Search the dblp DataBase
David A. Basin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
David A. Basin Model Driven Security. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:4- [Conf ] Ian Frank , David A. Basin , Alan Bundy Combining Knowledge and Search to Solve Single-Suit Bridge. [Citation Graph (0, 0)][DBLP ] AAAI/IAAI, 2000, pp:195-200 [Conf ] Ian Frank , David A. Basin , Hitoshi Matsubara Finding Optimal Strategies for Imperfect Information Games. [Citation Graph (0, 0)][DBLP ] AAAI/IAAI, 1998, pp:500-507 [Conf ] David A. Basin , Fausto Giunchiglia , Paolo Traverso Automating Meta-Theory Creation and System Extension. [Citation Graph (0, 0)][DBLP ] AI*IA, 1991, pp:48-57 [Conf ] Penny Anderson , David A. Basin Deriving and Applying Logic Program Transformers. [Citation Graph (0, 0)][DBLP ] ASIAN, 1995, pp:301-318 [Conf ] David A. Basin An Environment For Automated Reasoning About Partial Functions. [Citation Graph (0, 0)][DBLP ] CADE, 1988, pp:101-110 [Conf ] David A. Basin Equality of Terms Containing Associative-Commutative Functions and Commutative Binding Operators in Isomorphism Complete. [Citation Graph (0, 0)][DBLP ] CADE, 1990, pp:251-260 [Conf ] David A. Basin , Seán Matthews Structuring Metatheory on Inductive Definitions. [Citation Graph (0, 0)][DBLP ] CADE, 1996, pp:171-185 [Conf ] David A. Basin , Toby Walsh Difference Matching. [Citation Graph (0, 0)][DBLP ] CADE, 1992, pp:295-309 [Conf ] David A. Basin , Toby Walsh Termination Orderings for Rippling. [Citation Graph (0, 0)][DBLP ] CADE, 1994, pp:466-483 [Conf ] David A. Basin , Stefan Friedrich , Joachim Posegga , Harald Vogt Java Bytecode Verification by Model Checking. [Citation Graph (0, 0)][DBLP ] CAV, 1999, pp:491-494 [Conf ] David A. Basin , Nils Klarlund Hardware Verification using Monadic Second-Order Logic. [Citation Graph (0, 0)][DBLP ] CAV, 1995, pp:31-41 [Conf ] Alessandro Armando , David A. Basin , Yohan Boichut , Yannick Chevalier , Luca Compagna , Jorge Cuéllar , Paul Hankes Drielsma , Pierre-Cyrille Héam , Olga Kouchnarenko , Jacopo Mantovani , Sebastian Mödersheim , David von Oheimb , Michaël Rusinowitch , Judson Santiago , Mathieu Turuani , Luca Viganò , Laurent Vigneron The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. [Citation Graph (0, 0)][DBLP ] CAV, 2005, pp:281-285 [Conf ] Alessandro Armando , David A. Basin , Mehdi Bouallagui , Yannick Chevalier , Luca Compagna , Sebastian Mödersheim , Michaël Rusinowitch , Mathieu Turuani , Luca Viganò , Laurent Vigneron The AVISS Security Protocol Analysis Tool. [Citation Graph (0, 0)][DBLP ] CAV, 2002, pp:349-353 [Conf ] Abdelwaheb Ayari , David A. Basin Bounded Model Construction for Monadic Second-Order Logics. [Citation Graph (0, 0)][DBLP ] CAV, 2000, pp:99-112 [Conf ] Abdelwaheb Ayari , David A. Basin , Felix Klaedtke Decision Procedures for Inductive Boolean Functions Based on Alternating Automata. [Citation Graph (0, 0)][DBLP ] CAV, 2000, pp:170-185 [Conf ] David A. Basin , Sebastian Mödersheim , Luca Viganò CDiff: a new reduction technique for constraint-based analysis of security protocols. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:335-344 [Conf ] David A. Basin , Ernst-Rüdiger Olderog , Paul E. Sevinç Specifying and analyzing security automata using CSP-OZ. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:70-81 [Conf ] Ian Frank , David A. Basin Optimal Play against Best Defence: Complexity and Heuristics. [Citation Graph (0, 0)][DBLP ] Computers and Games, 1998, pp:50-73 [Conf ] David A. Basin Lazy Infinite-State Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP ] CQRE, 1999, pp:30-42 [Conf ] Christoph Sprenger , Michael Backes , David A. Basin , Birgit Pfitzmann , Michael Waidner Cryptographically Sound Theorem Proving. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:153-166 [Conf ] Abdelwaheb Ayari , David A. Basin , Andreas Podelski LISA: A Specification Language Based on WS2S. [Citation Graph (0, 0)][DBLP ] CSL, 1997, pp:18-34 [Conf ] David A. Basin , Toby Walsh A Calculus for Rippling. [Citation Graph (0, 0)][DBLP ] CTRS, 1994, pp:15-30 [Conf ] Ian Frank , David A. Basin , Alan Bundy An Adaptation of Proof-Planning to Declarer Play in Bridge. [Citation Graph (0, 0)][DBLP ] ECAI, 1992, pp:72-76 [Conf ] Tetsuya Yoshida , Alan Bundy , Ian Green , Toby Walsh , David A. Basin Coloured Rippling: An Extension of a Theorem Proving Heuristic. [Citation Graph (0, 0)][DBLP ] ECAI, 1994, pp:85-89 [Conf ] David A. Basin Building Theories in Nuprl. [Citation Graph (0, 0)][DBLP ] Logic at Botik, 1989, pp:12-25 [Conf ] Boris Köpf , David A. Basin Timing-Sensitive Information Flow Analysis for Synchronous Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:243-262 [Conf ] David A. Basin , Sebastian Mödersheim , Luca Viganò An On-the-Fly Model-Checker for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] ESORICS, 2003, pp:253-270 [Conf ] Manuel Hilty , David A. Basin , Alexander Pretschner On Obligations. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:98-117 [Conf ] Paul E. Sevinç , David A. Basin , Ernst-Rüdiger Olderog Controlling Access to Documents: A Formal Access Control Model. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:352-367 [Conf ] David A. Basin The Next 700 Synthesis Calculi. [Citation Graph (0, 0)][DBLP ] FME, 2002, pp:430- [Conf ] David A. Basin , Hironobu Kuruma , Kazuo Takaragi , Burkhart Wolff Verification of a Signature Architecture with HOL-Z. [Citation Graph (0, 0)][DBLP ] FM, 2005, pp:269-285 [Conf ] Abdelwaheb Ayari , David A. Basin QUBOS: Deciding Quantified Boolean Logic Using Propositional Satisfiability Solvers. [Citation Graph (0, 0)][DBLP ] FMCAD, 2002, pp:187-201 [Conf ] David A. Basin , Stefan Friedrich , Sebastian Mödersheim B2M: A Semantic Based Tool for BLIF Hardware Descriptions. [Citation Graph (0, 0)][DBLP ] FMCAD, 2000, pp:91-107 [Conf ] Francisco J. Cantu , Alan Bundy , Alan Smaill , David A. Basin Experiments in Automating Hardware Verification Using Inductive Proof Planning. [Citation Graph (0, 0)][DBLP ] FMCAD, 1996, pp:94-108 [Conf ] David A. Basin , Seán Matthews , Luca Viganò A Topography of Labelled Modal Logics. [Citation Graph (0, 0)][DBLP ] Frontiers of Combining Systems (FroCos), 1996, pp:75-92 [Conf ] David A. Basin , Manuel Clavel , José Meseguer Rewriting Logic as a Metalogical Framework. [Citation Graph (0, 0)][DBLP ] FSTTCS, 2000, pp:55-80 [Conf ] David A. Basin , Seán Matthews A Conservative Extension of First-order Logic and Its Application to Theorem Proving. [Citation Graph (0, 0)][DBLP ] FSTTCS, 1993, pp:151-160 [Conf ] David A. Basin IsaWhelk Interpreted in Isabelle. [Citation Graph (0, 0)][DBLP ] ICLP, 1994, pp:741- [Conf ] Ina Kraan , David A. Basin , Alan Bundy Middle-Out Reasoning for Logic Program Synthesis. [Citation Graph (0, 0)][DBLP ] ICLP, 1993, pp:441-455 [Conf ] David A. Basin , Toby Walsh Difference Unification. [Citation Graph (0, 0)][DBLP ] IJCAI, 1993, pp:116-122 [Conf ] Abdelwaheb Ayari , David A. Basin , Stefan Friedrich Structural and Behavioral Modeling with Monadic Logics. [Citation Graph (0, 0)][DBLP ] ISMVL, 1999, pp:142-151 [Conf ] David A. Basin , Alan Bundy , Ina Kraan , Seán Matthews A Framework for Program Development Based on Schematic Proof. [Citation Graph (0, 0)][DBLP ] IWSSD, 1993, pp:162-171 [Conf ] David A. Basin , Seán Matthews , Luca Viganò A New Method for Bounding the Complexity of Modal Logics. [Citation Graph (0, 0)][DBLP ] Kurt Gödel Colloquium, 1997, pp:89-102 [Conf ] David A. Basin , Seán Matthews , Luca Viganò Labelled Quantified Modal Logics. [Citation Graph (0, 0)][DBLP ] KI, 1997, pp:171-182 [Conf ] David A. Basin , Seán Matthews , Luca Viganò Implementing Modal and Relevance Logics in a Logical Framework. [Citation Graph (0, 0)][DBLP ] KR, 1996, pp:386-397 [Conf ] David A. Basin , Harald Ganzinger Complexity Analysis Based on Ordered Resolution. [Citation Graph (0, 0)][DBLP ] LICS, 1996, pp:456-465 [Conf ] David A. Basin Logic Frameworks for Logic Programs. [Citation Graph (0, 0)][DBLP ] LOPSTR, 1994, pp:1-16 [Conf ] David A. Basin , Yves Deville , Pierre Flener , Andreas Hamfelt , Jørgen Fischer Nilsson Synthesis of Programs in Computational Logic. [Citation Graph (0, 0)][DBLP ] Program Development in Computational Logic, 2004, pp:30-65 [Conf ] Ina Kraan , David A. Basin , Alan Bundy Logic Program Synthesis via Proof Planning. [Citation Graph (0, 0)][DBLP ] LOPSTR, 1992, pp:1-14 [Conf ] David A. Basin , Sebastian Mödersheim , Luca Viganò Algebraic Intruder Deductions. [Citation Graph (0, 0)][DBLP ] LPAR, 2005, pp:549-564 [Conf ] David A. Basin , Peter Del Vecchio Verification Of Combinational Logic in Nuprl. [Citation Graph (0, 0)][DBLP ] Hardware Specification, Verification and Synthesis, 1989, pp:333-357 [Conf ] Diana Senn , David A. Basin , Germano Caronni Firewall Conformance Testing. [Citation Graph (0, 0)][DBLP ] TestCom, 2005, pp:226-241 [Conf ] David A. Basin , Jürgen Doser , Torsten Lodderstedt Model driven security for process-oriented systems. [Citation Graph (0, 0)][DBLP ] SACMAT, 2003, pp:100-109 [Conf ] David A. Basin , Frank Rittinger , Luca Viganò A formal data-model of the CORBA security service. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2001, pp:303-304 [Conf ] David A. Basin , Stefan Friedrich , Marek Gawkowski , Joachim Posegga Bytecode Model Checking: An Experimental Analysis. [Citation Graph (0, 0)][DBLP ] SPIN, 2002, pp:42-59 [Conf ] Abdelwaheb Ayari , David A. Basin Generic System Support for Deductive Program Development. [Citation Graph (0, 0)][DBLP ] TACAS, 1996, pp:313-328 [Conf ] David A. Basin , Douglas J. Howe Some Normalization Properties of Martin-Löf's Type Theory, and Applications. [Citation Graph (0, 0)][DBLP ] TACS, 1991, pp:475-494 [Conf ] David A. Basin , Stefan Friedrich Modeling a Hardware Synthesis Methodology in Isabelle. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1996, pp:33-50 [Conf ] David A. Basin , Stefan Friedrich , Marek Gawkowski Verified Bytecode Model Checkers. [Citation Graph (0, 0)][DBLP ] TPHOLs, 2002, pp:47-66 [Conf ] Torsten Lodderstedt , David A. Basin , Jürgen Doser SecureUML: A UML-Based Modeling Language for Model-Driven Security. [Citation Graph (0, 0)][DBLP ] UML, 2002, pp:426-441 [Conf ] David A. Basin , Frank Rittinger , Luca Viganò A Formal Analysis of the CORBA Security Service. [Citation Graph (0, 0)][DBLP ] ZB, 2002, pp:330-349 [Conf ] Ian Frank , David A. Basin Search in Games with Incomplete Information: A Case Study Using Bridge Card Play. [Citation Graph (0, 0)][DBLP ] Artif. Intell., 1998, v:100, n:1-2, pp:87-123 [Journal ] Richard Barnett , David A. Basin , Jane Hesketh A Recursion Planning Analysis of Inductive Completion. [Citation Graph (0, 0)][DBLP ] Ann. Math. Artif. Intell., 1993, v:8, n:3-4, pp:363-381 [Journal ] Alexander Pretschner , Manuel Hilty , David A. Basin Distributed usage control. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:39-44 [Journal ] Rolf Oppliger , Ralf Hauser , David A. Basin SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:12, pp:2238-2246 [Journal ] David A. Basin Logical-Framework-Based Program Development. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1998, v:30, n:3es, pp:1- [Journal ] David A. Basin Generalized Rewriting in Type Theory. [Citation Graph (0, 0)][DBLP ] Elektronische Informationsverarbeitung und Kybernetik, 1994, v:30, n:5/6, pp:249-259 [Journal ] Rafael Accorsi , David A. Basin , Luca Viganò Towards an awareness-based semantics for security protocol analysis. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2001, v:55, n:1, pp:- [Journal ] David A. Basin , Grit Denker Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2000, v:36, n:, pp:- [Journal ] David A. Basin , Seán Matthews Scoped metatheorems. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 1998, v:15, n:, pp:- [Journal ] Carlos Caleiro , Luca Viganò , David A. Basin Metareasoning about Security Protocols using Distributed Temporal Logic. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:67-89 [Journal ] Carlos Caleiro , Luca Viganò , David A. Basin Deconstructing Alice and Bob. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:135, n:1, pp:3-22 [Journal ] David A. Basin , Stefan Friedrich Modeling a Hardware Synthesis Methodology in Isabelle. [Citation Graph (0, 0)][DBLP ] Formal Methods in System Design, 1999, v:15, n:2, pp:99-122 [Journal ] David A. Basin , Seán Matthews Structuring Metatheory on Inductive Definitions. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2000, v:162, n:1-2, pp:80-95 [Journal ] Carlos Caleiro , Luca Viganò , David A. Basin Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] Logic Journal of the IGPL, 2005, v:13, n:6, pp:637-663 [Journal ] David A. Basin , Sebastian Mödersheim , Luca Viganò OFMC: A symbolic model checker for security protocols. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:3, pp:181-208 [Journal ] Michael Näf , David A. Basin Konflikt oder Review zwei Ansätze für Labors in angewandter Informationssicherheit. [Citation Graph (0, 0)][DBLP ] Informatik Spektrum, 2005, v:28, n:5, pp:407-412 [Journal ] David A. Basin A Term Equality Problem Equivalent to Graph Isomorphism. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1994, v:51, n:2, pp:61-66 [Journal ] David A. Basin , Harald Ganzinger Automated complexity analysis based on ordered resolution. [Citation Graph (0, 0)][DBLP ] J. ACM, 2001, v:48, n:1, pp:70-109 [Journal ] David A. Basin , Amy P. Felty Current Trends in Logical Frameworks and Metalanguages. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 2001, v:27, n:1, pp:1-2 [Journal ] David A. Basin , Stefan Friedrich , Marek Gawkowski Bytecode Verification by Model Checking. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 2003, v:30, n:3-4, pp:399-444 [Journal ] David A. Basin , Toby Walsh A Calculus for and Termination of Rippling. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 1996, v:16, n:1-2, pp:147-180 [Journal ] Ina Kraan , David A. Basin , Alan Bundy Middle-Out Reasoning for Synthesis and Induction. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 1996, v:16, n:1-2, pp:113-145 [Journal ] Alessandro Armando , David A. Basin , Jorge Cuéllar , Michaël Rusinowitch , Luca Viganò Automated Reasoning for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 2006, v:36, n:1-2, pp:1-3 [Journal ] David A. Basin , Seán Matthews , Luca Viganò Labelled Modal Logics: Quantifiers. [Citation Graph (0, 0)][DBLP ] Journal of Logic, Language and Information, 1998, v:7, n:3, pp:237-263 [Journal ] Abdelwaheb Ayari , David A. Basin A Higher-order Interpretation of Deductive Tableau. [Citation Graph (0, 0)][DBLP ] J. Symb. Comput., 2001, v:31, n:5, pp:487-520 [Journal ] Penny Anderson , David A. Basin Program Development Schemata as Derived Rules. [Citation Graph (0, 0)][DBLP ] J. Symb. Comput., 2000, v:30, n:1, pp:5-36 [Journal ] David A. Basin , Olivier Danvy , Robert Harper Editorial. [Citation Graph (0, 0)][DBLP ] Higher-Order and Symbolic Computation, 2004, v:17, n:3, pp:171-171 [Journal ] David A. Basin , Seán Matthews Adding Metatheoretic Facilities to First-Order Theories. [Citation Graph (0, 0)][DBLP ] J. Log. Comput., 1996, v:6, n:6, pp:835-849 [Journal ] David A. Basin , Seán Matthews , Luca Viganò Labelled Propositional Modal Logics: Theory and Practice. [Citation Graph (0, 0)][DBLP ] J. Log. Comput., 1997, v:7, n:6, pp:685-717 [Journal ] David A. Basin , Seán Matthews , Luca Viganò Natural Deduction for Non-Classical Logics. [Citation Graph (0, 0)][DBLP ] Studia Logica, 1998, v:60, n:1, pp:119-160 [Journal ] Abdelwaheb Ayari , David A. Basin , Felix Klaedtke Decision procedures for inductive Boolean functions based on alternating automata. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2003, v:300, n:1-3, pp:301-329 [Journal ] Carlos Caleiro , Luca Viganò , David A. Basin On the semantics of Alice&Bob specifications of security protocols. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2006, v:367, n:1-2, pp:88-122 [Journal ] Ian Frank , David A. Basin A theoretical and empirical investigation of search in imperfect information games. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2001, v:252, n:1-2, pp:217-256 [Journal ] David A. Basin , Manuel Clavel , José Meseguer Reflective metalogical frameworks. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Log., 2004, v:5, n:3, pp:528-576 [Journal ] David A. Basin , Jürgen Doser , Torsten Lodderstedt Model driven security: From UML models to access control infrastructures. [Citation Graph (0, 0)][DBLP ] ACM Trans. Softw. Eng. Methodol., 2006, v:15, n:1, pp:39-91 [Journal ] Patrick Schaller , Srdjan Capkun , David A. Basin BAP: Broadcast Authentication Using Cryptographic Puzzles. [Citation Graph (0, 0)][DBLP ] ACNS, 2007, pp:401-419 [Conf ] Diana von Bidder , David A. Basin , Germano Caronni Midpoints Versus Endpoints: From Protocols to Firewalls. [Citation Graph (0, 0)][DBLP ] ACNS, 2007, pp:46-64 [Conf ] Manuel Hilty , Alexander Pretschner , David A. Basin , Christian Schaefer , Thomas Walter A Policy Language for Distributed Usage Control. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:531-546 [Conf ] Paul Hankes Drielsma , Sebastian Mödersheim , Luca Viganò , David A. Basin Formalizing and Analyzing Sender Invariance. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:80-95 [Conf ] David A. Basin , Manuel Clavel , Jürgen Doser , Marina Egea A Metamodel-Based Approach for Analyzing Security-Design Models. [Citation Graph (0, 0)][DBLP ] MoDELS, 2007, pp:420-435 [Conf ] Christoph Sprenger , David A. Basin A Monad-Based Modeling and Verification Toolbox with Application to Security Protocols. [Citation Graph (0, 0)][DBLP ] TPHOLs, 2007, pp:302-318 [Conf ] Paul E. Sevinç , Mario Strasser , David A. Basin Securing the Distribution and Storage of Secrets with Trusted Platform Modules. [Citation Graph (0, 0)][DBLP ] WISTP, 2007, pp:53-66 [Conf ] David A. Basin , Hironobu Kuruma , Kunihiko Miyazaki , Kazuo Takaragi , Burkhart Wolff Verifying a signature architecture: a comparative case study. [Citation Graph (0, 0)][DBLP ] Formal Asp. Comput., 2007, v:19, n:1, pp:63-91 [Journal ] Policy Monitoring in First-Order Temporal Logic. [Citation Graph (, )][DBLP ] An information-theoretic model for adaptive side-channel attacks. [Citation Graph (, )][DBLP ] Mechanisms for usage control. [Citation Graph (, )][DBLP ] A class of probabilistic models for role engineering. [Citation Graph (, )][DBLP ] A probabilistic approach to hybrid role mining. [Citation Graph (, )][DBLP ] Cryptographically-Sound Protocol-Model Abstractions. [Citation Graph (, )][DBLP ] Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks. [Citation Graph (, )][DBLP ] Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs. [Citation Graph (, )][DBLP ] Impossibility Results for Secret Establishment. [Citation Graph (, )][DBLP ] Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries. [Citation Graph (, )][DBLP ] Dynamic Enforcement of Abstract Separation of Duty Constraints. [Citation Graph (, )][DBLP ] Modeling and Analyzing Security in the Presence of Compromising Adversaries. [Citation Graph (, )][DBLP ] How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC. [Citation Graph (, )][DBLP ] Runtime Monitoring of Metric First-order Temporal Properties. [Citation Graph (, )][DBLP ] Multi-assignment clustering for Boolean data. [Citation Graph (, )][DBLP ] SSG: a model-based development environment for smart, security-aware GUIs. [Citation Graph (, )][DBLP ] Developing Topology Discovery in Event-B. [Citation Graph (, )][DBLP ] A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). [Citation Graph (, )][DBLP ] Monitoring security policies with metric first-order temporal logic. [Citation Graph (, )][DBLP ] On the definition of role mining. [Citation Graph (, )][DBLP ] A Labeled Tableaux Systemfor the Distributed Temporal Logic DTL. [Citation Graph (, )][DBLP ] Let's Get Physical: Models and Methods for Real-World Security Protocols. [Citation Graph (, )][DBLP ] Automatic Generation of Smart, Security-Aware GUI Models. [Citation Graph (, )][DBLP ] Two approaches to an information security laboratory. [Citation Graph (, )][DBLP ] SSL/TLS session-aware user authentication revisited. [Citation Graph (, )][DBLP ] SSL/TLS Session-Aware User Authentication. [Citation Graph (, )][DBLP ] Search in 0.056secs, Finished in 0.061secs