Publications 2009
- David Basin and Samuel Burri and Guenter Karjoth.
Dynamic Enforcement of Abstract Separation of Duty Constraints.
In 14th European Symposium on Research in Computer Security (ESORICS).5789, 5789. Springer-Verlag, 2009.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 331 KB) | external page DOI] - David Basin and Carlos Caliero and Jaime Ramos and Luca Vigano.
Labelled Tableaux for Distributed Temporal Logic.
In Journal of Logic and Computation, 19 (6), pages 1245-1279, 2009.
[Download BibTeX (TXT, 456 Bytes) | external page DOI] - David Basin and Srdjan Capkun and Patrick Schaller and Benedikt Schmidt.
Let's Get Physical: Models and Methods for Real-World Security Protocols.
In Theorem Proving in Higher Order Logics (TPHOLs 2009). LNCS, 5674. Springer, 2009. Invited talk.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | external page DOI] - David Basin and Manuel Clavel and Jürgen Doser and Marina Egea.
Automated analysis of security-design models.
In Information and Software Technology, 51 (5), pages 815-831, 2009.
[Download BibTeX (TXT, 394 Bytes) | Download PDF (PDF, 974 KB) | external page DOI] - Patrik Bichsel and Samuel Müller and Franz-Stefan Preiss and Dieter Sommer and Mario Verdicchio.
Security and Trust through Electronic Social Network-based Interactions.
In Workshop on Security and Privacy in Online Social Networking (SPOSN '09). IEEE Computer Society Press, 2009.
[Download BibTeX (TXT, 459 Bytes)] - Achim D. Brucker and Burkhart Wolff.
Semantics, Calculi, and Analysis for Object-Oriented Specifications.
In Acta Informatica, 46 (4), pages 255-284, 2009.
[Download abstract (TXT, 848 Bytes) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 377 KB) | external page DOI] - Cas J.F. Cremers.
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange.
2009
[Download BibTeX (TXT, 330 Bytes) | external page URL] - Cas J.F. Cremers.
Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS key exchange protocol.
In ACNS'09. LNCS, 5536. Springer, 2009.
[Download BibTeX (TXT, 401 Bytes) | external page DOI] - Cas Cremers and David Basin.
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries.
2009
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 1 KB) | external page URL] - Cas J.F. Cremers and Pascal Lafourcade and Philippe Nadeau.
Comparing State Spaces in Automatic Security Protocol Analysis.
Springer, 2009.
[Download BibTeX (TXT, 599 Bytes) | external page DOI] - M. Torabi Dashti.
Optimistic fair exchange using trusted devices.
ETH Zurich, Technical Report 635, 2009.
[Download BibTeX (TXT, 376 Bytes) | Download PDF (PDF, 150 KB) | URL] - Mohammad Torabi Dashti.
Optimistic Fair Exchange Using Trusted Devices.
In Stabilization, Safety, and Security of Distributed Systems. LNCS, 5873. Springer, 2009.
[BibTeX | external page DOI] - Christian Dax and Felix Klaedtke and Martin Lange.
On Regular Temporal Logics with Past.
In 36th International Colloquium on Automata, Languages, and Programming (ICALP'09). Lecture Notes in Computer Science, 5556. Springer-Verlag, 2009.
[Download BibTeX (TXT, 481 Bytes) | external page DOI] - Christian Dax and Felix Klaedtke and Stefan Leue.
Specification Languages for Stutter-Invariant Regular Properties.
In 7th International Symposium on Automated Technology for Verification and Analysis (ATVA). Lecture Notes in Computer Science, 5799. Springer-Verlag, 2009.
[Download BibTeX (TXT, 498 Bytes) | external page DOI] - Mario Frank and Matthias Plaue and Holger Rapp and Ullrich Köthe and Bernd Jähne and Fred A. Hamprecht.
Theoretical and Experimental Error Analysis of Continuous-Wave Time-Of-Flight Range Cameras.
In Optical Engineering, 48 (1), 2009.
[Download abstract (TXT, 942 Bytes) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 2 MB) | external page DOI] - Mario Frank and Matthias Plaue and Fred A. Hamprecht.
Denoising of Continuous-Wave Time-Of-Flight Depth Images using Confidence Measures.
In Optical Engineering, 48 (7), 2009.
[Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 2.5 MB) | external page DOI] - Mario Frank and Andreas P. Streich and David Basin and Joachim M. Buhmann.
A Probabilistic Approach to Hybrid Role Mining.
In 16th ACM Conference on Computer and Communications Security (CCS 2009). ACM, 2009.
[Download BibTeX (TXT, 2 KB)] - Stefan Hallerstede and Thai Son Hoang.
Qualitative Reasoning for the Dining Philosophers.
2009, Dagstuhl Seminar 09381
[Download BibTeX (TXT, 351 Bytes) | external page URL] - Matus Harvan and Alexander Pretschner.
State-based Usage Control Enforcement with Data Flow Tracking using System Call Interposition.
In 3rd International Conference on Network & System Security. IEEE, 2009.
[Download BibTeX] - Thai Son Hoang.
Event-B Decomposition for Parallel Programs.
2009, Dagstuhl Seminar 09318
[Download BibTeX (TXT, 309 Bytes) | external page URL] - Thai Son Hoang and Jean-Raymond Abrial.
Event-B Development of the FindP Program.
Department of Computer Science, ETH Zurich, Technical Report 653, 2009.
[Download abstract (TXT, 719 Bytes) | Download BibTeX (TXT, 969 Bytes) | URL] - Thai Son Hoang and David Basin and Jean-Raymond Abrial.
Specifying Access Control in Event-B.
Department of Computer Science, ETH Zurich, Technical Report 624, 2009.
[Download abstract (TXT, 704 Bytes) | Download BibTeX (TXT, 955 Bytes) | URL] - Thai Son Hoang and Andreas Fürst and Jean-Raymond Abrial.
Event-B Patterns and Their Tool Support.
In SEFM 2009. IEEE Computer Society Press, 2009.
[Download BibTeX (TXT, 370 Bytes)] - Thai Son Hoang and Hironobu Kuruma and David A. Basin and Jean-Raymond Abrial.
Developing Topology Discovery in Event-B.
In 7th International Conference on Integrated Formal Methods (IFM). LNCS, 5423. Springer, 2009.
[Download BibTeX (TXT, 556 Bytes) | Download PDF (PDF, 390 KB) | external page DOI] - Thai Son Hoang and Hironobu Kuruma and David Basin and Jean-Raymond Abrial.
Developing Topology Discovery in Event-B.
In Science of Computer Programming, 74 (11-12), pages 879-899, 2009.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | external page DOI] - S. Mauw and S. Radomirovic and M. Torabi Dashti.
Minimal message complexity of asynchronous multi-party contract signing.
In CSF. IEEE CS, 2009.
[Download BibTeX (TXT, 334 Bytes) | external page DOI] - Bruno Montalto and Carlos Caleiro.
Modeling and Reasoning About an Attacker with Cryptanalytical Capabilities.
2009.
[Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 268 KB)] - Samuel Müller.
Theory and Applications of Runtime Monitoring Metric First-order Temporal Logic.
ETH Zurich,2009. DISS. ETH No. 18445
[Download BibTeX (TXT, 288 Bytes) | Download PDF (PDF, 2.7 MB) | URL] - Alexander Pretschner and Matthias Büchler and Matus Harvan and Christian Schaefer and Thomas Walter.
Usage Control Enforcement with Data Flow Tracking for X11 .
In 5th International Workshop on Security and Trust Management (STM 2009)., 2009.
[Download abstract (TXT, 887 Bytes) | Download BibTeX (TXT, 1 KB)] - Patrick Schaller and Benedikt Schmidt and David Basin and Srdjan Capkun.
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks.
In 22nd IEEE Computer Security Foundations Symposium., 2009.
[Download abstract (TXT, 898 Bytes) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 276 KB)] - Michael Schläpfer and Marina Egea and David Basin and Manuel Clavel.
Automatic Generation of Security-Aware GUI Models.
In European Workshop on Security in Model Driven Architecture 2009 (SECMDA 2009).,
[Download abstract (TXT, 898 Bytes) | Download BibTeX (TXT, 1 KB)] - Matthias Schmalz and Daniele Varacca and Hagen Völzer.
Counterexamples in Probabilistic LTL Model Checking for Markov Chains.
In Concur 2009. LNCS, 5710. Springer, 2009.
[Download BibTeX (TXT, 480 Bytes) | external page DOI] - Andreas P. Streich and Mario Frank and David Basin and Joachim M. Buhmann.
Multi-Assignment Clustering for Boolean Data.
In Proceedings of the 26th International Conference on Machine Learning. ACM, 2009.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | external page DOI] - David A. Basin and Srdjan Capkun and Wenke Lee.
Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland March 16-19, 2009.
In ACM, 2009. Book Title: WiSec'09
[Download BibTeX (TXT, 391 Bytes) | Download cover (JPEG, 10 KB) | external page DOI]