Publications 2012
- David Basin, Samuel J. Burri, and Günter Karjoth
Dynamic Enforcement of Abstract Separation of Duty Constraints
In Journal ACM Transactions on Information and System Security (TISSEC)
Pages 13:1--13:30, 2012.
[DownloadBibTex (TXT, 678 Bytes)vertical_align_bottom | external pageDOIcall_made] - Joel Reardon, Claudio Marforio, Srdjan Capkun, and David Basin
User-level Secure Deletion on Log-structured File Systems
In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Pages 63-64, 2012.
[DownloadBibTex (TXT, 659 Bytes)vertical_align_bottom | external pageDOIcall_made] - David Basin, Vincent Juge, Felix Klaedtke, Eugen Zalinescu
Enforceable Security Policies Revisited
In ACM Transactions on Information and System Security (TISSEC). to appear.
[DownloadBibTex (BIB, 318 Bytes)vertical_align_bottom | DownloadPDF (PDF, 467 KB)vertical_align_bottom] - Cas Cremers and Sjouke Mauw
Operational Semantics and Verification of Security Protocols
2012, XIII, 172 p. 59 illus.
Hardcover, ISBN 978-3-540-78635-1
[DownloadCoververtical_align_bottom | external pageDOIcall_made] - David Basin, Srdjan Capkun
The Research Value of Publishing Attacks
In Privacy and Security, Communications of the ACM, Vol. 55, No. 11, Pages 22-24
[DownloadPDF (PDF, 138 KB)vertical_align_bottom | external pageDOIcall_made] - Sasa Radomirovic
A Construction of Short Sequences Containing All Permutations of a Set as Subsequences.
In Electronic Journal of Combinatorics, 19 (4): Paper 31, 11 pp., 2012.
[external pageURLcall_made] - Michael Schläpfer and Melanie Volkamer
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem
In Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance. Albany, October 2012
[external pageDOIcall_made] - David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Zalinescu
Monitoring Compliance Policies over Incomplete and Disagreeing Logs
In Proceedings of the 3rd International Conference on Runtime Verification (RV), Istanbul, September 2012
[DownloadBibTeX (BIB, 423 Bytes)vertical_align_bottom | DownloadPDF (PDF, 429 KB)vertical_align_bottom] - Julian Gutierrez, Felix Klaedtke, and Martin Lange.
The mu-Calculus Alternation Hierarchy Collapses over Structures with Restricted Connectivity.
In Proceedings of the 3rd International Symposium on Games, Automata, Logics and Formal Verification (GandALF), Napoli, September 2012
[external pageURLcall_made] - Cas Cremers and Michèle Feltz
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
In Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS), Pisa, September 2012.
[DownloadBibTeX (BIB, 795 Bytes)vertical_align_bottom | external pageDOIcall_made] - Joel Reardon and Srdjan Capkun and David Basin
Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory
21st USENIX Security Symposium, August 2012
[DownloadBibTeX (TXT, 318 Bytes)vertical_align_bottom | DownloadPDF (PDF, 406 KB)vertical_align_bottom | external pageURLcall_made | Downloadslides (PDF, 406 KB)vertical_align_bottom] - Oliver Spycher, Rolf Haenni, Reto Koenig, and Michael Schläpfer
Achieving Meaningful Efficiency in Coercion-Resistant, Verifiable Internet Voting
In Proceedings of the 5th International Conference on Electronic Voting. Bregenz, July 2012
[DownloadBibTeX (BIB, 253 Bytes)vertical_align_bottom | DownloadPDF (PDF, 9 KB)vertical_align_bottom] - Benedikt Schmidt and Simon Meier and Cas Cremers and David Basin
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties
In Proceedings of the 25th IEEE
Computer Security Foundations Symposium (CSF), Harvard, 2012
[DownloadBibTeX (TXT, 396 Bytes)vertical_align_bottom | DownloadPDF (PDF, 1.8 MB)vertical_align_bottom | external pageDOIcall_made] - Christoph Sprenger and David Basin
Refining key Establishment
In Proceedings of the 25th IEEE
Computer Security Foundations Symposium (CSF), Harvard University, Cambridge, MA, June, 2012
[DownloadBibTeX (TXT, 308 Bytes)vertical_align_bottom | DownloadPDF (PDF, 382 KB)vertical_align_bottom | external pageDOIcall_made] - Cas Cremers and Kasper Rasmussen and Benedikt Schmidt and Srdjan Capkun
Distance Hijacking Attacks on Distance Bounding Protocols
In Proceedings of the 33rd IEEE Symposium on Security and Privacy (Oakland S&P), San Francisco, May 2012
[DownloadBibTeX (BIB, 322 Bytes)vertical_align_bottom | external pageURLcall_made] - Stefan Hallerstede and Thai Son Hoang
Refinement by Interface Instantiation
In Proceedings of the 3rd International Conference, ABZ2012, LNCS, volume 7316, pages 223–237, Pisa Italy, June 2012, Springer-Verlag
[DownloadBibTeX (TXT, 957 Bytes)vertical_align_bottom | DownloadPDF (PDF, 4.3 MB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Samuel J. Burri and Günter Karjoth
Optimal Workflow-aware Authorizations
In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT '12), pages 93–102, Newark USA, June 2012, ACM Press
[DownloadBibTeX (TXT, 638 Bytes)vertical_align_bottom | DownloadPDF (PDF, 429 KB)vertical_align_bottom | external pageDOIcall_made] - Joel Reardon and Claudio Marfolio and Srdjan Capkun and David Basin
Secure Deletion on Log-structured File Systems
ASIACCS'12, May 2012
[DownloadBibTeX (BIB, 199 Bytes)vertical_align_bottom | DownloadPDF (PDF, 629 KB)vertical_align_bottom | Downloadslides (PDF, 1.1 MB)vertical_align_bottom] - David Basin and Cas Cremers and Simon Meier
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
In Proceedings of the 1st Conference on Principles of Security and Trust (POST 2012)
LNCS 7215, pages 129-148, Springer, 2012.
[DownloadBibTeX (TXT, 501 Bytes)vertical_align_bottom | DownloadPDF (PDF, 515 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Vincent Juge and Felix Klaedtke and Eugen Zalinescu
Enforceable Security Policies Revisited
In Proceedings of the 1st Conference on Principles of Security and Trust (POST 2012)
Lecture Notes in Computer Science, volume 7215, pages 309-328. Springer, 2012
[DownloadBibTeX (TXT, 484 Bytes)vertical_align_bottom | external pageDOIcall_made] - Anton Wijs and Mohammad Torabi Dashti
Extended beam search for non-exhaustive state space analysis
In The Journal of Logic and Algebraic Programming, 81 (1), pages 46-69, 2012
[DownloadBibTeX (TXT, 1 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Cas Cremers and Catherine Meadows.
Model Checking Security Protocols
Springer, 2012
To appear
[DownloadBibTeX (TXT, 2 KB)vertical_align_bottom] - David Basin and Matúvs Harvan and Felix Klaedtke and Eugen Zalinescu
MONPOLY: Monitoring Usage-control Policies
In Proceedings of the 2nd International Conference on Runtime Verification (RV 2011)
Lecture Notes in Computer Science, volume 7186, pages 360-364. Springer, 2012
[DownloadBibTeX (TXT, 453 Bytes)vertical_align_bottom | external pageDOIcall_made] - David Basin and Felix Klaedtke and Eugen Zalinescu
Algorithms for Monitoring Real-time Properties
In Proceedings of the 2nd International Conference on Runtime Verification (RV 2011).
Lecture Notes in Computer Science, volume 7186, pages 260-275. Springer, 2012
[DownloadBibTeX (TXT, 453 Bytes)vertical_align_bottom | external pageDOIcall_made] - Tom Hvitved and Felix Klaedtke and Eugen Zalinescu
A trace-based model for multiparty contracts
In The Journal of Logic and Algebraic Programming, 81 (2), pages 72-98, 2012
[DownloadBibTeX (TXT, 367 Bytes)vertical_align_bottom | external pageDOIcall_made] - Mario Frank and Andreas P. Streich and David Basin and Joachim M. Buhmann
Multi-assignment clustering for Boolean data
In Journal of Machine Learning Research, volume 13, pages 459-489, Feb. 2012
[DownloadBibTeX (TXT, 285 Bytes)vertical_align_bottom | DownloadPDF (PDF, 1.1 MB)vertical_align_bottom | external pageURLcall_made]
- Petar Tsankov and Mohammad Torabi Dashti and David Basin
SecFuzz: Fuzz-testing Security Protocols
In Proceedings of the 7th International Workshop on Automation of Software Test (AST 2012)
[DownloadBibTeX (TXT, 404 Bytes)vertical_align_bottom | DownloadPDF (PDF, 122 KB)vertical_align_bottom | external pageDOIcall_made]