Publications 2012

Main content

  • David Basin, Samuel J. Burri, and Günter Karjoth
    Dynamic Enforcement of Abstract Separation of Duty Constraints
    In Journal ACM Transactions on Information and System Security (TISSEC)
    Pages 13:1--13:30, 2012.
    [BibTex (TXT, 678 Bytes) | DOI]
  • Joel Reardon, Claudio Marforio, Srdjan Capkun, and David Basin
    User-level Secure Deletion on Log-structured File Systems
    In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
    Pages 63-64, 2012.
    [BibTex (TXT, 659 Bytes) | DOI]
  • David Basin, Vincent Juge, Felix Klaedtke, Eugen Zalinescu
    Enforceable Security Policies Revisited
    In ACM Transactions on Information and System Security (TISSEC). to appear.
    [BibTex (BIB, 318 Bytes) | PDF (PDF, 467 KB)]
  • Cas Cremers and Sjouke Mauw
    Operational Semantics and Verification of Security Protocols
    2012, XIII, 172 p. 59 illus.
    Hardcover, ISBN 978-3-540-78635-1
    [Cover | DOI]
  • David Basin, Srdjan Capkun
    The Research Value of Publishing Attacks
    In Privacy and Security, Communications of the ACM, Vol. 55, No. 11, Pages 22-24
    [PDF (PDF, 138 KB) | DOI]
  • Sasa Radomirovic
    A Construction of Short Sequences Containing All Permutations of a Set as Subsequences.
    In Electronic Journal of Combinatorics, 19 (4): Paper 31, 11 pp., 2012.
    [URL]
  • Michael Schläpfer and Melanie Volkamer
    The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem
    In Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance. Albany, October 2012
    [DOI]
  • David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Zalinescu
    Monitoring Compliance Policies over Incomplete and Disagreeing Logs
    In Proceedings of the 3rd International Conference on Runtime Verification (RV), Istanbul, September 2012
    [BibTeX (BIB, 423 Bytes) | PDF (PDF, 429 KB)]
  • Julian Gutierrez, Felix Klaedtke, and Martin Lange.
    The mu-Calculus Alternation Hierarchy Collapses over Structures with Restricted Connectivity.
    In Proceedings of the 3rd International Symposium on Games, Automata, Logics and Formal Verification (GandALF), Napoli, September 2012
    [URL]
  • Cas Cremers and Michèle Feltz
    Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
    In Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS), Pisa, September 2012.
    [BibTeX (BIB, 795 Bytes) | DOI]
  • Joel Reardon and Srdjan Capkun and David Basin
    Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory
    21st USENIX Security Symposium, August 2012
    [BibTeX (TXT, 318 Bytes) | PDF (PDF, 406 KB) | URL | slides (PDF, 406 KB)]
  • Oliver Spycher, Rolf Haenni, Reto Koenig, and Michael Schläpfer
    Achieving Meaningful Efficiency in Coercion-Resistant, Verifiable Internet Voting
    In Proceedings of the 5th International Conference on Electronic Voting. Bregenz, July 2012
    [BibTeX (BIB, 253 Bytes) | PDF (PDF, 9 KB)]
  • Benedikt Schmidt and Simon Meier and Cas Cremers and David Basin
    Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties
    In Proceedings of the 25th IEEE
    Computer Security Foundations Symposium (CSF), Harvard, 2012
    [BibTeX (TXT, 396 Bytes) | PDF (PDF, 1.8 MB) | DOI]
  • Christoph Sprenger and David Basin
    Refining key Establishment
    In Proceedings of the 25th IEEE
    Computer Security Foundations Symposium (CSF)
    , Harvard University, Cambridge, MA, June, 2012
    [BibTeX (TXT, 308 Bytes) | PDF (PDF, 382 KB) | DOI]
  • Cas Cremers and Kasper Rasmussen and Benedikt Schmidt and Srdjan Capkun
    Distance Hijacking Attacks on Distance Bounding Protocols
    In Proceedings of the 33rd IEEE Symposium on Security and Privacy (Oakland S&P), San Francisco, May 2012
    [BibTeX (BIB, 322 Bytes) | URL]
  • Stefan Hallerstede and Thai Son Hoang
    Refinement by Interface Instantiation
    In Proceedings of the 3rd International Conference, ABZ2012, LNCS, volume 7316, pages 223–237, Pisa Italy, June 2012, Springer-Verlag
    [BibTeX (TXT, 957 Bytes) | PDF (PDF, 4.3 MB) | DOI]
  • David Basin and Samuel J. Burri and Günter Karjoth
    Optimal Workflow-aware Authorizations
    In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT '12), pages 93–102, Newark USA, June 2012, ACM Press
    [BibTeX (TXT, 638 Bytes) | PDF (PDF, 429 KB) | DOI]
  • Joel Reardon and Claudio Marfolio and Srdjan Capkun and David Basin
    Secure Deletion on Log-structured File Systems
    ASIACCS'12, May 2012
    [BibTeX (BIB, 199 Bytes) | PDF (PDF, 629 KB) | slides (PDF, 1.1 MB)]
  • David Basin and Cas Cremers and Simon Meier
    Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
    In Proceedings of the 1st Conference on Principles of Security and Trust (POST 2012)
    LNCS 7215, pages 129-148, Springer, 2012.
    [BibTeX (TXT, 501 Bytes) | PDF (PDF, 515 KB) | DOI]
  • David Basin and Vincent Juge and Felix Klaedtke and Eugen Zalinescu
    Enforceable Security Policies Revisited
    In Proceedings of the 1st Conference on Principles of Security and Trust (POST 2012)
    Lecture Notes in Computer Science, volume 7215, pages 309-328. Springer, 2012
    [BibTeX (TXT, 484 Bytes) | DOI]
  • Anton Wijs and Mohammad Torabi Dashti
    Extended beam search for non-exhaustive state space analysis
    In The Journal of Logic and Algebraic Programming, 81 (1), pages 46-69, 2012
    [BibTeX (TXT, 1 KB) | DOI]
  • David Basin and Cas Cremers and Catherine Meadows.
    Model Checking Security Protocols
    Springer, 2012
    To appear
    [BibTeX (TXT, 2 KB)]
  • David Basin and Matúvs Harvan and Felix Klaedtke and Eugen Zalinescu
    MONPOLY: Monitoring Usage-control Policies
    In Proceedings of the 2nd International Conference on Runtime Verification (RV 2011)
    Lecture Notes in Computer Science, volume 7186, pages 360-364. Springer, 2012
    [BibTeX (TXT, 453 Bytes) | DOI]
  • David Basin and Felix Klaedtke and Eugen Zalinescu
    Algorithms for Monitoring Real-time Properties
    In Proceedings of the 2nd International Conference on Runtime Verification (RV 2011).
    Lecture Notes in Computer Science, volume 7186, pages 260-275. Springer, 2012
    [BibTeX (TXT, 453 Bytes) | DOI]
  • Tom Hvitved and Felix Klaedtke and Eugen Zalinescu
    A trace-based model for multiparty contracts
    In The Journal of Logic and Algebraic Programming, 81 (2), pages 72-98, 2012
    [BibTeX (TXT, 367 Bytes) | DOI]
  • Mario Frank and Andreas P. Streich and David Basin and Joachim M. Buhmann
    Multi-assignment clustering for Boolean data
    In Journal of Machine Learning Research, volume 13, pages 459-489, Feb. 2012
    [BibTeX (TXT, 285 Bytes) | PDF (PDF, 1.1 MB) | URL]
  • Petar Tsankov and Mohammad Torabi Dashti and David Basin
    SecFuzz: Fuzz-testing Security Protocols
    In Proceedings of the 7th International Workshop on Automation of Software Test (AST 2012)
    [BibTeX (TXT, 404 Bytes) | PDF (PDF, 122 KB) | DOI]
 
 
Page URL: http://www.infsec.ethz.ch/research/publications/pub2012.html
Tue Jun 27 14:18:33 CEST 2017
© 2017 Eidgenössische Technische Hochschule Zürich