Publications 2012
- David Basin, Samuel J. Burri, and Günter Karjoth
Dynamic Enforcement of Abstract Separation of Duty Constraints
In Journal ACM Transactions on Information and System Security (TISSEC)
Pages 13:1--13:30, 2012.
[Download BibTex (TXT, 678 Bytes) | external page DOI] - Joel Reardon, Claudio Marforio, Srdjan Capkun, and David Basin
User-level Secure Deletion on Log-structured File Systems
In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Pages 63-64, 2012.
[Download BibTex (TXT, 659 Bytes) | external page DOI] - David Basin, Vincent Juge, Felix Klaedtke, Eugen Zalinescu
Enforceable Security Policies Revisited
In ACM Transactions on Information and System Security (TISSEC). to appear.
[Download BibTex (BIB, 318 Bytes) | Download PDF (PDF, 467 KB)] - Cas Cremers and Sjouke Mauw
Operational Semantics and Verification of Security Protocols
2012, XIII, 172 p. 59 illus.
Hardcover, ISBN 978-3-540-78635-1
[Download Cover | external page DOI] - David Basin, Srdjan Capkun
The Research Value of Publishing Attacks
In Privacy and Security, Communications of the ACM, Vol. 55, No. 11, Pages 22-24
[Download PDF (PDF, 138 KB) | external page DOI] - Sasa Radomirovic
A Construction of Short Sequences Containing All Permutations of a Set as Subsequences.
In Electronic Journal of Combinatorics, 19 (4): Paper 31, 11 pp., 2012.
[external page URL] - Michael Schläpfer and Melanie Volkamer
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem
In Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance. Albany, October 2012
[external page DOI] - David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Zalinescu
Monitoring Compliance Policies over Incomplete and Disagreeing Logs
In Proceedings of the 3rd International Conference on Runtime Verification (RV), Istanbul, September 2012
[Download BibTeX (BIB, 423 Bytes) | Download PDF (PDF, 429 KB)] - Julian Gutierrez, Felix Klaedtke, and Martin Lange.
The mu-Calculus Alternation Hierarchy Collapses over Structures with Restricted Connectivity.
In Proceedings of the 3rd International Symposium on Games, Automata, Logics and Formal Verification (GandALF), Napoli, September 2012
[external page URL] - Cas Cremers and Michèle Feltz
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
In Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS), Pisa, September 2012.
[Download BibTeX (BIB, 795 Bytes) | external page DOI] - Joel Reardon and Srdjan Capkun and David Basin
Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory
21st USENIX Security Symposium, August 2012
[Download BibTeX (TXT, 318 Bytes) | Download PDF (PDF, 406 KB) | external page URL | Download slides (PDF, 406 KB)] - Oliver Spycher, Rolf Haenni, Reto Koenig, and Michael Schläpfer
Achieving Meaningful Efficiency in Coercion-Resistant, Verifiable Internet Voting
In Proceedings of the 5th International Conference on Electronic Voting. Bregenz, July 2012
[Download BibTeX (BIB, 253 Bytes) | Download PDF (PDF, 9 KB)] - Benedikt Schmidt and Simon Meier and Cas Cremers and David Basin
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties
In Proceedings of the 25th IEEE
Computer Security Foundations Symposium (CSF), Harvard, 2012
[Download BibTeX (TXT, 396 Bytes) | Download PDF (PDF, 1.8 MB) | external page DOI] - Christoph Sprenger and David Basin
Refining key Establishment
In Proceedings of the 25th IEEE
Computer Security Foundations Symposium (CSF), Harvard University, Cambridge, MA, June, 2012
[Download BibTeX (TXT, 308 Bytes) | Download PDF (PDF, 382 KB) | external page DOI] - Cas Cremers and Kasper Rasmussen and Benedikt Schmidt and Srdjan Capkun
Distance Hijacking Attacks on Distance Bounding Protocols
In Proceedings of the 33rd IEEE Symposium on Security and Privacy (Oakland S&P), San Francisco, May 2012
[Download BibTeX (BIB, 322 Bytes) | external page URL] - Stefan Hallerstede and Thai Son Hoang
Refinement by Interface Instantiation
In Proceedings of the 3rd International Conference, ABZ2012, LNCS, volume 7316, pages 223–237, Pisa Italy, June 2012, Springer-Verlag
[Download BibTeX (TXT, 957 Bytes) | Download PDF (PDF, 4.3 MB) | external page DOI] - David Basin and Samuel J. Burri and Günter Karjoth
Optimal Workflow-aware Authorizations
In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT '12), pages 93–102, Newark USA, June 2012, ACM Press
[Download BibTeX (TXT, 638 Bytes) | Download PDF (PDF, 429 KB) | external page DOI] - Joel Reardon and Claudio Marfolio and Srdjan Capkun and David Basin
Secure Deletion on Log-structured File Systems
ASIACCS'12, May 2012
[Download BibTeX (BIB, 199 Bytes) | Download PDF (PDF, 629 KB) | Download slides (PDF, 1.1 MB)] - David Basin and Cas Cremers and Simon Meier
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
In Proceedings of the 1st Conference on Principles of Security and Trust (POST 2012)
LNCS 7215, pages 129-148, Springer, 2012.
[Download BibTeX (TXT, 501 Bytes) | Download PDF (PDF, 515 KB) | external page DOI] - David Basin and Vincent Juge and Felix Klaedtke and Eugen Zalinescu
Enforceable Security Policies Revisited
In Proceedings of the 1st Conference on Principles of Security and Trust (POST 2012)
Lecture Notes in Computer Science, volume 7215, pages 309-328. Springer, 2012
[Download BibTeX (TXT, 484 Bytes) | external page DOI] - Anton Wijs and Mohammad Torabi Dashti
Extended beam search for non-exhaustive state space analysis
In The Journal of Logic and Algebraic Programming, 81 (1), pages 46-69, 2012
[Download BibTeX (TXT, 1 KB) | external page DOI] - David Basin and Cas Cremers and Catherine Meadows.
Model Checking Security Protocols
Springer, 2012
To appear
[Download BibTeX (TXT, 2 KB)] - David Basin and Matúvs Harvan and Felix Klaedtke and Eugen Zalinescu
MONPOLY: Monitoring Usage-control Policies
In Proceedings of the 2nd International Conference on Runtime Verification (RV 2011)
Lecture Notes in Computer Science, volume 7186, pages 360-364. Springer, 2012
[Download BibTeX (TXT, 453 Bytes) | external page DOI] - David Basin and Felix Klaedtke and Eugen Zalinescu
Algorithms for Monitoring Real-time Properties
In Proceedings of the 2nd International Conference on Runtime Verification (RV 2011).
Lecture Notes in Computer Science, volume 7186, pages 260-275. Springer, 2012
[Download BibTeX (TXT, 453 Bytes) | external page DOI] - Tom Hvitved and Felix Klaedtke and Eugen Zalinescu
A trace-based model for multiparty contracts
In The Journal of Logic and Algebraic Programming, 81 (2), pages 72-98, 2012
[Download BibTeX (TXT, 367 Bytes) | external page DOI] - Mario Frank and Andreas P. Streich and David Basin and Joachim M. Buhmann
Multi-assignment clustering for Boolean data
In Journal of Machine Learning Research, volume 13, pages 459-489, Feb. 2012
[Download BibTeX (TXT, 285 Bytes) | Download PDF (PDF, 1.1 MB) | external page URL]
- Petar Tsankov and Mohammad Torabi Dashti and David Basin
SecFuzz: Fuzz-testing Security Protocols
In Proceedings of the 7th International Workshop on Automation of Software Test (AST 2012)
[Download BibTeX (TXT, 404 Bytes) | Download PDF (PDF, 122 KB) | external page DOI]