Publications 2009
- David Basin and Samuel Burri and Guenter Karjoth.
Dynamic Enforcement of Abstract Separation of Duty Constraints.
In 14th European Symposium on Research in Computer Security (ESORICS).5789, 5789. Springer-Verlag, 2009.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 331 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Carlos Caliero and Jaime Ramos and Luca Vigano.
Labelled Tableaux for Distributed Temporal Logic.
In Journal of Logic and Computation, 19 (6), pages 1245-1279, 2009.
[DownloadBibTeX (TXT, 456 Bytes)vertical_align_bottom | external pageDOIcall_made] - David Basin and Srdjan Capkun and Patrick Schaller and Benedikt Schmidt.
Let's Get Physical: Models and Methods for Real-World Security Protocols.
In Theorem Proving in Higher Order Logics (TPHOLs 2009). LNCS, 5674. Springer, 2009. Invited talk.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Manuel Clavel and Jürgen Doser and Marina Egea.
Automated analysis of security-design models.
In Information and Software Technology, 51 (5), pages 815-831, 2009.
[DownloadBibTeX (TXT, 394 Bytes)vertical_align_bottom | DownloadPDF (PDF, 974 KB)vertical_align_bottom | external pageDOIcall_made] - Patrik Bichsel and Samuel Müller and Franz-Stefan Preiss and Dieter Sommer and Mario Verdicchio.
Security and Trust through Electronic Social Network-based Interactions.
In Workshop on Security and Privacy in Online Social Networking (SPOSN '09). IEEE Computer Society Press, 2009.
[DownloadBibTeX (TXT, 459 Bytes)vertical_align_bottom] - Achim D. Brucker and Burkhart Wolff.
Semantics, Calculi, and Analysis for Object-Oriented Specifications.
In Acta Informatica, 46 (4), pages 255-284, 2009.
[Downloadabstract (TXT, 848 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 377 KB)vertical_align_bottom | external pageDOIcall_made] - Cas J.F. Cremers.
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange.
2009
[DownloadBibTeX (TXT, 330 Bytes)vertical_align_bottom | external pageURLcall_made] - Cas J.F. Cremers.
Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS key exchange protocol.
In ACNS'09. LNCS, 5536. Springer, 2009.
[DownloadBibTeX (TXT, 401 Bytes)vertical_align_bottom | external pageDOIcall_made] - Cas Cremers and David Basin.
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries.
2009
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | external pageURLcall_made] - Cas J.F. Cremers and Pascal Lafourcade and Philippe Nadeau.
Comparing State Spaces in Automatic Security Protocol Analysis.
Springer, 2009.
[DownloadBibTeX (TXT, 599 Bytes)vertical_align_bottom | external pageDOIcall_made] - M. Torabi Dashti.
Optimistic fair exchange using trusted devices.
ETH Zurich, Technical Report 635, 2009.
[DownloadBibTeX (TXT, 376 Bytes)vertical_align_bottom | DownloadPDF (PDF, 150 KB)vertical_align_bottom | URL] - Mohammad Torabi Dashti.
Optimistic Fair Exchange Using Trusted Devices.
In Stabilization, Safety, and Security of Distributed Systems. LNCS, 5873. Springer, 2009.
[BibTeX | external pageDOIcall_made] - Christian Dax and Felix Klaedtke and Martin Lange.
On Regular Temporal Logics with Past.
In 36th International Colloquium on Automata, Languages, and Programming (ICALP'09). Lecture Notes in Computer Science, 5556. Springer-Verlag, 2009.
[DownloadBibTeX (TXT, 481 Bytes)vertical_align_bottom | external pageDOIcall_made] - Christian Dax and Felix Klaedtke and Stefan Leue.
Specification Languages for Stutter-Invariant Regular Properties.
In 7th International Symposium on Automated Technology for Verification and Analysis (ATVA). Lecture Notes in Computer Science, 5799. Springer-Verlag, 2009.
[DownloadBibTeX (TXT, 498 Bytes)vertical_align_bottom | external pageDOIcall_made] - Mario Frank and Matthias Plaue and Holger Rapp and Ullrich Köthe and Bernd Jähne and Fred A. Hamprecht.
Theoretical and Experimental Error Analysis of Continuous-Wave Time-Of-Flight Range Cameras.
In Optical Engineering, 48 (1), 2009.
[Downloadabstract (TXT, 942 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 2 MB)vertical_align_bottom | external pageDOIcall_made] - Mario Frank and Matthias Plaue and Fred A. Hamprecht.
Denoising of Continuous-Wave Time-Of-Flight Depth Images using Confidence Measures.
In Optical Engineering, 48 (7), 2009.
[DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 2.5 MB)vertical_align_bottom | external pageDOIcall_made] - Mario Frank and Andreas P. Streich and David Basin and Joachim M. Buhmann.
A Probabilistic Approach to Hybrid Role Mining.
In 16th ACM Conference on Computer and Communications Security (CCS 2009). ACM, 2009.
[DownloadBibTeX (TXT, 2 KB)vertical_align_bottom] - Stefan Hallerstede and Thai Son Hoang.
Qualitative Reasoning for the Dining Philosophers.
2009, Dagstuhl Seminar 09381
[DownloadBibTeX (TXT, 351 Bytes)vertical_align_bottom | external pageURLcall_made] - Matus Harvan and Alexander Pretschner.
State-based Usage Control Enforcement with Data Flow Tracking using System Call Interposition.
In 3rd International Conference on Network & System Security. IEEE, 2009.
[DownloadBibTeXvertical_align_bottom] - Thai Son Hoang.
Event-B Decomposition for Parallel Programs.
2009, Dagstuhl Seminar 09318
[DownloadBibTeX (TXT, 309 Bytes)vertical_align_bottom | external pageURLcall_made] - Thai Son Hoang and Jean-Raymond Abrial.
Event-B Development of the FindP Program.
Department of Computer Science, ETH Zurich, Technical Report 653, 2009.
[Downloadabstract (TXT, 719 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 969 Bytes)vertical_align_bottom | URL] - Thai Son Hoang and David Basin and Jean-Raymond Abrial.
Specifying Access Control in Event-B.
Department of Computer Science, ETH Zurich, Technical Report 624, 2009.
[Downloadabstract (TXT, 704 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 955 Bytes)vertical_align_bottom | URL] - Thai Son Hoang and Andreas Fürst and Jean-Raymond Abrial.
Event-B Patterns and Their Tool Support.
In SEFM 2009. IEEE Computer Society Press, 2009.
[DownloadBibTeX (TXT, 370 Bytes)vertical_align_bottom] - Thai Son Hoang and Hironobu Kuruma and David A. Basin and Jean-Raymond Abrial.
Developing Topology Discovery in Event-B.
In 7th International Conference on Integrated Formal Methods (IFM). LNCS, 5423. Springer, 2009.
[DownloadBibTeX (TXT, 556 Bytes)vertical_align_bottom | DownloadPDF (PDF, 390 KB)vertical_align_bottom | external pageDOIcall_made] - Thai Son Hoang and Hironobu Kuruma and David Basin and Jean-Raymond Abrial.
Developing Topology Discovery in Event-B.
In Science of Computer Programming, 74 (11-12), pages 879-899, 2009.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | external pageDOIcall_made] - S. Mauw and S. Radomirovic and M. Torabi Dashti.
Minimal message complexity of asynchronous multi-party contract signing.
In CSF. IEEE CS, 2009.
[DownloadBibTeX (TXT, 334 Bytes)vertical_align_bottom | external pageDOIcall_made] - Bruno Montalto and Carlos Caleiro.
Modeling and Reasoning About an Attacker with Cryptanalytical Capabilities.
2009.
[DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 268 KB)vertical_align_bottom] - Samuel Müller.
Theory and Applications of Runtime Monitoring Metric First-order Temporal Logic.
ETH Zurich,2009. DISS. ETH No. 18445
[DownloadBibTeX (TXT, 288 Bytes)vertical_align_bottom | DownloadPDF (PDF, 2.7 MB)vertical_align_bottom | URL] - Alexander Pretschner and Matthias Büchler and Matus Harvan and Christian Schaefer and Thomas Walter.
Usage Control Enforcement with Data Flow Tracking for X11 .
In 5th International Workshop on Security and Trust Management (STM 2009)., 2009.
[Downloadabstract (TXT, 887 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom] - Patrick Schaller and Benedikt Schmidt and David Basin and Srdjan Capkun.
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks.
In 22nd IEEE Computer Security Foundations Symposium., 2009.
[Downloadabstract (TXT, 898 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 276 KB)vertical_align_bottom] - Michael Schläpfer and Marina Egea and David Basin and Manuel Clavel.
Automatic Generation of Security-Aware GUI Models.
In European Workshop on Security in Model Driven Architecture 2009 (SECMDA 2009).,
[Downloadabstract (TXT, 898 Bytes)vertical_align_bottom | DownloadBibTeX (TXT, 1 KB)vertical_align_bottom] - Matthias Schmalz and Daniele Varacca and Hagen Völzer.
Counterexamples in Probabilistic LTL Model Checking for Markov Chains.
In Concur 2009. LNCS, 5710. Springer, 2009.
[DownloadBibTeX (TXT, 480 Bytes)vertical_align_bottom | external pageDOIcall_made] - Andreas P. Streich and Mario Frank and David Basin and Joachim M. Buhmann.
Multi-Assignment Clustering for Boolean Data.
In Proceedings of the 26th International Conference on Machine Learning. ACM, 2009.
[Downloadabstract (TXT, 1 KB)vertical_align_bottom | DownloadBibTeX (TXT, 2 KB)vertical_align_bottom | external pageDOIcall_made] - David A. Basin and Srdjan Capkun and Wenke Lee.
Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland March 16-19, 2009.
In ACM, 2009. Book Title: WiSec'09
[DownloadBibTeX (TXT, 391 Bytes)vertical_align_bottom | Downloadcover (JPEG, 10 KB)vertical_align_bottom | external pageDOIcall_made]