2009 | ||
---|---|---|
122 | David A. Basin, Srdjan Capkun, Wenke Lee: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009 ACM 2009 | |
121 | EE | Thai Son Hoang, Hironobu Kuruma, David A. Basin, Jean-Raymond Abrial: Developing Topology Discovery in Event-B. IFM 2009: 1-19 |
2008 | ||
120 | EE | Mario Frank, David A. Basin, Joachim M. Buhmann: A class of probabilistic models for role engineering. ACM Conference on Computer and Communications Security 2008: 299-310 |
119 | EE | Alexander Pretschner, Manuel Hilty, David A. Basin, Christian Schaefer, Thomas Walter: Mechanisms for usage control. ASIACCS 2008: 240-244 |
118 | EE | Christoph Sprenger, David A. Basin: Cryptographically-Sound Protocol-Model Abstractions. CSF 2008: 115-129 |
117 | EE | David A. Basin, Felix Klaedtke, Samuel Müller, Birgit Pfitzmann: Runtime Monitoring of Metric First-order Temporal Properties. FSTTCS 2008 |
116 | EE | David A. Basin, Carlos Caleiro, Jaime Ramos, Luca Viganò: A Labeled Tableaux Systemfor the Distributed Temporal Logic DTL. TIME 2008: 101-109 |
115 | EE | Michael Näf, David A. Basin: Two approaches to an information security laboratory. Commun. ACM 51(12): 138-142 (2008) |
114 | EE | Rolf Oppliger, Ralf Hauser, David A. Basin: SSL/TLS session-aware user authentication revisited. Computers & Security 27(3-4): 64-70 (2008) |
113 | EE | Rolf Oppliger, Ralf Hauser, David A. Basin: SSL/TLS Session-Aware User Authentication. IEEE Computer 41(3): 59-65 (2008) |
2007 | ||
112 | EE | Boris Köpf, David A. Basin: An information-theoretic model for adaptive side-channel attacks. ACM Conference on Computer and Communications Security 2007: 286-296 |
111 | EE | Patrick Schaller, Srdjan Capkun, David A. Basin: BAP: Broadcast Authentication Using Cryptographic Puzzles. ACNS 2007: 401-419 |
110 | EE | Diana von Bidder, David A. Basin, Germano Caronni: Midpoints Versus Endpoints: From Protocols to Firewalls. ACNS 2007: 46-64 |
109 | EE | David A. Basin, Ernst-Rüdiger Olderog, Paul E. Sevinç: Specifying and analyzing security automata using CSP-OZ. ASIACCS 2007: 70-81 |
108 | EE | Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter: A Policy Language for Distributed Usage Control. ESORICS 2007: 531-546 |
107 | EE | Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo Rodenhaeuser, Bruno Kaiser: A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). KiVS 2007: 225-236 |
106 | EE | David A. Basin, Manuel Clavel, Jürgen Doser, Marina Egea: A Metamodel-Based Approach for Analyzing Security-Design Models. MoDELS 2007: 420-435 |
105 | EE | Christoph Sprenger, David A. Basin: A Monad-Based Modeling and Verification Toolbox with Application to Security Protocols. TPHOLs 2007: 302-318 |
104 | EE | Paul E. Sevinç, Mario Strasser, David A. Basin: Securing the Distribution and Storage of Secrets with Trusted Platform Modules. WISTP 2007: 53-66 |
103 | EE | David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki, Kazuo Takaragi, Burkhart Wolff: Verifying a signature architecture: a comparative case study. Formal Asp. Comput. 19(1): 63-91 (2007) |
102 | EE | Michael Backes, David A. Basin, Michael Waidner: Preface. Journal of Computer Security 15(6): 561 (2007) |
2006 | ||
101 | EE | David A. Basin: Model Driven Security. ARES 2006: 4 |
100 | EE | Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner: Cryptographically Sound Theorem Proving. CSFW 2006: 153-166 |
99 | EE | Boris Köpf, David A. Basin: Timing-Sensitive Information Flow Analysis for Synchronous Systems. ESORICS 2006: 243-262 |
98 | EE | Paul E. Sevinç, David A. Basin, Ernst-Rüdiger Olderog: Controlling Access to Documents: A Formal Access Control Model. ETRICS 2006: 352-367 |
97 | EE | Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò, David A. Basin: Formalizing and Analyzing Sender Invariance. Formal Aspects in Security and Trust 2006: 80-95 |
96 | EE | David A. Basin, Jürgen Doser, Torsten Lodderstedt: Model driven security: From UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15(1): 39-91 (2006) |
95 | EE | Alexander Pretschner, Manuel Hilty, David A. Basin: Distributed usage control. Commun. ACM 49(9): 39-44 (2006) |
94 | EE | Rolf Oppliger, Ralf Hauser, David A. Basin: SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle. Computer Communications 29(12): 2238-2246 (2006) |
93 | EE | Alessandro Armando, David A. Basin, Jorge Cuéllar, Michaël Rusinowitch, Luca Viganò: Automated Reasoning for Security Protocol Analysis. J. Autom. Reasoning 36(1-2): 1-3 (2006) |
92 | EE | Carlos Caleiro, Luca Viganò, David A. Basin: On the semantics of Alice&Bob specifications of security protocols. Theor. Comput. Sci. 367(1-2): 88-122 (2006) |
2005 | ||
91 | EE | Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. CAV 2005: 281-285 |
90 | EE | Manuel Hilty, David A. Basin, Alexander Pretschner: On Obligations. ESORICS 2005: 98-117 |
89 | EE | David A. Basin, Hironobu Kuruma, Kazuo Takaragi, Burkhart Wolff: Verification of a Signature Architecture with HOL-Z. FM 2005: 269-285 |
88 | EE | David A. Basin, Sebastian Mödersheim, Luca Viganò: Algebraic Intruder Deductions. LPAR 2005: 549-564 |
87 | EE | Diana Senn, David A. Basin, Germano Caronni: Firewall Conformance Testing. TestCom 2005: 226-241 |
86 | EE | Carlos Caleiro, Luca Viganò, David A. Basin: Metareasoning about Security Protocols using Distributed Temporal Logic. Electr. Notes Theor. Comput. Sci. 125(1): 67-89 (2005) |
85 | EE | Carlos Caleiro, Luca Viganò, David A. Basin: Deconstructing Alice and Bob. Electr. Notes Theor. Comput. Sci. 135(1): 3-22 (2005) |
84 | EE | Michael Näf, David A. Basin: Konflikt oder Review zwei Ansätze für Labors in angewandter Informationssicherheit. Informatik Spektrum 28(5): 407-412 (2005) |
83 | EE | David A. Basin, Sebastian Mödersheim, Luca Viganò: OFMC: A symbolic model checker for security protocols. Int. J. Inf. Sec. 4(3): 181-208 (2005) |
82 | EE | Carlos Caleiro, Luca Viganò, David A. Basin: Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis. Logic Journal of the IGPL 13(6): 637-663 (2005) |
2004 | ||
81 | Vijayalakshmi Atluri, Michael Backes, David A. Basin, Michael Waidner: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washingtion, DC, USA, October 29, 2004 ACM 2004 | |
80 | David A. Basin, Michaël Rusinowitch: Automated Reasoning - Second International Joint Conference, IJCAR 2004, Cork, Ireland, July 4-8, 2004, Proceedings Springer 2004 | |
79 | EE | David A. Basin, Yves Deville, Pierre Flener, Andreas Hamfelt, Jørgen Fischer Nilsson: Synthesis of Programs in Computational Logic. Program Development in Computational Logic 2004: 30-65 |
78 | EE | David A. Basin, Manuel Clavel, José Meseguer: Reflective metalogical frameworks. ACM Trans. Comput. Log. 5(3): 528-576 (2004) |
77 | EE | David A. Basin, Olivier Danvy, Robert Harper: Editorial. Higher-Order and Symbolic Computation 17(3): 171-171 (2004) |
2003 | ||
76 | Michael Backes, David A. Basin: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003 ACM 2003 | |
75 | David A. Basin, Burkhart Wolff: Theorem Proving in Higher Order Logics, 16th International Conference, TPHOLs 2003, Rom, Italy, September 8-12, 2003, Proceedings Springer 2003 | |
74 | EE | David A. Basin, Sebastian Mödersheim, Luca Viganò: CDiff: a new reduction technique for constraint-based analysis of security protocols. ACM Conference on Computer and Communications Security 2003: 335-344 |
73 | EE | David A. Basin, Sebastian Mödersheim, Luca Viganò: An On-the-Fly Model-Checker for Security Protocol Analysis. ESORICS 2003: 253-270 |
72 | EE | David A. Basin, Jürgen Doser, Torsten Lodderstedt: Model driven security for process-oriented systems. SACMAT 2003: 100-109 |
71 | EE | David A. Basin, Stefan Friedrich, Marek Gawkowski: Bytecode Verification by Model Checking. J. Autom. Reasoning 30(3-4): 399-444 (2003) |
70 | EE | Abdelwaheb Ayari, David A. Basin, Felix Klaedtke: Decision procedures for inductive Boolean functions based on alternating automata. Theor. Comput. Sci. 300(1-3): 301-329 (2003) |
2002 | ||
69 | EE | Alessandro Armando, David A. Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim, Michaël Rusinowitch, Mathieu Turuani, Luca Viganò, Laurent Vigneron: The AVISS Security Protocol Analysis Tool. CAV 2002: 349-353 |
68 | EE | Abdelwaheb Ayari, David A. Basin: QUBOS: Deciding Quantified Boolean Logic Using Propositional Satisfiability Solvers. FMCAD 2002: 187-201 |
67 | EE | David A. Basin: The Next 700 Synthesis Calculi. FME 2002: 430 |
66 | EE | David A. Basin, Stefan Friedrich, Marek Gawkowski, Joachim Posegga: Bytecode Model Checking: An Experimental Analysis. SPIN 2002: 42-59 |
65 | EE | David A. Basin, Stefan Friedrich, Marek Gawkowski: Verified Bytecode Model Checkers. TPHOLs 2002: 47-66 |
64 | EE | Torsten Lodderstedt, David A. Basin, Jürgen Doser: SecureUML: A UML-Based Modeling Language for Model-Driven Security. UML 2002: 426-441 |
63 | EE | David A. Basin, Frank Rittinger, Luca Viganò: A Formal Analysis of the CORBA Security Service. ZB 2002: 330-349 |
2001 | ||
62 | EE | David A. Basin, Frank Rittinger, Luca Viganò: A formal data-model of the CORBA security service. ESEC / SIGSOFT FSE 2001: 303-304 |
61 | EE | Rafael Accorsi, David A. Basin, Luca Viganò: Towards an awareness-based semantics for security protocol analysis. Electr. Notes Theor. Comput. Sci. 55(1): (2001) |
60 | EE | David A. Basin, Harald Ganzinger: Automated complexity analysis based on ordered resolution. J. ACM 48(1): 70-109 (2001) |
59 | David A. Basin, Amy P. Felty: Current Trends in Logical Frameworks and Metalanguages. J. Autom. Reasoning 27(1): 1-2 (2001) | |
58 | Abdelwaheb Ayari, David A. Basin: A Higher-order Interpretation of Deductive Tableau. J. Symb. Comput. 31(5): 487-520 (2001) | |
57 | EE | Ian Frank, David A. Basin: A theoretical and empirical investigation of search in imperfect information games. Theor. Comput. Sci. 252(1-2): 217-256 (2001) |
2000 | ||
56 | Ian Frank, David A. Basin, Alan Bundy: Combining Knowledge and Search to Solve Single-Suit Bridge. AAAI/IAAI 2000: 195-200 | |
55 | Abdelwaheb Ayari, David A. Basin, Felix Klaedtke: Decision Procedures for Inductive Boolean Functions Based on Alternating Automata. CAV 2000: 170-185 | |
54 | Abdelwaheb Ayari, David A. Basin: Bounded Model Construction for Monadic Second-Order Logics. CAV 2000: 99-112 | |
53 | EE | David A. Basin, Stefan Friedrich, Sebastian Mödersheim: B2M: A Semantic Based Tool for BLIF Hardware Descriptions. FMCAD 2000: 91-107 |
52 | EE | David A. Basin, Manuel Clavel, José Meseguer: Rewriting Logic as a Metalogical Framework. FSTTCS 2000: 55-80 |
51 | EE | David A. Basin, Grit Denker: Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis. Electr. Notes Theor. Comput. Sci. 36: (2000) |
50 | David A. Basin, Seán Matthews: Structuring Metatheory on Inductive Definitions. Inf. Comput. 162(1-2): 80-95 (2000) | |
49 | Penny Anderson, David A. Basin: Program Development Schemata as Derived Rules. J. Symb. Comput. 30(1): 5-36 (2000) | |
1999 | ||
48 | EE | David A. Basin, Stefan Friedrich, Joachim Posegga, Harald Vogt: Java Bytecode Verification by Model Checking. CAV 1999: 491-494 |
47 | EE | David A. Basin: Lazy Infinite-State Analysis of Security Protocols. CQRE 1999: 30-42 |
46 | EE | Abdelwaheb Ayari, David A. Basin, Stefan Friedrich: Structural and Behavioral Modeling with Monadic Logics. ISMVL 1999: 142-151 |
45 | David A. Basin, Stefan Friedrich: Modeling a Hardware Synthesis Methodology in Isabelle. Formal Methods in System Design 15(2): 99-122 (1999) | |
1998 | ||
44 | Ian Frank, David A. Basin, Hitoshi Matsubara: Finding Optimal Strategies for Imperfect Information Games. AAAI/IAAI 1998: 500-507 | |
43 | EE | Ian Frank, David A. Basin: Optimal Play against Best Defence: Complexity and Heuristics. Computers and Games 1998: 50-73 |
42 | EE | David A. Basin: Logical-Framework-Based Program Development. ACM Comput. Surv. 30(3es): 1 (1998) |
41 | EE | Ian Frank, David A. Basin: Search in Games with Incomplete Information: A Case Study Using Bridge Card Play. Artif. Intell. 100(1-2): 87-123 (1998) |
40 | EE | David A. Basin, Seán Matthews: Scoped metatheorems. Electr. Notes Theor. Comput. Sci. 15: (1998) |
39 | David A. Basin, Seán Matthews, Luca Viganò: Labelled Modal Logics: Quantifiers. Journal of Logic, Language and Information 7(3): 237-263 (1998) | |
38 | David A. Basin, Seán Matthews, Luca Viganò: Natural Deduction for Non-Classical Logics. Studia Logica 60(1): 119-160 (1998) | |
1997 | ||
37 | Abdelwaheb Ayari, David A. Basin, Andreas Podelski: LISA: A Specification Language Based on WS2S. CSL 1997: 18-34 | |
36 | David A. Basin, Seán Matthews, Luca Viganò: Labelled Quantified Modal Logics. KI 1997: 171-182 | |
35 | David A. Basin, Seán Matthews, Luca Viganò: A New Method for Bounding the Complexity of Modal Logics. Kurt Gödel Colloquium 1997: 89-102 | |
34 | David A. Basin, Seán Matthews, Luca Viganò: Labelled Propositional Modal Logics: Theory and Practice. J. Log. Comput. 7(6): 685-717 (1997) | |
1996 | ||
33 | David A. Basin, Seán Matthews: Structuring Metatheory on Inductive Definitions. CADE 1996: 171-185 | |
32 | Francisco J. Cantu, Alan Bundy, Alan Smaill, David A. Basin: Experiments in Automating Hardware Verification Using Inductive Proof Planning. FMCAD 1996: 94-108 | |
31 | David A. Basin, Seán Matthews, Luca Viganò: A Topography of Labelled Modal Logics. Frontiers of Combining Systems (FroCos) 1996: 75-92 | |
30 | David A. Basin, Seán Matthews, Luca Viganò: Implementing Modal and Relevance Logics in a Logical Framework. KR 1996: 386-397 | |
29 | David A. Basin, Harald Ganzinger: Complexity Analysis Based on Ordered Resolution. LICS 1996: 456-465 | |
28 | Abdelwaheb Ayari, David A. Basin: Generic System Support for Deductive Program Development. TACAS 1996: 313-328 | |
27 | David A. Basin, Stefan Friedrich: Modeling a Hardware Synthesis Methodology in Isabelle. TPHOLs 1996: 33-50 | |
26 | Ina Kraan, David A. Basin, Alan Bundy: Middle-Out Reasoning for Synthesis and Induction. J. Autom. Reasoning 16(1-2): 113-145 (1996) | |
25 | David A. Basin, Toby Walsh: A Calculus for and Termination of Rippling. J. Autom. Reasoning 16(1-2): 147-180 (1996) | |
24 | David A. Basin, Seán Matthews: Adding Metatheoretic Facilities to First-Order Theories. J. Log. Comput. 6(6): 835-849 (1996) | |
1995 | ||
23 | Penny Anderson, David A. Basin: Deriving and Applying Logic Program Transformers. ASIAN 1995: 301-318 | |
22 | David A. Basin, Nils Klarlund: Hardware Verification using Monadic Second-Order Logic. CAV 1995: 31-41 | |
1994 | ||
21 | David A. Basin, Toby Walsh: Termination Orderings for Rippling. CADE 1994: 466-483 | |
20 | David A. Basin, Toby Walsh: A Calculus for Rippling. CTRS 1994: 15-30 | |
19 | Tetsuya Yoshida, Alan Bundy, Ian Green, Toby Walsh, David A. Basin: Coloured Rippling: An Extension of a Theorem Proving Heuristic. ECAI 1994: 85-89 | |
18 | David A. Basin: IsaWhelk Interpreted in Isabelle. ICLP 1994: 741 | |
17 | David A. Basin: Logic Frameworks for Logic Programs. LOPSTR 1994: 1-16 | |
16 | David A. Basin: Generalized Rewriting in Type Theory. Elektronische Informationsverarbeitung und Kybernetik 30(5/6): 249-259 (1994) | |
15 | David A. Basin: A Term Equality Problem Equivalent to Graph Isomorphism. Inf. Process. Lett. 51(2): 61-66 (1994) | |
1993 | ||
14 | David A. Basin, Seán Matthews: A Conservative Extension of First-order Logic and Its Application to Theorem Proving. FSTTCS 1993: 151-160 | |
13 | Ina Kraan, David A. Basin, Alan Bundy: Middle-Out Reasoning for Logic Program Synthesis. ICLP 1993: 441-455 | |
12 | David A. Basin, Toby Walsh: Difference Unification. IJCAI 1993: 116-122 | |
11 | David A. Basin, Alan Bundy, Ina Kraan, Seán Matthews: A Framework for Program Development Based on Schematic Proof. IWSSD 1993: 162-171 | |
10 | Richard Barnett, David A. Basin, Jane Hesketh: A Recursion Planning Analysis of Inductive Completion. Ann. Math. Artif. Intell. 8(3-4): 363-381 (1993) | |
1992 | ||
9 | David A. Basin, Toby Walsh: Difference Matching. CADE 1992: 295-309 | |
8 | Ian Frank, David A. Basin, Alan Bundy: An Adaptation of Proof-Planning to Declarer Play in Bridge. ECAI 1992: 72-76 | |
7 | Ina Kraan, David A. Basin, Alan Bundy: Logic Program Synthesis via Proof Planning. LOPSTR 1992: 1-14 | |
1991 | ||
6 | David A. Basin, Fausto Giunchiglia, Paolo Traverso: Automating Meta-Theory Creation and System Extension. AI*IA 1991: 48-57 | |
5 | David A. Basin, Douglas J. Howe: Some Normalization Properties of Martin-Löf's Type Theory, and Applications. TACS 1991: 475-494 | |
1990 | ||
4 | David A. Basin: Equality of Terms Containing Associative-Commutative Functions and Commutative Binding Operators in Isomorphism Complete. CADE 1990: 251-260 | |
1989 | ||
3 | David A. Basin, Peter Del Vecchio: Verification Of Combinational Logic in Nuprl. Hardware Specification, Verification and Synthesis 1989: 333-357 | |
2 | David A. Basin: Building Theories in Nuprl. Logic at Botik 1989: 12-25 | |
1988 | ||
1 | David A. Basin: An Environment For Automated Reasoning About Partial Functions. CADE 1988: 101-110 |