
Interactive Testing using HOL-TestGen.
In Formal Approaches to Testing of Software (FATES 05).
LNCS 3997 Springer-Verlag, 2005.
[Downloadabstract (TXT, 924 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | external pageDOIcall_made] - Carlos Caleiro and Luca Viganò and David Basin.
Metareasoning about Security Protocols using Distributed Temporal Logic.
In Electronic Notes in Theoretical Computer Science
Proceedings of the Workshop on Automated Reasoning for Security
Protocol Analysis, ARSPA 2004), 125 (1), pages 67-89, 2005.
[DownloadBibTeX (TXT, 528 Bytes)vertical_align_bottom | external pageDOIcall_made] - Carlos Caleiro and Luca Viganò and David Basin.
Deconstructing Alice and Bob.
In Electronic Notes in Theoretical Computer Science (Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA 2005), 135 (1), pages 3-22, 2005.
[DownloadBibTeX (TXT, 522 Bytes)vertical_align_bottom | external pageDOIcall_made] - Carlos Caleiro and Luca Viganò and David Basin.
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis.
In Logic Journal of the IGPL, 13 (6), pages 637-663, 2005.
[Downloadabstract (TXT, 958 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | external pageDOIcall_made] - S.-K. Chen and H. Lei and M. Wahler and H. Chang and K. Bhaskaran and J. Frank.
A Model Driven XML Transformation Framework for Business Performance Management.
In Proceedings of the IEEE Conference on e-Business Engineering.
IEEE Computer Society, 2005.
[DownloadBibTeX (TXT, 439 Bytes)vertical_align_bottom | external pageDOIcall_made] - Michael Näf und David Basin.
Konflikt oder Review - Zwei Ansätze für Labors in angewandter Informationssicherheit.
Information Security, Technical Report 497, 2005.
[DownloadBibTeX (TXT, 382 Bytes)vertical_align_bottom | DownloadPDF (PDF, 1 MB)vertical_align_bottom | URL] - Michael Näf und David Basin.
Konflikt oder Review - Zwei Ansätze für Labors in angewandter Informationssicherheit.
In Informatik Spektrum, 5 (28), 2005.
[DownloadBibTeX (TXT, 364 Bytes)vertical_align_bottom | external pageDOIcall_made] - Pierpaolo Degano and Luca Viganò.
Preface (Editorial).
In Electronic Notes in Theoretical Computer Science (Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA 2005), 135 (1), pages 1-2, 2005.
[DownloadBibTeX (TXT, 549 Bytes)vertical_align_bottom | external pageDOIcall_made] - Paul Hankes Drielsma and Sebastian Mödersheim and Luca Viganò.
A Formalization of Off-Line Guessing for Security Protocol Analysis.
In Proceedings of LPAR'04.LNAI, 3452. Springer, 2005.
[Downloadabstract (TXT, 2 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | external pageDOIcall_made] - Christopher Giblin and Alice Y Liu and Samuel Müller and Birgit Pfitzmann and Xin Zhou.
Regulations Expressed As Logical Models (REALM).
IBM Research, Technical Report RZ 3616, 2005.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 284 KB)vertical_align_bottom]
- Christopher Giblin and Alice Y Liu and Samuel Müller and Birgit Pfitzmann and Xin Zhou.
Regulations Expressed As Logical Models (REALM).
In Proceedings of the 18th Annual Conference on Legal Knowledge and Information Systems (JURIX 2005).
IOS Press, 2005.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 178 KB)vertical_align_bottom]
- Manuel Hilty and David Basin and Alexander Pretschner.
On Obligations.
In 10th European Symposium on Research in Computer Security (ESORICS 2005).LNCS, 3679. Springer-Verlag, 2005.
[Downloadabstract (TXT, 1008 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | external pageDOIcall_made] - M. Hilty and A. Pretschner and T. Walter and C. Schaefer.
Usage Control Requirements in Mobile and Ubiquitous Computing Applications.
DoCoMo Euro-Labs Internal Technical Report, Technical Report I-ST-015, 2005.
[DownloadBibTeX (TXT, 373 Bytes)vertical_align_bottom] - Dieter Hutter and Heiko Mantel and Ina Schaefer and Axel Schairer.
Security of Multiagent Systems: A Case Study on Comparison Shopping.
In Journal of Applied Logic 2005, Elsevier, 2005.
[DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | external pageDOIcall_made] - Jana Koehler and Rainer Hauser and Shane Sendall and Michael Wahler.
Declarative Techniques for Model-Driven Business Process Integration.
In IBM Systems Journal, 44 (1), pages 47-65, 2005.
[DownloadBibTeX (TXT, 412 Bytes)vertical_align_bottom | DownloadPDF (PDF, 216 KB)vertical_align_bottom]
- Boris Köpf and Heiko Mantel.
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
ETH Zürich, Technical Report 498, 2005.
[DownloadBibTeX (TXT, 411 Bytes)vertical_align_bottom | DownloadPDF (PDF, 373 KB)vertical_align_bottom | Downloadgzip'ed Postscript (GZ, 214 KB)vertical_align_bottom | URL] - Boris Köpf and Heiko Mantel.
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
In Workshop on Formal Aspects in Security and Trust.LNCS, 3866. Springer, 2005.
[DownloadBibTeX (TXT, 476 Bytes)vertical_align_bottom | DownloadPDF (PDF, 247 KB)vertical_align_bottom | Downloadgzip'ed Postscript (GZ, 96 KB)vertical_align_bottom | external pageDOIcall_made] - Heiko Mantel and Axel Schairer.
Exploiting Generic Aspects of Security Models in Formal Developments.
In Mechanizing Mathematical Reasoning. LNCS 2605 Springer, 2005.
[DownloadBibTeX (TXT, 366 Bytes)vertical_align_bottom | external pageDOIcall_made] - Thomas Meyer and Burkhart Wolff.
Tactic-based Optimized Compilation of Functional Programs.
In Types for Proofs and Programs (TYPES 2004). LNCS 3839 Springer Verlag, 2005.
[Downloadabstract (TXT, 925 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 1.4 MB)vertical_align_bottom | external pageDOIcall_made] - Kunihiko Miyazaki and David Basin and Hironobu Kuruma and Kazuo Takaragi and Satoru Tezuka.
A formal analysis of a digital signature system.
In Computer Software - Journal of the Japanese Society for Software Science and Technology, 22 (2), pages 74-84, 2005.
in Japanese
[DownloadBibTeX (TXT, 508 Bytes)vertical_align_bottom | DownloadPDF (PDF, 758 KB)vertical_align_bottom]
- Alexander Pretschner.
Model-Based Testing in Practice.
In Formal Methods 2005.
Springer LNCS 3582, 2005.
[DownloadBibTeX (TXT, 334 Bytes)vertical_align_bottom | external pageDOIcall_made] - A. Pretschner.
Model-Based Testing.
In ICSE'05., 2005.
[DownloadBibTeX (TXT, 242 Bytes)vertical_align_bottom | external pageDOIcall_made] - A. Pretschner and J. Philipps.
Methodological Issues in Model-Based Testing.
Springer LNCS 3472, 2005.
[DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | external pageDOIcall_made] - A. Pretschner and W. Prenninger.
Computing Refactorings of Behavior Models.
In MODELS 2005.
Springer LNCS 3713, 2005.
[DownloadPDF (PDF, 193 KB)vertical_align_bottom | external pageDOIcall_made] - A. Pretschner and W. Prenninger and S. Wagner and C. Kuehnel and M. Baumgartner and B. Sostawa and R. Zoelch and T. Stauner.
One Evaluation of Model-Based Testing and its Automation.
In ICSE'05., 2005.
[DownloadBibTeX (TXT, 390 Bytes)vertical_align_bottom] - C. Salzmann and T. Stauner and A. Pretschner.
ICSE workshop: Software Engineering for Automotive Systems.
In ICSE'05., 2005.
[DownloadBibTeX (TXT, 301 Bytes)vertical_align_bottom] - Diana Senn and David Basin and Germano Caronni.
Firewall Conformance Testing.
In TestCom 2005.Lecture Notes in Computer Science, 3502. Springer-Verlag GmbH, 2005.
[Downloadabstract (TXT, 897 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Sebastian Mödersheim and Luca Viganò.
OFMC: A symbolic model checker for security protocols.
In International Journal of Information Security, 4 (3), pages 181-208, 2005.
Published online December 2004
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 772 KB)vertical_align_bottom | external pageDOIcall_made] - Alessandro Armando and Luca Viganò.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2004).
In Electronic Notes in Theoretical Computer Science 125 (Elsevier Science Direct), 2005.
[DownloadBibTeX (TXT, 502 Bytes)vertical_align_bottom | external pageDOIcall_made] - Pierpaolo Degano and Luca Viganò.
Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA 2005).
In Electronic Notes in Theoretical Computer Science 135 (Elsevier Science Direct), 2005.
[DownloadBibTeX (TXT, 549 Bytes)vertical_align_bottom | external pageDOIcall_made] - Serge Autexier and Iliano Cervesato and Heiko Mantel
International Journal of Information Security.
Springer, 2005.
[DownloadBibTeX (TXT, 402 Bytes)vertical_align_bottom | external pageDOIcall_made] - A. Pretschner and C. Salzmann and T. Stauner.
Proceedings of the 2nd Intl. ICSE workshop on Software Engineering for Automotive Systems.
In ACM, 2005.
ISBN 1-59593-128-7
[DownloadBibTeX (TXT, 351 Bytes)vertical_align_bottom | external pageDOIcall_made] - M. Broy and B. Jonsson and J.-P. Katoen and M. Leucker and A. Pretschner
Model-Based Testing of Reactive Systems.
Springer, 2005.
[DownloadBibTeX (TXT, 507 Bytes)vertical_align_bottom | Downloadcover (JPEG, 7 KB)vertical_align_bottom | external pageURLcall_made] - Alan Bundy and David Basin and Dieter Hutter and Andrew Ireland
Rippling: Meta-level Guidance for Mathematical Reasoning.
Cambridge University Press, 2005.
[Downloadabstract (TXT, 2 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | Downloadcover (JPEG, 6 KB)vertical_align_bottom | DownloadPDF (PDF, 189 KB)vertical_align_bottom | external pageDOIcall_made]