Publications 2003
- Abdelwaheb Ayari and David Basin and Felix Klaedtke.
Decision Procedures for Inductive Boolean Functions based on Alternating Automata.
In Theoretical Computer Science, 300 (1-3), pages 301-329, 2003.
[Downloadabstract (TXT, 765 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 388 KB)vertical_align_bottom | Downloadgzip'ed Postscript (GZ, 169 KB)vertical_align_bottom | external pageDOIcall_made]
- David Basin and Jürgen Doser and Torsten Lodderstedt.
Model Driven Security for Process-Oriented Systems.
In 8th ACM Symposium on Access Control Models and Technologies.
ACM Press, 2003.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 215 KB)vertical_align_bottom | Downloadgzip'ed Postscript (GZ, 182 KB)vertical_align_bottom | external pageDOIcall_made]
- David Basin and Jürgen Doser and Torsten Lodderstedt.
Model Driven Security: from UML Models to Access Control Infrastructures. ETH Zürich, Technical Report 414, 2003.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 434 KB)vertical_align_bottom | Downloadgzip'ed Postscript (GZ, 581 KB)vertical_align_bottom]
- David Basin and Stefan Friedrich and Marek Gawkowski.
Bytecode Verification by Model Checking.
In Journal of Automated Reasoning, 30 (3-4), pages 399-444, 2003.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 518 KB)vertical_align_bottom | external pageDOIcall_made]
- David Basin and Sebastian Mödersheim and Luca Viganò.
An On-The-Fly Model-Checker for Security Protocol Analysis.
In Proceedings of Esorics'03. LNCS 2808 Springer-Verlag, 2003.
[Downloadabstract (TXT, 712 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 245 KB)vertical_align_bottom | Downloadgzip'ed Postscript (GZ, 239 KB)vertical_align_bottom | external pageDOIcall_made]
- David Basin and Sebastian Mödersheim and Luca Viganò.
Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols (Extended Abstract).
In SPV'03. 2003.
[Downloadabstract (TXT, 992 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom]
- David Basin and Sebastian Mödersheim and Luca Viganò.
Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols.
In CCS'03. ACM Press, 2003.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 194 KB)vertical_align_bottom | Downloadgzip'ed Postscript (GZ, 176 KB)vertical_align_bottom | external pageDOIcall_made]
- David Basin and Sebastian Mödersheim and Luca Viganò.
An On-The-Fly Model-Checker for Security Protocol Analysis.
ETH Zürich, Computer Science, Technical Report 404, 2003.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 373 KB)vertical_align_bottom | Downloadgzip'ed Postscript (GZ, 374 KB)vertical_align_bottom | URL]
- David Basin and Sebastian Mödersheim and Luca Viganò.
Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols.
ETH Zürich, Computer Science, Technical Report 405, 2003.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 324 KB)vertical_align_bottom | Downloadgzip'ed Postscript (GZ, 299 KB)vertical_align_bottom]
- Achim D. Brucker and Frank Rittinger and Burkhart Wolff.
HOL-Z 2.0: A Proof Environment for Z-Specifications.
In Journal of Universal Computer Science, 9 (2), pages 152-172, 2003.
[Downloadabstract (TXT, 939 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 259 KB)vertical_align_bottom | Downloadgzip'ed Postscript (GZ, 257 KB)vertical_align_bottom | external page© J.UCScall_made]
- Achim D. Brucker and Burkhart Wolff.
A Case Study of a Formalized Security Architecture.
In Eighth International Workshop onFormal Methods for Industrial Critical Systems (FMICS'03), 80.
Elsevier Science Publishers, 2003.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 246 KB)vertical_align_bottom | Downloadgzip'ed Postscript (GZ, 257 KB)vertical_align_bottom | external pageDOIcall_made]
- Achim D. Brucker and Burkhart Wolff.
Using Theory Morphisms for Implementing Formal Methods Tools.
In Types 2002, Proceedings of the workshop Types for Proof and Programs.
LNCS 2646. Springer-Verlag, 2003.
[Downloadabstract (TXT, 954 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | external pageDOIcall_made]
- S. Gauch and J. Chaffee and A. Pretschner.
Ontology-Based Personalized Search and Browsing.
In J. Web Intelligence and Agent Systems, 1 (3-4), pages 219-234, 2003.
[DownloadBibTeX (TXT, 334 Bytes)vertical_align_bottom]
- G. Hahn and J. Philipps and A. Pretschner and T. Stauner.
Prototype-based Tests for Hybrid Reactive Systems.
In Proceeding of the 14th IEEE International workshop on Rapid System Prototyping. IEEE, 2003.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | external pageDOIcall_made]
- Heiko Mantel.
A Uniform Framework for the Formal Specification and Verification of Information Flow Security.
Saarland University, 2003.
[DownloadBibTeX (TXT, 292 Bytes)vertical_align_bottom]
- Heiko Mantel and Andrei Sabelfeld.
A Unifying Approach to the Security of Distributed and Multi-threaded Programs.
In Journal of Computer Security, 11 (4), 2003.
[DownloadBibTeX (TXT, 313 Bytes)vertical_align_bottom | URL]
- J. Philipps and A. Pretschner and O. Slotosch and E. Aiglstorfer.
Model-Based Test Case Generation for Smart Cards.
In Electronic Notes in Theoretical Computer Science, 80, pages 168-182, 2003.
[Downloadabstract (TXT, 750 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | external pageDOIcall_made]
- A. Pretschner.
Compositional Generation of MC/DC Integration Test Suites.
In Electronic Notes in Theoretical Computer Science, 82 (6), pages 1-11, 2003.
[Downloadabstract (TXT, 496 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 777 Bytes)vertical_align_bottom | external pageDOIcall_made]
- Nicole Rauch and Burkhart Wolff.
Formalizing Java's Two's-Complement Integral Type in Isabelle/HOL.
In Electronic Notes in Theoretical Computer Science, 80. Elsevier Science Publishers, 2003.
[Downloadabstract (TXT, 743 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 204 KB)vertical_align_bottom | external pageDOIcall_made]
- Anindya Banerjee and Heiko Mantel and David Naumann and Andrei Sabelfeld.
Final Report on Seminar 03411: Language-Based Security.
Dagstuhl, 2003.
[DownloadBibTeX (TXT, 292 Bytes)vertical_align_bottom]
- Dieter Hutter and Heiko Mantel and Axel Schairer.
Informationsflusskontrolle als Grundlage für die Sicherheit von Multiagentensystemen.
In Praxis der Informationsverarbeitung und Kommunikation (PIK), 26 (1), pages 39-47, 2003.
[DownloadBibTeX (TXT, 414 Bytes)vertical_align_bottom | external pageDOIcall_made]
- David Basin and Burkhart Wolff.
Theorem Proving in Higher Order Logics, 16th International Conference (TPHOLs 2003).
In Springer-Verlag, 2003.
LNCS 2758.
[Downloadabstract (TXT, 1007 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | Downloadcover (JPEG, 5 KB)vertical_align_bottom | external pageDOIcall_made]
- Michael Backes and David Basin and Michael Waidner.
Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering.
In ACM Press, 2003.
[DownloadBibTeX (TXT, 665 Bytes)vertical_align_bottom | Downloadcover (PNG, 7 KB)vertical_align_bottom | external pageACM, Inc.call_made]