Publications 2010
- Jean-Raymond Abrial and Michael Butler and Stefan
Hallerstede and Thai Son Hoang and Farhad Mehta and Laurent Voisin.
RODIN: An Open Toolset for Modelling and Reasoning in Event-B.
In STTT, 12 (6), 2010.
[Download BibTeX (TXT, 456 Bytes) | external page DOI] - B. Badban and M. Torabi Dashti.
Semi-linear Parikh images of regular expressions via reduction.
In MFCS.LNCS, 6281. Springer, 2010.
[Download BibTeX (TXT, 332 Bytes) | external page DOI] - David Basin and Manuel Clavel and Marina Egea and Michael Schläpfer.
Automatic Generation of Smart, Security-Aware GUI Models.
In International Symposium on Engineering Secure Software and Systems (ESSoS 2010). Springer-Verlag, 2010.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | external page DOI] - David Basin and Cas Cremers.
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries.
In 19th EACSL Annual Conference on Computer Science Logic (CSL).LNCS, 6247. Springer-Verlag, 2010.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 728 KB) | external page DOI] - David Basin and Cas Cremers.
Modeling and Analyzing Security in the Presence of Compromising Adversaries.
In Computer Security - ESORICS 2010.
[Download abstract (TXT, 907 Bytes) | Download BibTeX (TXT, 1 KB) | external page DOI] - David Basin and Felix Klaedtke and Samuel Müller.
Monitoring Security Policies with Metric First-order Temporal Logic.
In 15th ACM Symposium on Access Control Models and Technologies (SACMAT). ACM Press, 2010.
[Download BibTeX (TXT, 431 Bytes) | external page DOI] - David Basin and Felix Klaedtke and and Samuel Müller.
Policy Monitoring in First-Order Temporal Logic.
In 22nd International Conference, CAV 2010, Edinburgh, UK, July 15-19, 2010.LNCS, 6174/2010. Springer Berlin / Heidelberg, 2010.
[Download abstract (TXT, 666 Bytes) | Download BibTeX (TXT, 1 KB) | external page DOI] - Achim D. Brucker and Lukas Brügger and Paul Kearney and Burkhart Wolff.
Verified Firewall Policy Transformations for Test Case Generation.
In International Conference on Software Testing, Verification, and Validation (ICST10)., 2010.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 247 KB)] - Achim D. Brucker and Lukas Brügger and Matthias P. Krieger and Burkhart Wolff.
HOL-TestGen 1.5.0 User Guide.
ETH Zurich, Technical Report 670, 2010.
[Download BibTeX (TXT, 463 Bytes) | Download PDF (PDF, 1.1 MB) | URL] - Bruno Conchinha and David Basin and Carlos Caleiro.
Efficient Decision Procedures for Message Deducibility and Static Equivalence.
ETH Zurich, Technical Report 680, 2010.
[Download abstract (TXT, 1014 Bytes) | Download BibTeX (TXT, 1 KB) | URL] - Bruno Conchinha and David Basin and Carlos Caleiro.
Efficient Decision Procedures for Message Deducibility and Static Equivalence.
In Formal Aspects in Security and Trust (FAST '2010). LNCS, 6561. Springer Berlin / Heidelberg, 2010.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | external page DOI] - Cas J.F. Cremers.
Session-StateReveal is stronger than eCK's EphemeralKeyReveal: Using automatic analysis to attack the NAXOS protocol.
In International Journal of Applied Cryptography (IJACT), 2 (2), pages 83-99, 2010.
[Download BibTeX (TXT, 410 Bytes) | external page URL] - Mohammad Torabi Dashti.
Accountability in optimistic non-repudiation protocols.
ETH, Technical Report 701, 2010.
[Download BibTeX (TXT, 408 Bytes) | URL] - Mohammad Torabi Dashti and Sjouke Mauw.
Fair Exchange.
Chapman & Hall/CRC Cryptography and Network Security Series, 2010.
[Download BibTeX (TXT, 630 Bytes) | Download PDF (PDF, 1.1 MB) | external page DOI] - Christian Dax and Felix Klaedtke and Martin Lange.
On Regular Temporal Logics with Past.
In Acta Informatica, 47 (4), pages 251-277, 2010.
[Download BibTeX (TXT, 327 Bytes) | external page DOI] - Miguel A. García de Dios and Carolina Dania and Michael Schläpfer and David Basin and Manuel Clavel and Marina Egea.
SSG: a model-based development environment for smart, security-aware GUIs .
In ACM/IEEE 32nd International Conference on Software Engineering., 2. ACM, 2010.
[Download abstract (TXT, 542 Bytes) | Download BibTeX (TXT, 889 Bytes) | external page DOI] - W. Fokkink and M. Torabi Dashti and A. Wijs.
Partial order reduction for branching security protocols.
In Proceedings of Application of Concurrency to System Design (ACSD 2010). IEEE CS, 2010.
[Download BibTeX (TXT, 291 Bytes) | external page DOI] - Mario Frank and Joachim M. Buhmann and David Basin.
On the Definition of Role Mining.
In SACMAT '10: Proceeding of the 15th ACM symposium on Access control models and technologies. ACM, 2010.
[Download abstract (TXT, 756 Bytes) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 228 KB) | external page DOI] - Simone Frau and Mohammad Torabi Dashti.
Integrated Specification and Verification of Security Protocols and Policies.
ETH, Technical Report 702, 2010.
[Download BibTeX (TXT, 447 Bytes) | URL] - Thai Son Hoang.
How to interpret Failed Proofs in Event-B.
ETH, Technical Report 672, 2010.
[Download abstract (TXT, 721 Bytes) | Download BibTeX (TXT, 1 KB) | URL] - Thai Son Hoang and Jean-Raymond Abrial.
Event-B Decomposition for Parallel Programs.
In Abstract State Machines, Alloy, B and Z (ABZ2010). LNCS, 5977. Springer, 2010.
[Download abstract (TXT, 713 Bytes) | Download BibTeX (TXT, 1 KB) | external page DOI] - Felix Klaedtke.
Ehrenfeucht-Fraisse Goes Automatic for Real Addition.
In Information and Computation, 208 (11), pages 1283-1295, 2010.
[Download BibTeX (TXT, 315 Bytes) | external page DOI] - Shin’ichiro Matsuo and Kunihiko Miyazaki and Akira Otsuka and David Basin.
How to Evaluate the Security of Real-life Cryptographic Protocols? The cases of ISO/IEC 29128 and CRYPTREC.
In FC 2010 Workshops, RLCPS, WECSR, and WLC 2010.LNCS, 6054. Springer, 2010. Booktitle: Financial Cryptography and Data Security
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | external page DOI] - Simon Meier and Cas Cremers and David Basin.
Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs.
In CSF 2010.IEEE Computer Society, 2010.
[Download BibTeX (TXT, 467 Bytes) | Download PDF (PDF, 245 KB) | external page DOI] - Sebastian Mödersheim and Luca Viganò and David A. Basin.
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols.
In Journal of Computer Security, 18 (4), pages 575-618, 2010.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | external page URL] - Christina Pöpper and Srdjan Capkun and David Basin and Cas J.F. Cremers.
Keeping Data Secret under Full Compromise using Porter Devices.
In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC 2010).
ACM, 2010.
[Download BibTeX (TXT, 1 KB) | external page DOI] - Benedikt Schmidt and Patrick Schaller and David Basin.
Impossibility Results for Secret Establishment.
In 23nd IEEE Computer Security Foundations Symposium (CSF 2010).IEEE Computer Society, 2010.
[Download abstract (TXT, 1 KB) | Download BibTeX (TXT, 2 KB) | Download PDF (PDF, 253 KB) | external page DOI] - Renato Silva and Carine Pascal and Thai Son Hoang and Michael Butler.
Decomposition Tool: Development and Usage.
University of Dusseldorf, Germany, 2010. In Proceedings of the Rodin User and Developer Workshop
[Download BibTeX (TXT, 397 Bytes) | external page URL] - Renato Alexandre Silva and Carine Pascal and Thai Son Hoang and Michael Butler.
Decomposition Tool for Event-B.
In Proceedings of the Workshop on Tool Building in Formal Methods - ABZ Conference, Orford, Canada, 2010
[Download BibTeX (TXT, 388 Bytes)] - Christoph Sprenger and David Basin.
Developing Security Protocols by Refinement.
In 7th ACM Conference on Computer and Communications Security (CCS 2010). ACM, 2010.
[Download abstract (TXT, 984 Bytes) | Download BibTeX (TXT, 1 KB) | Download PDF (PDF, 403 KB)] - Michael Wahler and David Basin and Achim D. Brucker and Jana Koehler.
Efficient Analysis of Pattern-Based Constraint Specifications.
In Software and Systems Modeling, 9 (2), pages 225-255, 2010.
[Download BibTeX (TXT, 620 Bytes) | Download PDF (PDF, 867 KB) | external page DOI] - Emre Yilmaz and Thai Son Hoang.
Development of Rabin's Choice Coordination Algorithm in Event-B.
In Electronic Communications of the EASST, 35, 2010.
[Download BibTeX (TXT, 496 Bytes) | external page DOI] - Dengguo Feng and David Basin and Peng Liu.
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security.
In ACM, Inc., 2010.
Number of Pages: 363; ISBN:978-1-60558-936-7
[Download BibTeX (TXT, 568 Bytes) | Download cover (JPEG, 8 KB) | external page DOI]