Publications 2005

Main content

  • E. Abraham and B. Becker and F. Klaedtke and M. Steffen.
    Optimizing Bounded Model Checking for Linear Hybrid Systems
    .
    In 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI 2005)., 3385.
    Springer-Verlag, 2005.
    [BibTeX (TXT, 530 Bytes) | DOI]
  • Alessandro Armando and David Basin and Yohan Boichut and Yannick Chevalier and Luca Compagna and Jorge Cuellar and Paul Hankes Drielsma and Pierre-Cyrille Heám and Olga Kouchnarenko and Jacopo Mantovani and Sebastian Mödersheim and von Oheimb, David and Michael Rusinowitch and Judson Santiago and Mathieu Turuani and Luca Viganò and Laurent Vigneron.
    The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
    .
    In Proceedings of CAV'2005. LNCS 3576 Springer-Verlag, 2005.
    [abstract (TXT, 947 Bytes) | BibTeX (TXT, 1 KB) | PDF (PDF, 193 KB) | DOI]
  • Alessandro Armando and Luca Viganò.
    Preface (Editorial)
    .
    In Electronic Notes in Theoretical Computer Science (Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA 2004), 125 (1), pages 1, 2005.
    [BibTeX (TXT, 502 Bytes)]
  • David Aspinall and Christoph Lüth and Burkhart Wolff.
    Assisted Proof Document Authoring.
    In Fourth International Conference on Mathematical Knowledge Management (MKM 05). LNCS 3863. Springer Verlag, 2005.
    [abstract (TXT, 1 KB) | BibTeX (TXT, 2 KB) | DOI]
  • David Basin and Martin Buchheit and Jürgen Doser and Bernhard Hollunder and Torsten Lodderstedt.
    Model Driven Security
    .
    In DACH Security 2005.Syssec Verlag, 2005.
    [BibTeX | PDF (PDF, 217 KB)]
  • David Basin and Jürgen Doser and Torsten Lodderstedt.
    Model Driven Security
    . Springer, 2005.
    [abstract (TXT, 1 KB) | BibTeX (TXT, 2 KB) | PDF (PDF, 393 KB) | DOI]
  • David Basin and Hironobu Kuruma and Kazuo Takaragi and Burkhart Wolff.
    Specifying and Verifying Hysteresis Signature System with HOL-Z.
    Computer Security Group, ETH Zürich, Technical Report 471, 2005.
    [abstract (TXT, 897 Bytes) | BibTeX (TXT, 1 KB) | PDF (PDF, 924 KB) | URL]
  • David Basin and Hironobu Kuruma and Kazuo Takaragi and Burkhart Wolff.
    Verification of a Signature Architecture with HOL-Z.
    In Formal Methods 2005. LNCS 3582 Springer Verlag, 2005.
    [abstract (TXT, 1 KB) | BibTeX (TXT, 2 KB) | DOI]
  • David Basin and Sebastian Mödersheim and Luca Viganò.
    Algebraic Intruder Deductions (Extended Version)
    .
    ETH Zürich, Computer Science, Technical Report 485, 2005.
    [abstract (TXT, 1 KB) | BibTeX (TXT, 2 KB) | PDF (PDF, 310 KB) | gzip'ed Postscript (GZ, 167 KB) | URL]
  • David Basin and Sebastian Mödersheim and Luca Viganò.
    Algebraic Intruder Deductions
    .
    In LPAR 2005.
    LNAI, 3835. Springer-Verlag, 2005.
    [abstract (TXT, 1 KB) | BibTeX (TXT, 2 KB) | PDF (PDF, 216 KB) | gzip'ed Postscript (GZ, 167 KB)]
  • Achim D. Brucker and Burkhart Wolff.
    A Verification Approach for Applied System Security
    .
    In International Journal on Software Tools for Technology Transfer (STTT), 7 (3), pages 233-247, 2005.
    [abstract (TXT, 1002 Bytes) | BibTeX (TXT, 2 KB) | PDF (PDF, 325 KB) | DOI]
  • Achim D. Brucker and Burkhart Wolff.
    Symbolic Test Case Generation for Primitive Recursive Functions.
    In Formal Approaches to Testing of Software (FATES 04). LNCS 3395 Springer-Verlag, 2005.
    [abstract (TXT, 860 Bytes) | BibTeX (TXT, 1 KB) | DOI]
  • Achim D. Brucker and Burkhart Wolff.
    HOL-TestGen 1.0.0 User Guide
    .
    Computer Security Group, ETH Zürich, Technical Report 482, 2005.
    [BibTeX (TXT, 292 Bytes) | URL]
  • Achim D. Brucker and Burkhart Wolff.
    Interactive Testing using HOL-TestGen.
    In Formal Approaches to Testing of Software (FATES 05).
    LNCS 3997 Springer-Verlag, 2005.
    [abstract (TXT, 924 Bytes) | BibTeX (TXT, 1 KB) | DOI]
  • Carlos Caleiro and Luca Viganò and David Basin.
    Metareasoning about Security Protocols using Distributed Temporal Logic.
    In Electronic Notes in Theoretical Computer Science
    Proceedings of the Workshop on Automated Reasoning for Security
    Protocol Analysis, ARSPA 2004)
    , 125 (1), pages 67-89, 2005.
    [BibTeX (TXT, 528 Bytes) | DOI]
  • Carlos Caleiro and Luca Viganò and David Basin.
    Deconstructing Alice and Bob
    .
    In Electronic Notes in Theoretical Computer Science (Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA 2005), 135 (1), pages 3-22, 2005.
    [BibTeX (TXT, 522 Bytes) | DOI]
  • Carlos Caleiro and Luca Viganò and David Basin.
    Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis
    .
    In Logic Journal of the IGPL, 13 (6), pages 637-663, 2005.
    [abstract (TXT, 958 Bytes) | BibTeX (TXT, 1 KB) | DOI]
  • S.-K. Chen and H. Lei and M. Wahler and H. Chang and K. Bhaskaran and J. Frank.
    A Model Driven XML Transformation Framework for Business Performance Management.
    In Proceedings of the IEEE Conference on e-Business Engineering.
    IEEE Computer Society, 2005.
    [BibTeX (TXT, 439 Bytes) | DOI]
  • Michael Näf und David Basin.
    Konflikt oder Review - Zwei Ansätze für Labors in angewandter Informationssicherheit
    .
    Information Security, Technical Report 497, 2005.
    [BibTeX (TXT, 382 Bytes) | PDF (PDF, 1 MB) | URL]
  • Michael Näf und David Basin.
    Konflikt oder Review - Zwei Ansätze für Labors in angewandter Informationssicherheit
    .
    In Informatik Spektrum, 5 (28), 2005.
    [BibTeX (TXT, 364 Bytes) | DOI]
  • Pierpaolo Degano and Luca Viganò.
    Preface (Editorial)
    .
    In Electronic Notes in Theoretical Computer Science (Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA 2005), 135 (1), pages 1-2, 2005.
    [BibTeX (TXT, 549 Bytes) | DOI]
  • Paul Hankes Drielsma and Sebastian Mödersheim and Luca Viganò.
    A Formalization of Off-Line Guessing for Security Protocol Analysis
    .
    In Proceedings of LPAR'04.LNAI, 3452. Springer, 2005.
    [abstract (TXT, 2 KB) | BibTeX (TXT, 2 KB) | DOI]
  • Christopher Giblin and Alice Y Liu and Samuel Müller and Birgit Pfitzmann and Xin Zhou.
    Regulations Expressed As Logical Models (REALM)
    .
    IBM Research, Technical Report RZ 3616, 2005.
    [abstract (TXT, 1 KB) | BibTeX (TXT, 2 KB) | PDF (PDF, 284 KB)]
  • Christopher Giblin and Alice Y Liu and Samuel Müller and Birgit Pfitzmann and Xin Zhou.
    Regulations Expressed As Logical Models (REALM).
    In Proceedings of the 18th Annual Conference on Legal Knowledge and Information Systems (JURIX 2005).
    IOS Press, 2005.
    [abstract (TXT, 1 KB) | BibTeX (TXT, 2 KB) | PDF (PDF, 178 KB)]
  • Manuel Hilty and David Basin and Alexander Pretschner.
    On Obligations
    .
    In 10th European Symposium on Research in Computer Security (ESORICS 2005).LNCS, 3679. Springer-Verlag, 2005.
    [abstract (TXT, 1008 Bytes) | BibTeX (TXT, 2 KB) | DOI]
  • M. Hilty and A. Pretschner and T. Walter and C. Schaefer.
    Usage Control Requirements in Mobile and Ubiquitous Computing Applications
    .
    DoCoMo Euro-Labs Internal Technical Report, Technical Report I-ST-015, 2005.
    [BibTeX (TXT, 373 Bytes)]
  • Dieter Hutter and Heiko Mantel and Ina Schaefer and Axel Schairer.
    Security of Multiagent Systems: A Case Study on Comparison Shopping.
    In Journal of Applied Logic 2005, Elsevier, 2005.
    [BibTeX (TXT, 2 KB) | DOI]
  • Jana Koehler and Rainer Hauser and Shane Sendall and Michael Wahler.
    Declarative Techniques for Model-Driven Business Process Integration.
    In IBM Systems Journal, 44 (1), pages 47-65, 2005.
    [BibTeX (TXT, 412 Bytes) | PDF (PDF, 216 KB)]
  • Boris Köpf and Heiko Mantel.
    Eliminating Implicit Information Leaks by Transformational Typing and Unification.
    ETH Zürich, Technical Report 498, 2005.
    [BibTeX (TXT, 411 Bytes) | PDF (PDF, 373 KB) | gzip'ed Postscript (GZ, 214 KB) | URL]
  • Boris Köpf and Heiko Mantel.
    Eliminating Implicit Information Leaks by Transformational Typing and Unification
    .
    In Workshop on Formal Aspects in Security and Trust.LNCS, 3866. Springer, 2005.
    [BibTeX (TXT, 476 Bytes) | PDF (PDF, 247 KB) | gzip'ed Postscript (GZ, 96 KB) | DOI]
  • Heiko Mantel and Axel Schairer.
    Exploiting Generic Aspects of Security Models in Formal Developments.

    In Mechanizing Mathematical Reasoning. LNCS 2605 Springer, 2005.
    [BibTeX (TXT, 366 Bytes) | DOI]
  • Thomas Meyer and Burkhart Wolff.
    Tactic-based Optimized Compilation of Functional Programs
    .
    In Types for Proofs and Programs (TYPES 2004). LNCS 3839 Springer Verlag, 2005.
    [abstract (TXT, 925 Bytes) | BibTeX (TXT, 1 KB) | PDF (PDF, 1.4 MB) | DOI]
  • Kunihiko Miyazaki and David Basin and Hironobu Kuruma and Kazuo Takaragi and Satoru Tezuka.
    A formal analysis of a digital signature system
    .
    In Computer Software - Journal of the Japanese Society for Software Science and Technology, 22 (2), pages 74-84, 2005.
    in Japanese
    [BibTeX (TXT, 508 Bytes) | PDF (PDF, 758 KB)]
  • Alexander Pretschner.
    Model-Based Testing in Practice
    .
    In Formal Methods 2005.
    Springer LNCS 3582, 2005.
    [BibTeX (TXT, 334 Bytes) | DOI]
  • A. Pretschner.
    Model-Based Testing
    .
    In ICSE'05., 2005.
    [BibTeX (TXT, 242 Bytes) | DOI]
  • A. Pretschner and J. Philipps.
    Methodological Issues in Model-Based Testing.
    Springer LNCS 3472, 2005.
    [BibTeX (TXT, 1 KB) | DOI]
  • A. Pretschner and W. Prenninger.
    Computing Refactorings of Behavior Models
    .
    In MODELS 2005.
    Springer LNCS 3713, 2005.
    [PDF (PDF, 193 KB) | DOI]
  • A. Pretschner and W. Prenninger and S. Wagner and C. Kuehnel and M. Baumgartner and B. Sostawa and R. Zoelch and T. Stauner.
    One Evaluation of Model-Based Testing and its Automation
    .
    In ICSE'05., 2005.
    [BibTeX (TXT, 390 Bytes)]
  • C. Salzmann and T. Stauner and A. Pretschner.
    ICSE workshop: Software Engineering for Automotive Systems
    .
    In ICSE'05., 2005.
    [BibTeX (TXT, 301 Bytes)]
  • Diana Senn and David Basin and Germano Caronni.
    Firewall Conformance Testing
    .
    In TestCom 2005.Lecture Notes in Computer Science, 3502. Springer-Verlag GmbH, 2005.
    [abstract (TXT, 897 Bytes) | BibTeX (TXT, 2 KB) | DOI]
  • David Basin and Sebastian Mödersheim and Luca Viganò.
    OFMC: A symbolic model checker for security protocols
    .
    In International Journal of Information Security, 4 (3), pages 181-208, 2005.
    Published online December 2004
    [abstract (TXT, 1 KB) | BibTeX (TXT, 2 KB) | PDF (PDF, 772 KB) | DOI]
  • Alessandro Armando and Luca Viganò.
    Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2004)
    .
    In Electronic Notes in Theoretical Computer Science 125 (Elsevier Science Direct), 2005.
    [BibTeX (TXT, 502 Bytes) | DOI]
  • Pierpaolo Degano and Luca Viganò.
    Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA 2005)
    .
    In Electronic Notes in Theoretical Computer Science 135 (Elsevier Science Direct), 2005.
    [BibTeX (TXT, 549 Bytes) | DOI]
  • Serge Autexier and Iliano Cervesato and Heiko Mantel
    International Journal of Information Security.
    Springer, 2005.
    [BibTeX (TXT, 402 Bytes) | DOI]
  • A. Pretschner and C. Salzmann and T. Stauner.
    Proceedings of the 2nd Intl. ICSE workshop on Software Engineering for Automotive Systems.
    In ACM, 2005.
    ISBN 1-59593-128-7
    [BibTeX (TXT, 351 Bytes) | DOI]
  • M. Broy and B. Jonsson and J.-P. Katoen and M. Leucker and A. Pretschner
    Model-Based Testing of Reactive Systems.
    Springer, 2005.
    [BibTeX (TXT, 507 Bytes) | cover (JPEG, 7 KB) | URL]
  • Alan Bundy and David Basin and Dieter Hutter and Andrew Ireland
    Rippling: Meta-level Guidance for Mathematical Reasoning.
    Cambridge University Press, 2005.
    [abstract (TXT, 2 KB) | BibTeX (TXT, 2 KB) | cover (JPEG, 6 KB) | PDF (PDF, 189 KB) | DOI]
 
 
Page URL: http://www.infsec.ethz.ch/research/publications/pub2005.html
Tue Jun 27 12:42:56 CEST 2017
© 2017 Eidgenössische Technische Hochschule Zürich