Publications 2006
- Carl Abrams and Jürg von Känel and Samuel Müller and Birgit Pfitzmann and Susanne Ruschka-Taylor.
Optimized Enterprise Risk Management.
IBM Research, Technical Report RZ 3657, 2006.
[Download abstract (TXT, 2 KB) | Download BibTeX (TXT, 2 KB)] - Pedro Adao and Paulo Mateus and Tiago Reis and Luca Viganò.
Towards a Quantitative Analysis of Security Protocols.
In Electronic Notes in Theoretical Computer Science (Proceedings of the 4th Workshop on Quantitative Aspects of Programming Languages, QAPL 2006), 164 (3), pages 3-25, 2006.
[Download BibTeX (TXT, 2 KB) | external page DOI] - Michael Backes and Sebastian Mödersheim and Birgit Pfitzmann and Luca Viganò. Symbolic and Cryptographic Analysis of the Secure WS-Reliable Messaging Scenario (extended version).
Department of Computer Science, ETH Zurich, Technical Report 502, 2006.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 319 KB) | URL] - Michael Backes and Sebastian Mödersheim and Birgit Pfitzmann and Luca Viganò.
Symbolic and Cryptographic Analysis of the Secure WS-Reliable Messaging Scenario.
In Proceedings of FOSSACS 2006.LNCS, 3921. Springer-Verlag, 2006.
[Download BibTeX (TXT, 445 Bytes) | external page DOI] - David Basin and Jürgen Doser and Torsten Lodderstedt.
Model Driven Security: from UML Models to Access Control Infrastructures.
In ACM Transactions on Software Engineering and Methodology, 15 (1), pages 39-91, 2006.
An intermediate version is available as ETH technical report no. 414
[Download abstract (TXT, 2 KB) | Download BibTeX (TXT, 1 KB) | external page DOI] - Manfred Broy and Alexander Pretschner and Christian Salzmann and Thomas Stauner.
Software intensive systems in the automotive domain: challenges for research and education.
In SAE world congress. SAE, 2006.
[Download BibTeX (TXT, 385 Bytes)] - Achim D. Brucker and Jürgen Doser and Burkhart Wolff.
An MDA Framework Supporting OCL.
In 6th OCL Workshop at the UML/MoDELS Conference., 2006.
[Download abstract (TXT, 632 Bytes) | Download BibTeX (TXT, 910 Bytes) | Download PDF (PDF, 533 KB)]
- Achim D. Brucker and Jürgen Doser and Burkhart Wolff.
Semantic Issues of OCL: Past, Present, and Future.
In 6th OCL Workshop at the UML/MoDELS Conference., 2006.
[Download abstract (TXT, 893 Bytes) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 281 KB)]
- Achim D. Brucker and Jürgen Doser and Burkhart Wolff.
A Model Transformation Semantics and Analysis Methodology for SecureUML.
In MoDELS 2006: Model Driven Engineering Languages and Systems. LNCS 4199 Springer-Verlag, 2006.
An extended version of this paper is available as ETH Technical Report, no. 524.
[Download abstract (TXT, 769 Bytes) | Download BibTeX (TXT, 1 KB) | external page DOI] - Achim D. Brucker and Burkhart Wolff.
A Package for Extensible Object-Oriented Data Models with an Application to IMP++.
In International Workshop on Software Verification and Validation (SVV 2006). Computing Research Repository (CoRR) 2006.
[Download abstract (TXT, 844 Bytes) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 259 KB) | Download gzip'ed Postscript (GZ, 245 KB)] - Achim D. Brucker and Burkhart Wolff.
The HOL-OCL Book.
ETH Zürich, Technical Report 525, 2006.
[Download abstract (TXT, 968 Bytes) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 3.5 MB)]
- Carlos Caleiro and Luca Viganò and David Basin.
On the Semantics of Alice&Bob Specifications of Security Protocols.
In Theoretical Computer Science, 367 (1-2), pages 88-122, 2006.
[Download BibTeX (BIB, 2 KB)] - S.-K. Chen and H. Lei and M. Wahler and H. Chang and K. Bhaskaran and J. Frank.
A model driven XML transformation framework for Business Performance Management model creation.
In International Journal of Electronic Business, 4 (3/4), pages 281-301, 2006.
[Download abstract (TXT, 897 Bytes) | Download BibTeX (TXT, 1 KB) | external page DOI] - C. Dax and M. Hofmann and M. Lange.
A Proof System for the Linear Time mu-Calculus.
In FSTTCS 2006., 4337. Springer, 2006.
[Download BibTeX (TXT, 357 Bytes) | external page DOI] - Paul Hankes Drielsma and Sebastian Mödersheim and Luca Viganò and David Basin.
Formalizing and Analyzing Sender Invariance.
ETH Zurich, Technical Report 528, 2006.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 224 KB) | Download gzip'ed Postscript (GZ, 203 KB) | URL] - Jochen Eisinger and Felix Klaedtke.
Don't Care Words with an Application to the Automata-based Approach for Real Addition.
In 18th International Conference on Computer Aided Verification (CAV)., 2006. LNCS 4144.
[Download BibTeX (TXT, 464 Bytes) | Download PDF (PDF, 278 KB) | external page DOI] - S. Gauch and M. Speretta and A. Pretschner.
Ontology-Based User Profiles for Personalized Search.
Springer, 2006.
[Download BibTeX (TXT, 409 Bytes) | external page DOI] - Christopher Giblin and Samuel Müller and Birgit Pfitzmann.
From Regulatory Policies to Event Monitoring Rules: Towards Model-Driven Compliance Automation.
IBM Research, Technical Report RZ 3662, 2006.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 1 KB)] - M. Hilty and A. Pretschner and C. Schaefer and T. Walter.
Enforcement for Usage Control-An overview of Control Mechanisms.
DoCoMo Euro-Labs, Technical Report I-ST-018, 2006.
[Download BibTeX (TXT, 337 Bytes)] - M. Hilty and A. Pretschner and C. Schaefer and T. Walter.
Usage Control Requirements in Mobile and Ubiquitous Computing Applications.
In International Conference on Systems and Networks Communications.IEEE, 2006.
Best paper award.
[Download BibTeX (TXT, 429 Bytes) | external page DOI] - Jana Koehler and Rainer Hauser and Jochen Küster and Ksenia Ryndina and Jussi Vanhatalo and Michael Wahler.
The Role of Visual Modeling and Model Transformations in Business-driven Development.
In Fifth International Workshop on Graph Transformation and Visual Modeling Techniques., 2006.
[Download BibTeX (TXT, 608 Bytes)]
- Boris Köpf and David Basin.
Timing-Sensitive Information Flow Analysis for Synchronous Systems.
ETH Zurich, Technical Report 526, 2006.
[Download BibTeX (TXT, 352 Bytes) | Download PDF (PDF, 284 KB) | Download gzip'ed Postscript (GZ, 163 KB) | URL] - Boris Köpf and David Basin.
Timing-Sensitive Information Flow Analysis for Synchronous Systems.
In ESORICS '06.LNCS, 4189. Springer Verlag, 2006.
[Download BibTeX (TXT, 479 Bytes) | Download PDF (PDF, 267 KB) | Download gzip'ed Postscript (GZ, 115 KB) | external page DOI] - J. M. Küster and J. Koehler and R. Hauser and K. Ryndina and J. Vanhatalo and M. Wahler.
Methodology and Tooling to Combine an Existing Legacy Business Process Model with Best-Practice Industry Reference Models for Business Transformation.
IBM Research technical report RZ 3663, 2006.
[Download BibTeX (TXT, 491 Bytes) | Download PDF (PDF, 796 KB)]
- Alice Y. Liu and Samuel Müller and Ke Xu.
A Static Compliance Checking Framework for Business Process Models.
IBM Research, Technical Report RZ 3679, 2006.
[Download BibTeX (TXT, 2 KB)] - Sebastian Mödersheim.
On the Relationships between Models in Protocol Verification (Extended Version).
Infsec, ETH Zuerich, Technical Report 512, 2006.
[Download abstract (TXT, 1001 Bytes) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 339 KB) | URL] - Samuel Müller.
A Dependability Perspective On Enterprise Compliance.
IBM Research, Technical Report RZ 3667, 2006.
[Download abstract (TXT, 803 Bytes) | Download BibTeX (TXT, 1 KB)] - Samuel Müller and Birgit Pfitzmann.
Effektives Compliance Management.
In digma - Zeitschrift für Datenrecht und Informationssicherheit, 6 (1), pages 36-39, 2006.
Schulthess Juristische Medien AG, Zürich
[Download BibTeX (TXT, 387 Bytes)] - Samuel Müller and Birgit Pfitzmann.
Compliance Management basierend auf Gesetzesformalisierungen - Das REALM-Projekt.
In Tagungsband des 9. Internationalen Rechtsinformatik Symposions (IRIS 2006)., 2006.
Richard Boorberg Verlag GmbH
[Download BibTeX (TXT, 477 Bytes)] - Samuel Müller and Chonawee Supatgiat.
Dynamic and Risk-based Compliance Management.
IBM Research, Technical Report RZ 3656, 2006.
[Download abstract (TXT, 2 KB) | Download BibTeX (TXT, 2 KB)] - Rolf Oppliger and Ralf Hauser and David Basin.
Browser Enhancements to Support SSL/TLS Session-Aware User Authentication.
In W3C Workshop on Transparency and Usability of Web Authentication.Proceedings of the World Wide Web Consortium (W3C), 2006.
[Download BibTeX (TXT, 654 Bytes) | Download PDF (PDF, 97 KB) | external page Ⓒ W3C] - Rolf Oppliger and Ralf Hauser and David Basin.
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle.
In Computer Communications, 29, pages 2238-2246, 2006.
[Download BibTeX (TXT, 5 KB)] - Alexander Pretschner.
Zur Kosteneffektivitaet des modellbasierten Testens.
In Dagstuhl Workshop Modellbasierte Entwicklung eingebetteter Systeme. Technische Universitaet Braunschweig, 2006.
[Download BibTeX (TXT, 382 Bytes)] - Alexander Pretschner and Manuel Hilty and David Basin.
Distributed Usage Control.
In Communications of the ACM, 49 (9), pages 39-44, 2006.
This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Communications of the ACM 49(9):39-44, September 2006)
[Download BibTeX (TXT, 602 Bytes) | ACM] - Alexander Pretschner and Wolfgang Prenninger.
Computing Refactorings of State Machines.
In J. Software Systems Modeling, 2006.
[Download BibTeX (TXT, 289 Bytes)] - M. Rappl and A. Pretschner and C. Salzmann and T. Stauner.
3rd International Workshop on Software Engineering for Automotive Systems - SEAS 2006.
In 28th Intl. Conf. on Software Engineering (ICSE'06).
ACM, 2006.
[Download BibTeX (TXT, 389 Bytes) | external page ACM] - Paul E. Sevinç and David Basin.
Controlling Access to Documents: A Formal Access Control Model.
ETH Zurich, Technical Report 517, 2006.
[Download abstract (TXT, 541 Bytes) | Download BibTeX (TXT, 952 Bytes) | Download PDF (PDF, 447 KB) | URL] - Paul E. Sevinç and David Basin and Ernst-Rüdiger Olderog.
Controlling Access to Documents: A Formal Access Control Model.
In ETRICS 2006.LNCS, 3995. Springer-Verlag, 2006.
[Download BibTeX (TXT, 496 Bytes) | external page DOI] - Christoph Sprenger and Michael Backes and David Basin and Birgit Pfitzmann and Michael Waidner.
Cryptographically Sound Theorem Proving.
In 19th IEEE Computer Security Foundations Workshop, Venice, Italy.IEEE Computer Society, 2006.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 145 KB) | external page DOI] - Christoph Sprenger and Michael Backes and David Basin and Birgit Pfitzmann and Michael Waidner.
Cryptographically Sound Theorem Proving.
Cryptology ePrint Archive, Technical Report 2006/047, 2006.
[Download BibTeX (TXT, 420 Bytes) | external page URL] - M. Utting and A. Pretschner and B. Legeard.
A taxonomy of model-based testing.
Department of Computer Science, The Universiy of Waikato (New Zealand), Technical Report 04/2006, 2006.
[Download BibTeX (TXT, 406 Bytes) | Download PDF (PDF, 206 KB)] - Luca Viganò.
Automated Security Protocol Analysis With the AVISPA Tool.
In Electronic Notes in Theoretical Computer Science
Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics, MFPS XXI, 155, pages 61-86, 2006.
[Download BibTeX (TXT, 468 Bytes) | external page DOI] - Michael Wahler and Jana Koehler and Achim D. Brucker.
Model-Driven Constraint Engineering.
In Workshop on OCL for (Meta-)Models in Multiple Application Domains at the UML/MoDELS Conference., 2006.
[Download abstract (TXT, 888 Bytes) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 5.8 MB) | external page URL] - Alessandro Armando and David Basin and Jorge Cuellar and Michaël Rusinowitch and Luca Viganò.
Automated Reasoning for Security Protocol Analysis
Special Issue of the Journal of Automated Reasoning, volume 36, numbers 1 and 2, doi 10.1007/s10817-005-9014-x
In Springer Netherlands, 2006.
[Download BibTeX (TXT, 421 Bytes)] - Pierpaolo Degano and Luca Viganò.
Special Issue of Theoretical Computer Science on Automated Reasoning for Security Protocol Analysis
volume 367, numbers 1 and 2, doi 10.1016/j.tcs.2006.08.031
In Elsevier Science, 2006.
[Download BibTeX (TXT, 345 Bytes) | external page DOI] - Pierpaolo Degano and Luca Viganò.
Special Issue of the International Journal of Information Security on Automated Reasoning for Security Protocol Analysis.
In Springer, 2006.
In print
[Download BibTeX (TXT, 353 Bytes)] - Manuel Núñez García and Klaus Havelund and Grigore Rosu and Burkhart Wolff. Proceedings of the International Workshop on Formal Aspects of Testing and Runtime Verification (FATES/RV).
In Springer Verlag, 2006.
LNCS 4262.
[Download abstract (TXT, 537 Bytes) | Download BibTeX (TXT, 883 Bytes) | external page DOI] - M. Rappl and A. Pretschner and C. Salzmann and T. Stauner.
Proceedings of the 2006 international workshop on Software engineering for automotive systems.
In ACM, 2006.
ISBN:1-59593-402-2
[Download BibTeX (TXT, 364 Bytes) | external page DOI]