Publications 2011
- Mahdi Asadpour and Mohammad Torabi Dashti.
A Privacy-friendly RFID protocol using reusable anonymous tickets.
In IEEE TrustCom '11.IEEE, 2011.
[DownloadBibTeX (TXT, 465 Bytes)vertical_align_bottom | external pageDOIcall_made] - David Basin and Samuel J. Burri and Guenter Karjoth.
Obstruction-free Authorization Enforcement: Aligning Security and Business Objectives.
In 24th Computer Security Foundations Symposium (CSF 2011).
IEEE, 2011.
[DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 600 KB)vertical_align_bottom | external pageDOIcall_made]
- David Basin and Samuel J. Burri and Guenter Karjoth.
Separation of Duties as a Service.
In ACM Symposium on Information, Computer and Communications Security (ASIACCS '11'). ACM, 2011.
[DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 582 KB)vertical_align_bottom] - David Basin and Carlos Caleiro and Jaime Ramos and Luca Viganò.
Distributed temporal logic for the analysis of security protocol models.
In Theoretical Computer Science, 412 (31), pages 4007-4043, 2011.
[DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 1.4 MB)vertical_align_bottom | external pageDOIcall_made]
- David Basin and Srdjan Capkun and Patrick Schaller and Benedikt Schmidt.
Formal Reasoning about Physical Properties of Security Protocols.
In ACM Transactions on Information and System Security, 14 (2), pages 16:1-16:29, 2011.
[DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 530 KB)vertical_align_bottom | external pageDOIcall_made] - David A. Basin and Manuel Clavel and Marina Egea.
A decade of model-driven security.
In Proceedings of the 16th ACM symposium on Access control models and technologies (SACMAT 2011)., 1998443. New York, NY, USA, 2011.
[DownloadBibTeX (TXT, 584 Bytes)vertical_align_bottom | DownloadPDF (PDF, 375 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Manuel Clavel and Marina Egea and Miguel Garcia de Dios and Carolina Dania and Gonzalo Ortiz and Javier Valdazo.
Model-Driven Development of Security-Aware GUIs for Data-Centric Applications.
Springer Berlin / Heidelberg, 2011.
[DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 536 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Cas Cremers.
Evaluation of ISO/IEC 9798 Protocols.
CRYPTREC, 2011.
Version 2.0
[DownloadBibTeX (TXT, 317 Bytes)vertical_align_bottom | DownloadPDF (PDF, 212 KB)vertical_align_bottom] - David Basin and Cas Cremers and Catherine Meadows.
Model Checking Security Protocols.
Springer, 2011.
[DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Matúvs Harvan and Felix Klaedtke and Eugen Zualinescu.
Monitoring Usage-control Policies in Distributed Systems.
In 18th International Symposium on Temporal Representation and Reasoning (TIME 2011).
IEEE Computer Society, 2011.
[DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Matúvs Harvan and Felix Klaedtke and Eugen Zalinescu.
MONPOLY: Monitoring Usage-control Policies.
In 2nd International Conference on Runtime Verification (RV 2011).
LNCS Volume 7186/2012, 2011.
[DownloadBibTeX (TXT, 372 Bytes)vertical_align_bottom | external pageDOIcall_made] - Achim D. Brucker and Lukas Brügger and Paul Kearney and Burkhart Wolff.
An Approach to Modular and Testable Security Models of Real-world Health-Care Applications.
In ACM symposium on access control models and technologies (SACMAT).
ACM Press, 2011.
[DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (TXT, 2 KB)vertical_align_bottom] - Joachim M. Buhmann and Morteza Haghir Chehreghani and Mario Frank and Andreas P. Streich.
Information Theoretic Model Selection for Pattern Analysis.
In ICML 2011 Workshop on Unsupervised and Transfer Learning., 2011.
[DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 305 KB)vertical_align_bottom] - Samuel J. Burri and Guenter Karjoth.
Flexible Scoping of Authorization Constraints on Workflows with Loops and Parallelism.
In 1st BPM Workshop on Workflow Security Audit and Certification (WfSAC '11).LNCSSpringer, 2011.
[DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 442 KB)vertical_align_bottom) - Jan Cederquist and Mohammad Torabi Dashti.
Complexity of fairness constraints for the Dolev-Yao attacker model.
In ACM Symposium On Applied Computing (SAC).SAC '11ACM, 2011.
[DownloadBibTeX (TXT, 626 Bytes)vertical_align_bottom | DownloadPDF (PDF, 626 KB)vertical_align_bottom | external pageDOIcall_made] - Jan Cederquist and Mohammad Torabi Dashti and Yanjing Wang.
Risk balance in optimistic non-repudiation protocols.
In Formal Aspects of Security & Trust (FAST 2011).
Springer, 2011.
[DownloadBibTeX (TXT, 350 Bytes)vertical_align_bottom] - Bruno Conchinha and David Basin and Carlos Caleiro.
FAST: An Efficient Decision Procedure for Deduction and Static Equivalence.
In 22nd International Conference on Rewriting Techniques and Applications, RTA 2011.
LIPIcs, 10. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2011.
[DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 540 KB)vertical_align_bottom | external pageURLcall_made) - Bruno Conchinha and David Basin and Carlos Caleiro.
Efficient Decision Procedures for Message Deducibility and Static Equivalence.
In 7th International Workshop on Formal Aspects of Security and Trust - FAST 2010.
Lecture Notes in Computer Science, 6561. Springer, 2011.
[DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 290 KB)vertical_align_bottom | external pageDOIcall_made] - Cas J.F. Cremers.
Key Exchange in IPsec revisited: Formal Analysis of IKEv1 and IKEv2.
In ESORICS 2011. LNCS Volume 6879/2011.
Springer Verlag, 2011.
[DownloadBibTeX (TXT, 584 Bytes)vertical_align_bottom | DownloadPDF (PDF, 302 KB)vertical_align_bottom | external pageDOIcall_made] - Cas J.F. Cremers.
Examining Indistinguishability-Based Security Models for Key Exchange Protocols: The case of CK, CK-HMQV, and eCK.
In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011).
ACM, 2011.
[DownloadBibTeX (TXT, 574 Bytes)vertical_align_bottom | DownloadPDF (PDF, 164 KB)vertical_align_bottom | external pageDOIcall_made] - Cas Cremers and Michele Feltz.
One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability.
Cryptology ePrint Archive, 2011.
Report 2011/300
[DownloadBibTeX (TXT, 380 Bytes)vertical_align_bottom | external pageURLcall_made] - Cas Cremers and Kasper Bonne Rasmussen and Srdjan Capkun.
Distance Hijacking Attacks on Distance Bounding Protocols.
Cryptology ePrint Archive, 2011.
Report 2011/129
[DownloadBibTeX (TXT, 380 Bytes)vertical_align_bottom | external pageURLcall_made] - Mohammad Torabi Dashti.
Faulhaber's Triangle.
In The College Mathematics Journal, 42 (2), 2011.
[DownloadBibTeX (TXT, 258 Bytes)vertical_align_bottom | external pageDOIcall_made] - Christian Dax and Felix Klaedtke.
Alternation Elimination for Automata over Nested Words.
In 14th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'11).
Lecture Notes in Computer Science, 6604. Springer, 2011.
[DownloadBibTeX (TXT, 501 Bytes)vertical_align_bottom | external pageDOIcall_made] - Mario Frank and Joachim M. Buhmann.
Selecting the rank of truncated SVD by Maximum Approximation Capacity.
In ISIT 2011: IEEE International Symposium on Information Theory.
IEEE, 2011.
[DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | external pageURLcall_made] - Mario Frank and Morteza and Haghir Chehreghani and Joachim M. Buhmann.
The Minimum Transfer Cost Principle for Model-Order Selection.
In ECML PKDD 2011: European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases.Springer, 2011.
[DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 1.8 MB)vertical_align_bottom | external pageDOIcall_made] - Simone Frau and Mohammad Torabi Dashti.
Integrated specification and verification of security protocols and policies.
In IEEE 24th Computer Security Foundations Symposium (CSF 2011).
IEEE Computer Society, 2011.
[DownloadBibTeX (TXT, 678 Bytes)vertical_align_bottom | external pageDOIcall_made] - Thai Son Hoang and Jean-Raymond Abrial.
Reasoning about Liveness Properties in Event-B.
In Formal Methods and Software Engineering (ICFEM).
LNCS, 6991. Springer, 2011.
[DownloadBibTeX (TXT, 497 Bytes)vertical_align_bottom | external pageDOIcall_made] - Michael Schläpfer and Rolf Haenni and Reto Koenig and Oliver Spycher.
Efficient Vote Authorization in Coercion-Resistant Internet Voting.
In 3rd International Conference on E-Voting and Identity (VoteID 2011).
Springer-Verlag, 2011.
[DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | external pageURLcall_made] - Michael Schläpfer and Oliver Spycher and Reto Koenig and Rolf Haenni.
A New Approach Towards Coercion-Resistant Remote E-Voting in Linear Time.
In 15th International Conference on Financial Cryptography and Data Security.
Springer-Verlag, 2011.
[DownloadBibTeX (TXT, 1 KB)vertical_align_bottom] - Renato Silva and Carine Pascal and Thai Son Hoang and Michael Butler.
Decomposition tool for Event-B.
In Softw. Pract. Exper., 41 (2), 2011.
[DownloadBibTeX (TXT, 411 Bytes)vertical_align_bottom | external pageWileycall_made] - Petar Tsankov and David Basin and Mohammad Torabi Dashti.
Constructing mid-points for two-party asynchronous protocols.
In OPODIS 2011.Springer, 2011.
[DownloadBibTeX (TXT, 326 Bytes)vertical_align_bottom] - Eugen Zalinescu.
Shorter strings containing all k-element permutations.
In Information Processing Letters, 111 (12), 2011.
[DownloadBibTeX (TXT, 341 Bytes)vertical_align_bottom | external pageDOIcall_made] - Matthias Schmalz.
Term Rewriting in Logics of Partial Functions.
In ICFEM, 2011.
[DownloadBibTeX (TXT, 792 Bytes)vertical_align_bottom | external pageDOIcall_made] - Simon Hudon and Thai Son Hoang.
Development of Control Systems Guided by Models of their Environment.
In Electronic Notes in Theoretical Computer Science, 280, pages 57-68, 2011.
[DownloadBibTeX (TXT, 480 Bytes)vertical_align_bottom | external pageDOIcall_made] - Christoph Sprenger and David Basin.
Refining Key Establishment
Computer Science Department, ETH Zurich, Technical Report 736, 2011.
[DownloadBibTeX (TXT, 371 Bytes)vertical_align_bottom | URL] - David Basin and Patrick Schaller and Michael Schläpfer
Applied Information Security: A Hands-on Approach.
Springer, 2011.
[DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | Downloadcover (JPEG, 6 KB)vertical_align_bottom | URL]