Publications 2006

Main content

  • Carl Abrams and Jürg von Känel and Samuel Müller and Birgit Pfitzmann and Susanne Ruschka-Taylor.
    Optimized Enterprise Risk Management.
    IBM Research, Technical Report RZ 3657, 2006.
    [abstract (TXT, 2 KB) | BibTeX (TXT, 2 KB)]
  • Pedro Adao and Paulo Mateus and Tiago Reis and Luca Viganò.
    Towards a Quantitative Analysis of Security Protocols.
    In Electronic Notes in Theoretical Computer Science (Proceedings of the 4th Workshop on Quantitative Aspects of Programming Languages, QAPL 2006), 164 (3), pages 3-25, 2006.
    [BibTeX (TXT, 2 KB) | DOI]
  • Michael Backes and Sebastian Mödersheim and Birgit Pfitzmann and Luca Viganò. Symbolic and Cryptographic Analysis of the Secure WS-Reliable Messaging Scenario (extended version).
    Department of Computer Science, ETH Zurich, Technical Report 502, 2006.
    [abstract (TXT, 1 KB) | BibTeX (TXT, 1 KB) | PDF (PDF, 319 KB) | URL]
  • Michael Backes and Sebastian Mödersheim and Birgit Pfitzmann and Luca Viganò.
    Symbolic and Cryptographic Analysis of the Secure WS-Reliable Messaging Scenario.
    In Proceedings of FOSSACS 2006.LNCS, 3921. Springer-Verlag, 2006.
    [BibTeX (TXT, 445 Bytes) | DOI]
  • David Basin and Jürgen Doser and Torsten Lodderstedt.
    Model Driven Security: from UML Models to Access Control Infrastructures
    .
    In ACM Transactions on Software Engineering and Methodology, 15 (1), pages 39-91, 2006.
    An intermediate version is available as ETH technical report no. 414
    [abstract (TXT, 2 KB) | BibTeX (TXT, 1 KB) | DOI]
  • Manfred Broy and Alexander Pretschner and Christian Salzmann and Thomas Stauner.
    Software intensive systems in the automotive domain: challenges for research and education
    .
    In SAE world congress. SAE, 2006.
    [BibTeX (TXT, 385 Bytes)]
  • Achim D. Brucker and Jürgen Doser and Burkhart Wolff.
    An MDA Framework Supporting OCL
    .
    In 6th OCL Workshop at the UML/MoDELS Conference., 2006.
    [abstract (TXT, 632 Bytes) | BibTeX (TXT, 910 Bytes) | PDF (PDF, 533 KB)]
  • Achim D. Brucker and Jürgen Doser and Burkhart Wolff.
    Semantic Issues of OCL: Past, Present, and Future
    .
    In 6th OCL Workshop at the UML/MoDELS Conference., 2006.
    [abstract (TXT, 893 Bytes) | BibTeX (TXT, 1 KB) | PDF (PDF, 281 KB)]
  • Achim D. Brucker and Jürgen Doser and Burkhart Wolff.
    A Model Transformation Semantics and Analysis Methodology for SecureUML
    .
    In MoDELS 2006: Model Driven Engineering Languages and Systems. LNCS 4199 Springer-Verlag, 2006.
    An extended version of this paper is available as ETH Technical Report, no. 524.
    [abstract (TXT, 769 Bytes) | BibTeX (TXT, 1 KB) | DOI]
  • Achim D. Brucker and Burkhart Wolff.
    A Package for Extensible Object-Oriented Data Models with an Application to IMP++
    .
    In International Workshop on Software Verification and Validation (SVV 2006). Computing Research Repository (CoRR) 2006.
    [abstract (TXT, 844 Bytes) | BibTeX (TXT, 2 KB) | PDF (PDF, 259 KB) | gzip'ed Postscript (GZ, 245 KB)]
  • Achim D. Brucker and Burkhart Wolff.
    The HOL-OCL Book
    .
    ETH Zürich, Technical Report 525, 2006.
    [abstract (TXT, 968 Bytes) | BibTeX (TXT, 1 KB) | PDF (PDF, 3.5 MB)]
  • Carlos Caleiro and Luca Viganò and David Basin.
    On the Semantics of Alice&Bob Specifications of Security Protocols
    .
    In Theoretical Computer Science, 367 (1-2), pages 88-122, 2006.
    [BibTeX (BIB, 2 KB)]
  • S.-K. Chen and H. Lei and M. Wahler and H. Chang and K. Bhaskaran and J. Frank.
    A model driven XML transformation framework for Business Performance Management model creation.
    In International Journal of Electronic Business, 4 (3/4), pages 281-301, 2006.
    [abstract (TXT, 897 Bytes) | BibTeX (TXT, 1 KB) | DOI]
  • C. Dax and M. Hofmann and M. Lange.
    A Proof System for the Linear Time mu-Calculus
    .
    In FSTTCS 2006., 4337. Springer, 2006.
    [BibTeX (TXT, 357 Bytes) | DOI]
  • Paul Hankes Drielsma and Sebastian Mödersheim and Luca Viganò and David Basin.
    Formalizing and Analyzing Sender Invariance.
    ETH Zurich, Technical Report 528, 2006.
    [abstract (TXT, 1 KB) | BibTeX (TXT, 2 KB) | PDF (PDF, 224 KB) | gzip'ed Postscript (GZ, 203 KB) | URL]
  • Jochen Eisinger and Felix Klaedtke.
    Don't Care Words with an Application to the Automata-based Approach for Real Addition
    .
    In 18th International Conference on Computer Aided Verification (CAV)., 2006. LNCS 4144.
    [BibTeX (TXT, 464 Bytes) | PDF (PDF, 278 KB) | DOI]
  • S. Gauch and M. Speretta and A. Pretschner.
    Ontology-Based User Profiles for Personalized Search
    .
    Springer, 2006.
    [BibTeX (TXT, 409 Bytes) | DOI]
  • Christopher Giblin and Samuel Müller and Birgit Pfitzmann.
    From Regulatory Policies to Event Monitoring Rules: Towards Model-Driven Compliance Automation.
    IBM Research, Technical Report RZ 3662, 2006.
    [abstract (TXT, 1 KB) | BibTeX (TXT, 1 KB)]
  • M. Hilty and A. Pretschner and C. Schaefer and T. Walter.
    Enforcement for Usage Control-An overview of Control Mechanisms
    .
    DoCoMo Euro-Labs, Technical Report I-ST-018, 2006.
    [BibTeX (TXT, 337 Bytes)]
  • M. Hilty and A. Pretschner and C. Schaefer and T. Walter.
    Usage Control Requirements in Mobile and Ubiquitous Computing Applications.
    In International Conference on Systems and Networks Communications.IEEE, 2006.
    Best paper award.
    [BibTeX (TXT, 429 Bytes) | DOI]
  • Jana Koehler and Rainer Hauser and Jochen Küster and Ksenia Ryndina and Jussi Vanhatalo and Michael Wahler.
    The Role of Visual Modeling and Model Transformations in Business-driven Development
    .
    In Fifth International Workshop on Graph Transformation and Visual Modeling Techniques., 2006.
    [BibTeX (TXT, 608 Bytes)]
  • Boris Köpf and David Basin.
    Timing-Sensitive Information Flow Analysis for Synchronous Systems
    .
    ETH Zurich, Technical Report 526, 2006.
    [BibTeX (TXT, 352 Bytes) | PDF (PDF, 284 KB) | gzip'ed Postscript (GZ, 163 KB) | URL]
  • Boris Köpf and David Basin.
    Timing-Sensitive Information Flow Analysis for Synchronous Systems
    .
    In ESORICS '06.LNCS, 4189. Springer Verlag, 2006.
    [BibTeX (TXT, 479 Bytes) | PDF (PDF, 267 KB) | gzip'ed Postscript (GZ, 115 KB) | DOI]
  • J. M. Küster and J. Koehler and R. Hauser and K. Ryndina and J. Vanhatalo and M. Wahler.
    Methodology and Tooling to Combine an Existing Legacy Business Process Model with Best-Practice Industry Reference Models for Business Transformation
    .
    IBM Research technical report RZ 3663, 2006.
    [BibTeX (TXT, 491 Bytes) | PDF (PDF, 796 KB)]
  • Alice Y. Liu and Samuel Müller and Ke Xu.
    A Static Compliance Checking Framework for Business Process Models
    .
    IBM Research, Technical Report RZ 3679, 2006.
    [BibTeX (TXT, 2 KB)]
  • Sebastian Mödersheim.
    On the Relationships between Models in Protocol Verification (Extended Version)
    .
    Infsec, ETH Zuerich, Technical Report 512, 2006.
    [abstract (TXT, 1001 Bytes) | BibTeX (TXT, 1 KB) | PDF (PDF, 339 KB) | URL]
  • Samuel Müller.
    A Dependability Perspective On Enterprise Compliance
    .
    IBM Research, Technical Report RZ 3667, 2006.
    [abstract (TXT, 803 Bytes) | BibTeX (TXT, 1 KB)]
  • Samuel Müller and Birgit Pfitzmann.
    Effektives Compliance Management.
    In digma - Zeitschrift für Datenrecht und Informationssicherheit, 6 (1), pages 36-39, 2006.
    Schulthess Juristische Medien AG, Zürich
    [BibTeX (TXT, 387 Bytes)]
  • Samuel Müller and Birgit Pfitzmann.
    Compliance Management basierend auf Gesetzesformalisierungen - Das REALM-Projekt
    .
    In Tagungsband des 9. Internationalen Rechtsinformatik Symposions (IRIS 2006)., 2006.
    Richard Boorberg Verlag GmbH
    [BibTeX (TXT, 477 Bytes)]
  • Samuel Müller and Chonawee Supatgiat.
    Dynamic and Risk-based Compliance Management
    .
    IBM Research, Technical Report RZ 3656, 2006.
    [abstract (TXT, 2 KB) | BibTeX (TXT, 2 KB)]
  • Rolf Oppliger and Ralf Hauser and David Basin.
    Browser Enhancements to Support SSL/TLS Session-Aware User Authentication.
    In W3C Workshop on Transparency and Usability of Web Authentication.Proceedings of the World Wide Web Consortium (W3C), 2006.
    [BibTeX (TXT, 654 Bytes) | PDF (PDF, 97 KB) | Ⓒ W3C]
  • Rolf Oppliger and Ralf Hauser and David Basin.
    SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle.
    In Computer Communications, 29, pages 2238-2246, 2006.
    [BibTeX (TXT, 5 KB)]
  • Alexander Pretschner.
    Zur Kosteneffektivitaet des modellbasierten Testens
    .
    In Dagstuhl Workshop Modellbasierte Entwicklung eingebetteter Systeme. Technische Universitaet Braunschweig, 2006.
    [BibTeX (TXT, 382 Bytes)]
  • Alexander Pretschner and Manuel Hilty and David Basin.
    Distributed Usage Control
    .
    In Communications of the ACM, 49 (9), pages 39-44, 2006.
    This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Communications of the ACM 49(9):39-44, September 2006)
    [BibTeX (TXT, 602 Bytes) | ACM]
  • Alexander Pretschner and Wolfgang Prenninger.
    Computing Refactorings of State Machines
    .
    In J. Software Systems Modeling, 2006.
    [BibTeX (TXT, 289 Bytes)]
  • M. Rappl and A. Pretschner and C. Salzmann and T. Stauner.
    3rd International Workshop on Software Engineering for Automotive Systems - SEAS 2006.
    In 28th Intl. Conf. on Software Engineering (ICSE'06).
    ACM, 2006.
    [BibTeX (TXT, 389 Bytes) | ACM]
  • Paul E. Sevinç and David Basin.
    Controlling Access to Documents: A Formal Access Control Model
    .
    ETH Zurich, Technical Report 517, 2006.
    [abstract (TXT, 541 Bytes) | BibTeX (TXT, 952 Bytes) | PDF (PDF, 447 KB) | URL]
  • Paul E. Sevinç and David Basin and Ernst-Rüdiger Olderog.
    Controlling Access to Documents: A Formal Access Control Model
    .
    In ETRICS 2006.LNCS, 3995. Springer-Verlag, 2006.
    [BibTeX (TXT, 496 Bytes) | DOI]
  • Christoph Sprenger and Michael Backes and David Basin and Birgit Pfitzmann and Michael Waidner.
    Cryptographically Sound Theorem Proving
    .
    In 19th IEEE Computer Security Foundations Workshop, Venice, Italy.IEEE Computer Society, 2006.
    [abstract (TXT, 1 KB) | BibTeX (TXT, 1 KB) | PDF (PDF, 145 KB) | DOI]
  • Christoph Sprenger and Michael Backes and David Basin and Birgit Pfitzmann and Michael Waidner.
    Cryptographically Sound Theorem Proving
    .
    Cryptology ePrint Archive, Technical Report 2006/047, 2006.
    [BibTeX (TXT, 420 Bytes) | URL]
  • M. Utting and A. Pretschner and B. Legeard.
    A taxonomy of model-based testing.
    Department of Computer Science, The Universiy of Waikato (New Zealand), Technical Report 04/2006, 2006.
    [BibTeX (TXT, 406 Bytes) | PDF (PDF, 206 KB)]
  • Luca Viganò.
    Automated Security Protocol Analysis With the AVISPA Tool
    .
    In Electronic Notes in Theoretical Computer Science
    Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics, MFPS XXI, 155, pages 61-86, 2006.
    [BibTeX (TXT, 468 Bytes) | DOI]
  • Michael Wahler and Jana Koehler and Achim D. Brucker.
    Model-Driven Constraint Engineering.
    In Workshop on OCL for (Meta-)Models in Multiple Application Domains at the UML/MoDELS Conference., 2006.
    [abstract (TXT, 888 Bytes) | BibTeX (TXT, 1 KB) | PDF (PDF, 5.8 MB) | URL]
  • Alessandro Armando and David Basin and Jorge Cuellar and Michaël Rusinowitch and Luca Viganò.
    Automated Reasoning for Security Protocol Analysis

    Special Issue of the Journal of Automated Reasoning, volume 36, numbers 1 and 2, doi 10.1007/s10817-005-9014-x
    In Springer Netherlands, 2006.
    [BibTeX (TXT, 421 Bytes)]
  • Pierpaolo Degano and Luca Viganò.
    Special Issue of Theoretical Computer Science on Automated Reasoning for Security Protocol Analysis
    volume 367, numbers 1 and 2, doi 10.1016/j.tcs.2006.08.031
    In Elsevier Science, 2006.
    [BibTeX (TXT, 345 Bytes) | DOI]
  • Pierpaolo Degano and Luca Viganò.
    Special Issue of the International Journal of Information Security on Automated Reasoning for Security Protocol Analysis
    .
    In Springer, 2006.
    In print
    [BibTeX (TXT, 353 Bytes)]
  • Manuel Núñez García and Klaus Havelund and Grigore Rosu and Burkhart Wolff. Proceedings of the International Workshop on Formal Aspects of Testing and Runtime Verification (FATES/RV).
    In Springer Verlag, 2006.
    LNCS 4262.
    [abstract (TXT, 537 Bytes) | BibTeX (TXT, 883 Bytes) | DOI]
  • M. Rappl and A. Pretschner and C. Salzmann and T. Stauner.
    Proceedings of the 2006 international workshop on Software engineering for automotive systems.
    In ACM, 2006.
    ISBN:1-59593-402-2
    [BibTeX (TXT, 364 Bytes) | DOI]
 
 
Page URL: http://www.infsec.ethz.ch/research/publications/pub2006.html
Fri Mar 31 00:38:14 CEST 2017
© 2017 Eidgenössische Technische Hochschule Zürich