Publications 2010
- Jean-Raymond Abrial and Michael Butler and Stefan
Hallerstede and Thai Son Hoang and Farhad Mehta and Laurent Voisin.
RODIN: An Open Toolset for Modelling and Reasoning in Event-B.
In STTT, 12 (6), 2010.
[DownloadBibTeX (TXT, 456 Bytes)vertical_align_bottom | external pageDOIcall_made] - B. Badban and M. Torabi Dashti.
Semi-linear Parikh images of regular expressions via reduction.
In MFCS.LNCS, 6281. Springer, 2010.
[DownloadBibTeX (TXT, 332 Bytes)vertical_align_bottom | external pageDOIcall_made] - David Basin and Manuel Clavel and Marina Egea and Michael Schläpfer.
Automatic Generation of Smart, Security-Aware GUI Models.
In International Symposium on Engineering Secure Software and Systems (ESSoS 2010). Springer-Verlag, 2010.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Cas Cremers.
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries.
In 19th EACSL Annual Conference on Computer Science Logic (CSL).LNCS, 6247. Springer-Verlag, 2010.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 728 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Cas Cremers.
Modeling and Analyzing Security in the Presence of Compromising Adversaries.
In Computer Security - ESORICS 2010.
[Downloadabstract (TXT, 907 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Felix Klaedtke and Samuel Müller.
Monitoring Security Policies with Metric First-order Temporal Logic.
In 15th ACM Symposium on Access Control Models and Technologies (SACMAT). ACM Press, 2010.
[DownloadBibTeX (TXT, 431 Bytes)vertical_align_bottom | external pageDOIcall_made] - David Basin and Felix Klaedtke and and Samuel Müller.
Policy Monitoring in First-Order Temporal Logic.
In 22nd International Conference, CAV 2010, Edinburgh, UK, July 15-19, 2010.LNCS, 6174/2010. Springer Berlin / Heidelberg, 2010.
[Downloadabstract (TXT, 666 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | external pageDOIcall_made] - Achim D. Brucker and Lukas Brügger and Paul Kearney and Burkhart Wolff.
Verified Firewall Policy Transformations for Test Case Generation.
In International Conference on Software Testing, Verification, and Validation (ICST10)., 2010.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 247 KB)vertical_align_bottom] - Achim D. Brucker and Lukas Brügger and Matthias P. Krieger and Burkhart Wolff.
HOL-TestGen 1.5.0 User Guide.
ETH Zurich, Technical Report 670, 2010.
[DownloadBibTeX (TXT, 463 Bytes)vertical_align_bottom | DownloadPDF (PDF, 1.1 MB)vertical_align_bottom | URL] - Bruno Conchinha and David Basin and Carlos Caleiro.
Efficient Decision Procedures for Message Deducibility and Static Equivalence.
ETH Zurich, Technical Report 680, 2010.
[Downloadabstract (TXT, 1014 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | URL] - Bruno Conchinha and David Basin and Carlos Caleiro.
Efficient Decision Procedures for Message Deducibility and Static Equivalence.
In Formal Aspects in Security and Trust (FAST '2010). LNCS, 6561. Springer Berlin / Heidelberg, 2010.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | external pageDOIcall_made] - Cas J.F. Cremers.
Session-StateReveal is stronger than eCK's EphemeralKeyReveal: Using automatic analysis to attack the NAXOS protocol.
In International Journal of Applied Cryptography (IJACT), 2 (2), pages 83-99, 2010.
[DownloadBibTeX (TXT, 410 Bytes)vertical_align_bottom | external pageURLcall_made] - Mohammad Torabi Dashti.
Accountability in optimistic non-repudiation protocols.
ETH, Technical Report 701, 2010.
[DownloadBibTeX (TXT, 408 Bytes)vertical_align_bottom | URL] - Mohammad Torabi Dashti and Sjouke Mauw.
Fair Exchange.
Chapman & Hall/CRC Cryptography and Network Security Series, 2010.
[DownloadBibTeX (TXT, 630 Bytes)vertical_align_bottom | DownloadPDF (PDF, 1.1 MB)vertical_align_bottom | external pageDOIcall_made] - Christian Dax and Felix Klaedtke and Martin Lange.
On Regular Temporal Logics with Past.
In Acta Informatica, 47 (4), pages 251-277, 2010.
[DownloadBibTeX (TXT, 327 Bytes)vertical_align_bottom | external pageDOIcall_made] - Miguel A. García de Dios and Carolina Dania and Michael Schläpfer and David Basin and Manuel Clavel and Marina Egea.
SSG: a model-based development environment for smart, security-aware GUIs .
In ACM/IEEE 32nd International Conference on Software Engineering., 2. ACM, 2010.
[Downloadabstract (TXT, 542 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 889 Bytes)vertical_align_bottom | external pageDOIcall_made] - W. Fokkink and M. Torabi Dashti and A. Wijs.
Partial order reduction for branching security protocols.
In Proceedings of Application of Concurrency to System Design (ACSD 2010). IEEE CS, 2010.
[DownloadBibTeX (TXT, 291 Bytes)vertical_align_bottom | external pageDOIcall_made] - Mario Frank and Joachim M. Buhmann and David Basin.
On the Definition of Role Mining.
In SACMAT '10: Proceeding of the 15th ACM symposium on Access control models and technologies. ACM, 2010.
[Downloadabstract (TXT, 756 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 228 KB)vertical_align_bottom | external pageDOIcall_made] - Simone Frau and Mohammad Torabi Dashti.
Integrated Specification and Verification of Security Protocols and Policies.
ETH, Technical Report 702, 2010.
[DownloadBibTeX (TXT, 447 Bytes)vertical_align_bottom | URL] - Thai Son Hoang.
How to interpret Failed Proofs in Event-B.
ETH, Technical Report 672, 2010.
[Downloadabstract (TXT, 721 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | URL] - Thai Son Hoang and Jean-Raymond Abrial.
Event-B Decomposition for Parallel Programs.
In Abstract State Machines, Alloy, B and Z (ABZ2010). LNCS, 5977. Springer, 2010.
[Downloadabstract (TXT, 713 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | external pageDOIcall_made] - Felix Klaedtke.
Ehrenfeucht-Fraisse Goes Automatic for Real Addition.
In Information and Computation, 208 (11), pages 1283-1295, 2010.
[DownloadBibTeX (TXT, 315 Bytes)vertical_align_bottom | external pageDOIcall_made] - Shin’ichiro Matsuo and Kunihiko Miyazaki and Akira Otsuka and David Basin.
How to Evaluate the Security of Real-life Cryptographic Protocols? The cases of ISO/IEC 29128 and CRYPTREC.
In FC 2010 Workshops, RLCPS, WECSR, and WLC 2010.LNCS, 6054. Springer, 2010. Booktitle: Financial Cryptography and Data Security
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | external pageDOIcall_made] - Simon Meier and Cas Cremers and David Basin.
Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs.
In CSF 2010.IEEE Computer Society, 2010.
[DownloadBibTeX (TXT, 467 Bytes)vertical_align_bottom | DownloadPDF (PDF, 245 KB)vertical_align_bottom | external pageDOIcall_made] - Sebastian Mödersheim and Luca Viganò and David A. Basin.
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols.
In Journal of Computer Security, 18 (4), pages 575-618, 2010.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | external pageURLcall_made] - Christina Pöpper and Srdjan Capkun and David Basin and Cas J.F. Cremers.
Keeping Data Secret under Full Compromise using Porter Devices.
In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC 2010).
ACM, 2010.
[DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | external pageDOIcall_made] - Benedikt Schmidt and Patrick Schaller and David Basin.
Impossibility Results for Secret Establishment.
In 23nd IEEE Computer Security Foundations Symposium (CSF 2010).IEEE Computer Society, 2010.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 253 KB)vertical_align_bottom | external pageDOIcall_made] - Renato Silva and Carine Pascal and Thai Son Hoang and Michael Butler.
Decomposition Tool: Development and Usage.
University of Dusseldorf, Germany, 2010. In Proceedings of the Rodin User and Developer Workshop
[DownloadBibTeX (TXT, 397 Bytes)vertical_align_bottom | external pageURLcall_made] - Renato Alexandre Silva and Carine Pascal and Thai Son Hoang and Michael Butler.
Decomposition Tool for Event-B.
In Proceedings of the Workshop on Tool Building in Formal Methods - ABZ Conference, Orford, Canada, 2010
[DownloadBibTeX (TXT, 388 Bytes)vertical_align_bottom] - Christoph Sprenger and David Basin.
Developing Security Protocols by Refinement.
In 7th ACM Conference on Computer and Communications Security (CCS 2010). ACM, 2010.
[Downloadabstract (TXT, 984 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 403 KB)vertical_align_bottom] - Michael Wahler and David Basin and Achim D. Brucker and Jana Koehler.
Efficient Analysis of Pattern-Based Constraint Specifications.
In Software and Systems Modeling, 9 (2), pages 225-255, 2010.
[DownloadBibTeX (TXT, 620 Bytes)vertical_align_bottom | DownloadPDF (PDF, 867 KB)vertical_align_bottom | external pageDOIcall_made] - Emre Yilmaz and Thai Son Hoang.
Development of Rabin's Choice Coordination Algorithm in Event-B.
In Electronic Communications of the EASST, 35, 2010.
[DownloadBibTeX (TXT, 496 Bytes)vertical_align_bottom | external pageDOIcall_made] - Dengguo Feng and David Basin and Peng Liu.
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security.
In ACM, Inc., 2010.
Number of Pages: 363; ISBN:978-1-60558-936-7
[DownloadBibTeX (TXT, 568 Bytes)vertical_align_bottom | Downloadcover (JPEG, 8 KB)vertical_align_bottom | external pageDOIcall_made]