| 2009 |
| 122 | | David A. Basin,
Srdjan Capkun,
Wenke Lee:
Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009
ACM 2009 |
| 121 | EE | Thai Son Hoang,
Hironobu Kuruma,
David A. Basin,
Jean-Raymond Abrial:
Developing Topology Discovery in Event-B.
IFM 2009: 1-19 |
| 2008 |
| 120 | EE | Mario Frank,
David A. Basin,
Joachim M. Buhmann:
A class of probabilistic models for role engineering.
ACM Conference on Computer and Communications Security 2008: 299-310 |
| 119 | EE | Alexander Pretschner,
Manuel Hilty,
David A. Basin,
Christian Schaefer,
Thomas Walter:
Mechanisms for usage control.
ASIACCS 2008: 240-244 |
| 118 | EE | Christoph Sprenger,
David A. Basin:
Cryptographically-Sound Protocol-Model Abstractions.
CSF 2008: 115-129 |
| 117 | EE | David A. Basin,
Felix Klaedtke,
Samuel Müller,
Birgit Pfitzmann:
Runtime Monitoring of Metric First-order Temporal Properties.
FSTTCS 2008 |
| 116 | EE | David A. Basin,
Carlos Caleiro,
Jaime Ramos,
Luca Viganò:
A Labeled Tableaux Systemfor the Distributed Temporal Logic DTL.
TIME 2008: 101-109 |
| 115 | EE | Michael Näf,
David A. Basin:
Two approaches to an information security laboratory.
Commun. ACM 51(12): 138-142 (2008) |
| 114 | EE | Rolf Oppliger,
Ralf Hauser,
David A. Basin:
SSL/TLS session-aware user authentication revisited.
Computers & Security 27(3-4): 64-70 (2008) |
| 113 | EE | Rolf Oppliger,
Ralf Hauser,
David A. Basin:
SSL/TLS Session-Aware User Authentication.
IEEE Computer 41(3): 59-65 (2008) |
| 2007 |
| 112 | EE | Boris Köpf,
David A. Basin:
An information-theoretic model for adaptive side-channel attacks.
ACM Conference on Computer and Communications Security 2007: 286-296 |
| 111 | EE | Patrick Schaller,
Srdjan Capkun,
David A. Basin:
BAP: Broadcast Authentication Using Cryptographic Puzzles.
ACNS 2007: 401-419 |
| 110 | EE | Diana von Bidder,
David A. Basin,
Germano Caronni:
Midpoints Versus Endpoints: From Protocols to Firewalls.
ACNS 2007: 46-64 |
| 109 | EE | David A. Basin,
Ernst-Rüdiger Olderog,
Paul E. Sevinç:
Specifying and analyzing security automata using CSP-OZ.
ASIACCS 2007: 70-81 |
| 108 | EE | Manuel Hilty,
Alexander Pretschner,
David A. Basin,
Christian Schaefer,
Thomas Walter:
A Policy Language for Distributed Usage Control.
ESORICS 2007: 531-546 |
| 107 | EE | Rolf Oppliger,
Ralf Hauser,
David A. Basin,
Aldo Rodenhaeuser,
Bruno Kaiser:
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA).
KiVS 2007: 225-236 |
| 106 | EE | David A. Basin,
Manuel Clavel,
Jürgen Doser,
Marina Egea:
A Metamodel-Based Approach for Analyzing Security-Design Models.
MoDELS 2007: 420-435 |
| 105 | EE | Christoph Sprenger,
David A. Basin:
A Monad-Based Modeling and Verification Toolbox with Application to Security Protocols.
TPHOLs 2007: 302-318 |
| 104 | EE | Paul E. Sevinç,
Mario Strasser,
David A. Basin:
Securing the Distribution and Storage of Secrets with Trusted Platform Modules.
WISTP 2007: 53-66 |
| 103 | EE | David A. Basin,
Hironobu Kuruma,
Kunihiko Miyazaki,
Kazuo Takaragi,
Burkhart Wolff:
Verifying a signature architecture: a comparative case study.
Formal Asp. Comput. 19(1): 63-91 (2007) |
| 102 | EE | Michael Backes,
David A. Basin,
Michael Waidner:
Preface.
Journal of Computer Security 15(6): 561 (2007) |
| 2006 |
| 101 | EE | David A. Basin:
Model Driven Security.
ARES 2006: 4 |
| 100 | EE | Christoph Sprenger,
Michael Backes,
David A. Basin,
Birgit Pfitzmann,
Michael Waidner:
Cryptographically Sound Theorem Proving.
CSFW 2006: 153-166 |
| 99 | EE | Boris Köpf,
David A. Basin:
Timing-Sensitive Information Flow Analysis for Synchronous Systems.
ESORICS 2006: 243-262 |
| 98 | EE | Paul E. Sevinç,
David A. Basin,
Ernst-Rüdiger Olderog:
Controlling Access to Documents: A Formal Access Control Model.
ETRICS 2006: 352-367 |
| 97 | EE | Paul Hankes Drielsma,
Sebastian Mödersheim,
Luca Viganò,
David A. Basin:
Formalizing and Analyzing Sender Invariance.
Formal Aspects in Security and Trust 2006: 80-95 |
| 96 | EE | David A. Basin,
Jürgen Doser,
Torsten Lodderstedt:
Model driven security: From UML models to access control infrastructures.
ACM Trans. Softw. Eng. Methodol. 15(1): 39-91 (2006) |
| 95 | EE | Alexander Pretschner,
Manuel Hilty,
David A. Basin:
Distributed usage control.
Commun. ACM 49(9): 39-44 (2006) |
| 94 | EE | Rolf Oppliger,
Ralf Hauser,
David A. Basin:
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle.
Computer Communications 29(12): 2238-2246 (2006) |
| 93 | EE | Alessandro Armando,
David A. Basin,
Jorge Cuéllar,
Michaël Rusinowitch,
Luca Viganò:
Automated Reasoning for Security Protocol Analysis.
J. Autom. Reasoning 36(1-2): 1-3 (2006) |
| 92 | EE | Carlos Caleiro,
Luca Viganò,
David A. Basin:
On the semantics of Alice&Bob specifications of security protocols.
Theor. Comput. Sci. 367(1-2): 88-122 (2006) |
| 2005 |
| 91 | EE | Alessandro Armando,
David A. Basin,
Yohan Boichut,
Yannick Chevalier,
Luca Compagna,
Jorge Cuéllar,
Paul Hankes Drielsma,
Pierre-Cyrille Héam,
Olga Kouchnarenko,
Jacopo Mantovani,
Sebastian Mödersheim,
David von Oheimb,
Michaël Rusinowitch,
Judson Santiago,
Mathieu Turuani,
Luca Viganò,
Laurent Vigneron:
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
CAV 2005: 281-285 |
| 90 | EE | Manuel Hilty,
David A. Basin,
Alexander Pretschner:
On Obligations.
ESORICS 2005: 98-117 |
| 89 | EE | David A. Basin,
Hironobu Kuruma,
Kazuo Takaragi,
Burkhart Wolff:
Verification of a Signature Architecture with HOL-Z.
FM 2005: 269-285 |
| 88 | EE | David A. Basin,
Sebastian Mödersheim,
Luca Viganò:
Algebraic Intruder Deductions.
LPAR 2005: 549-564 |
| 87 | EE | Diana Senn,
David A. Basin,
Germano Caronni:
Firewall Conformance Testing.
TestCom 2005: 226-241 |
| 86 | EE | Carlos Caleiro,
Luca Viganò,
David A. Basin:
Metareasoning about Security Protocols using Distributed Temporal Logic.
Electr. Notes Theor. Comput. Sci. 125(1): 67-89 (2005) |
| 85 | EE | Carlos Caleiro,
Luca Viganò,
David A. Basin:
Deconstructing Alice and Bob.
Electr. Notes Theor. Comput. Sci. 135(1): 3-22 (2005) |
| 84 | EE | Michael Näf,
David A. Basin:
Konflikt oder Review zwei Ansätze für Labors in angewandter Informationssicherheit.
Informatik Spektrum 28(5): 407-412 (2005) |
| 83 | EE | David A. Basin,
Sebastian Mödersheim,
Luca Viganò:
OFMC: A symbolic model checker for security protocols.
Int. J. Inf. Sec. 4(3): 181-208 (2005) |
| 82 | EE | Carlos Caleiro,
Luca Viganò,
David A. Basin:
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis.
Logic Journal of the IGPL 13(6): 637-663 (2005) |
| 2004 |
| 81 | | Vijayalakshmi Atluri,
Michael Backes,
David A. Basin,
Michael Waidner:
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washingtion, DC, USA, October 29, 2004
ACM 2004 |
| 80 | | David A. Basin,
Michaël Rusinowitch:
Automated Reasoning - Second International Joint Conference, IJCAR 2004, Cork, Ireland, July 4-8, 2004, Proceedings
Springer 2004 |
| 79 | EE | David A. Basin,
Yves Deville,
Pierre Flener,
Andreas Hamfelt,
Jørgen Fischer Nilsson:
Synthesis of Programs in Computational Logic.
Program Development in Computational Logic 2004: 30-65 |
| 78 | EE | David A. Basin,
Manuel Clavel,
José Meseguer:
Reflective metalogical frameworks.
ACM Trans. Comput. Log. 5(3): 528-576 (2004) |
| 77 | EE | David A. Basin,
Olivier Danvy,
Robert Harper:
Editorial.
Higher-Order and Symbolic Computation 17(3): 171-171 (2004) |
| 2003 |
| 76 | | Michael Backes,
David A. Basin:
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003
ACM 2003 |
| 75 | | David A. Basin,
Burkhart Wolff:
Theorem Proving in Higher Order Logics, 16th International Conference, TPHOLs 2003, Rom, Italy, September 8-12, 2003, Proceedings
Springer 2003 |
| 74 | EE | David A. Basin,
Sebastian Mödersheim,
Luca Viganò:
CDiff: a new reduction technique for constraint-based analysis of security protocols.
ACM Conference on Computer and Communications Security 2003: 335-344 |
| 73 | EE | David A. Basin,
Sebastian Mödersheim,
Luca Viganò:
An On-the-Fly Model-Checker for Security Protocol Analysis.
ESORICS 2003: 253-270 |
| 72 | EE | David A. Basin,
Jürgen Doser,
Torsten Lodderstedt:
Model driven security for process-oriented systems.
SACMAT 2003: 100-109 |
| 71 | EE | David A. Basin,
Stefan Friedrich,
Marek Gawkowski:
Bytecode Verification by Model Checking.
J. Autom. Reasoning 30(3-4): 399-444 (2003) |
| 70 | EE | Abdelwaheb Ayari,
David A. Basin,
Felix Klaedtke:
Decision procedures for inductive Boolean functions based on alternating automata.
Theor. Comput. Sci. 300(1-3): 301-329 (2003) |
| 2002 |
| 69 | EE | Alessandro Armando,
David A. Basin,
Mehdi Bouallagui,
Yannick Chevalier,
Luca Compagna,
Sebastian Mödersheim,
Michaël Rusinowitch,
Mathieu Turuani,
Luca Viganò,
Laurent Vigneron:
The AVISS Security Protocol Analysis Tool.
CAV 2002: 349-353 |
| 68 | EE | Abdelwaheb Ayari,
David A. Basin:
QUBOS: Deciding Quantified Boolean Logic Using Propositional Satisfiability Solvers.
FMCAD 2002: 187-201 |
| 67 | EE | David A. Basin:
The Next 700 Synthesis Calculi.
FME 2002: 430 |
| 66 | EE | David A. Basin,
Stefan Friedrich,
Marek Gawkowski,
Joachim Posegga:
Bytecode Model Checking: An Experimental Analysis.
SPIN 2002: 42-59 |
| 65 | EE | David A. Basin,
Stefan Friedrich,
Marek Gawkowski:
Verified Bytecode Model Checkers.
TPHOLs 2002: 47-66 |
| 64 | EE | Torsten Lodderstedt,
David A. Basin,
Jürgen Doser:
SecureUML: A UML-Based Modeling Language for Model-Driven Security.
UML 2002: 426-441 |
| 63 | EE | David A. Basin,
Frank Rittinger,
Luca Viganò:
A Formal Analysis of the CORBA Security Service.
ZB 2002: 330-349 |
| 2001 |
| 62 | EE | David A. Basin,
Frank Rittinger,
Luca Viganò:
A formal data-model of the CORBA security service.
ESEC / SIGSOFT FSE 2001: 303-304 |
| 61 | EE | Rafael Accorsi,
David A. Basin,
Luca Viganò:
Towards an awareness-based semantics for security protocol analysis.
Electr. Notes Theor. Comput. Sci. 55(1): (2001) |
| 60 | EE | David A. Basin,
Harald Ganzinger:
Automated complexity analysis based on ordered resolution.
J. ACM 48(1): 70-109 (2001) |
| 59 | | David A. Basin,
Amy P. Felty:
Current Trends in Logical Frameworks and Metalanguages.
J. Autom. Reasoning 27(1): 1-2 (2001) |
| 58 | | Abdelwaheb Ayari,
David A. Basin:
A Higher-order Interpretation of Deductive Tableau.
J. Symb. Comput. 31(5): 487-520 (2001) |
| 57 | EE | Ian Frank,
David A. Basin:
A theoretical and empirical investigation of search in imperfect information games.
Theor. Comput. Sci. 252(1-2): 217-256 (2001) |
| 2000 |
| 56 | | Ian Frank,
David A. Basin,
Alan Bundy:
Combining Knowledge and Search to Solve Single-Suit Bridge.
AAAI/IAAI 2000: 195-200 |
| 55 | | Abdelwaheb Ayari,
David A. Basin,
Felix Klaedtke:
Decision Procedures for Inductive Boolean Functions Based on Alternating Automata.
CAV 2000: 170-185 |
| 54 | | Abdelwaheb Ayari,
David A. Basin:
Bounded Model Construction for Monadic Second-Order Logics.
CAV 2000: 99-112 |
| 53 | EE | David A. Basin,
Stefan Friedrich,
Sebastian Mödersheim:
B2M: A Semantic Based Tool for BLIF Hardware Descriptions.
FMCAD 2000: 91-107 |
| 52 | EE | David A. Basin,
Manuel Clavel,
José Meseguer:
Rewriting Logic as a Metalogical Framework.
FSTTCS 2000: 55-80 |
| 51 | EE | David A. Basin,
Grit Denker:
Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis.
Electr. Notes Theor. Comput. Sci. 36: (2000) |
| 50 | | David A. Basin,
Seán Matthews:
Structuring Metatheory on Inductive Definitions.
Inf. Comput. 162(1-2): 80-95 (2000) |
| 49 | | Penny Anderson,
David A. Basin:
Program Development Schemata as Derived Rules.
J. Symb. Comput. 30(1): 5-36 (2000) |
| 1999 |
| 48 | EE | David A. Basin,
Stefan Friedrich,
Joachim Posegga,
Harald Vogt:
Java Bytecode Verification by Model Checking.
CAV 1999: 491-494 |
| 47 | EE | David A. Basin:
Lazy Infinite-State Analysis of Security Protocols.
CQRE 1999: 30-42 |
| 46 | EE | Abdelwaheb Ayari,
David A. Basin,
Stefan Friedrich:
Structural and Behavioral Modeling with Monadic Logics.
ISMVL 1999: 142-151 |
| 45 | | David A. Basin,
Stefan Friedrich:
Modeling a Hardware Synthesis Methodology in Isabelle.
Formal Methods in System Design 15(2): 99-122 (1999) |
| 1998 |
| 44 | | Ian Frank,
David A. Basin,
Hitoshi Matsubara:
Finding Optimal Strategies for Imperfect Information Games.
AAAI/IAAI 1998: 500-507 |
| 43 | EE | Ian Frank,
David A. Basin:
Optimal Play against Best Defence: Complexity and Heuristics.
Computers and Games 1998: 50-73 |
| 42 | EE | David A. Basin:
Logical-Framework-Based Program Development.
ACM Comput. Surv. 30(3es): 1 (1998) |
| 41 | EE | Ian Frank,
David A. Basin:
Search in Games with Incomplete Information: A Case Study Using Bridge Card Play.
Artif. Intell. 100(1-2): 87-123 (1998) |
| 40 | EE | David A. Basin,
Seán Matthews:
Scoped metatheorems.
Electr. Notes Theor. Comput. Sci. 15: (1998) |
| 39 | | David A. Basin,
Seán Matthews,
Luca Viganò:
Labelled Modal Logics: Quantifiers.
Journal of Logic, Language and Information 7(3): 237-263 (1998) |
| 38 | | David A. Basin,
Seán Matthews,
Luca Viganò:
Natural Deduction for Non-Classical Logics.
Studia Logica 60(1): 119-160 (1998) |
| 1997 |
| 37 | | Abdelwaheb Ayari,
David A. Basin,
Andreas Podelski:
LISA: A Specification Language Based on WS2S.
CSL 1997: 18-34 |
| 36 | | David A. Basin,
Seán Matthews,
Luca Viganò:
Labelled Quantified Modal Logics.
KI 1997: 171-182 |
| 35 | | David A. Basin,
Seán Matthews,
Luca Viganò:
A New Method for Bounding the Complexity of Modal Logics.
Kurt Gödel Colloquium 1997: 89-102 |
| 34 | | David A. Basin,
Seán Matthews,
Luca Viganò:
Labelled Propositional Modal Logics: Theory and Practice.
J. Log. Comput. 7(6): 685-717 (1997) |
| 1996 |
| 33 | | David A. Basin,
Seán Matthews:
Structuring Metatheory on Inductive Definitions.
CADE 1996: 171-185 |
| 32 | | Francisco J. Cantu,
Alan Bundy,
Alan Smaill,
David A. Basin:
Experiments in Automating Hardware Verification Using Inductive Proof Planning.
FMCAD 1996: 94-108 |
| 31 | | David A. Basin,
Seán Matthews,
Luca Viganò:
A Topography of Labelled Modal Logics.
Frontiers of Combining Systems (FroCos) 1996: 75-92 |
| 30 | | David A. Basin,
Seán Matthews,
Luca Viganò:
Implementing Modal and Relevance Logics in a Logical Framework.
KR 1996: 386-397 |
| 29 | | David A. Basin,
Harald Ganzinger:
Complexity Analysis Based on Ordered Resolution.
LICS 1996: 456-465 |
| 28 | | Abdelwaheb Ayari,
David A. Basin:
Generic System Support for Deductive Program Development.
TACAS 1996: 313-328 |
| 27 | | David A. Basin,
Stefan Friedrich:
Modeling a Hardware Synthesis Methodology in Isabelle.
TPHOLs 1996: 33-50 |
| 26 | | Ina Kraan,
David A. Basin,
Alan Bundy:
Middle-Out Reasoning for Synthesis and Induction.
J. Autom. Reasoning 16(1-2): 113-145 (1996) |
| 25 | | David A. Basin,
Toby Walsh:
A Calculus for and Termination of Rippling.
J. Autom. Reasoning 16(1-2): 147-180 (1996) |
| 24 | | David A. Basin,
Seán Matthews:
Adding Metatheoretic Facilities to First-Order Theories.
J. Log. Comput. 6(6): 835-849 (1996) |
| 1995 |
| 23 | | Penny Anderson,
David A. Basin:
Deriving and Applying Logic Program Transformers.
ASIAN 1995: 301-318 |
| 22 | | David A. Basin,
Nils Klarlund:
Hardware Verification using Monadic Second-Order Logic.
CAV 1995: 31-41 |
| 1994 |
| 21 | | David A. Basin,
Toby Walsh:
Termination Orderings for Rippling.
CADE 1994: 466-483 |
| 20 | | David A. Basin,
Toby Walsh:
A Calculus for Rippling.
CTRS 1994: 15-30 |
| 19 | | Tetsuya Yoshida,
Alan Bundy,
Ian Green,
Toby Walsh,
David A. Basin:
Coloured Rippling: An Extension of a Theorem Proving Heuristic.
ECAI 1994: 85-89 |
| 18 | | David A. Basin:
IsaWhelk Interpreted in Isabelle.
ICLP 1994: 741 |
| 17 | | David A. Basin:
Logic Frameworks for Logic Programs.
LOPSTR 1994: 1-16 |
| 16 | | David A. Basin:
Generalized Rewriting in Type Theory.
Elektronische Informationsverarbeitung und Kybernetik 30(5/6): 249-259 (1994) |
| 15 | | David A. Basin:
A Term Equality Problem Equivalent to Graph Isomorphism.
Inf. Process. Lett. 51(2): 61-66 (1994) |
| 1993 |
| 14 | | David A. Basin,
Seán Matthews:
A Conservative Extension of First-order Logic and Its Application to Theorem Proving.
FSTTCS 1993: 151-160 |
| 13 | | Ina Kraan,
David A. Basin,
Alan Bundy:
Middle-Out Reasoning for Logic Program Synthesis.
ICLP 1993: 441-455 |
| 12 | | David A. Basin,
Toby Walsh:
Difference Unification.
IJCAI 1993: 116-122 |
| 11 | | David A. Basin,
Alan Bundy,
Ina Kraan,
Seán Matthews:
A Framework for Program Development Based on Schematic Proof.
IWSSD 1993: 162-171 |
| 10 | | Richard Barnett,
David A. Basin,
Jane Hesketh:
A Recursion Planning Analysis of Inductive Completion.
Ann. Math. Artif. Intell. 8(3-4): 363-381 (1993) |
| 1992 |
| 9 | | David A. Basin,
Toby Walsh:
Difference Matching.
CADE 1992: 295-309 |
| 8 | | Ian Frank,
David A. Basin,
Alan Bundy:
An Adaptation of Proof-Planning to Declarer Play in Bridge.
ECAI 1992: 72-76 |
| 7 | | Ina Kraan,
David A. Basin,
Alan Bundy:
Logic Program Synthesis via Proof Planning.
LOPSTR 1992: 1-14 |
| 1991 |
| 6 | | David A. Basin,
Fausto Giunchiglia,
Paolo Traverso:
Automating Meta-Theory Creation and System Extension.
AI*IA 1991: 48-57 |
| 5 | | David A. Basin,
Douglas J. Howe:
Some Normalization Properties of Martin-Löf's Type Theory, and Applications.
TACS 1991: 475-494 |
| 1990 |
| 4 | | David A. Basin:
Equality of Terms Containing Associative-Commutative Functions and Commutative Binding Operators in Isomorphism Complete.
CADE 1990: 251-260 |
| 1989 |
| 3 | | David A. Basin,
Peter Del Vecchio:
Verification Of Combinational Logic in Nuprl.
Hardware Specification, Verification and Synthesis 1989: 333-357 |
| 2 | | David A. Basin:
Building Theories in Nuprl.
Logic at Botik 1989: 12-25 |
| 1988 |
| 1 | | David A. Basin:
An Environment For Automated Reasoning About Partial Functions.
CADE 1988: 101-110 |