BibTeX records: David A. Basin

download as .bib file

@article{DBLP:journals/popets/KrsticNB24,
  author       = {Srdan Krstic and
                  Hoang Nguyen Phuoc Bao and
                  David A. Basin},
  title        = {Model-driven Privacy},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {1},
  pages        = {314--329},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0018},
  doi          = {10.56553/POPETS-2024-0018},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/KrsticNB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HubletBK24,
  author       = {Fran{\c{c}}ois Hublet and
                  David A. Basin and
                  Srdan Krstic},
  title        = {User-Controlled Privacy: Taint, Track, and Control},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {1},
  pages        = {597--616},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0034},
  doi          = {10.56553/POPETS-2024-0034},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/HubletBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-03199,
  author       = {Felix Linker and
                  David A. Basin},
  title        = {{SOAP:} {A} Social Authentication Protocol},
  journal      = {CoRR},
  volume       = {abs/2402.03199},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.03199},
  doi          = {10.48550/ARXIV.2402.03199},
  eprinttype    = {arXiv},
  eprint       = {2402.03199},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-03199.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KlenzeSB23,
  author       = {Tobias Klenze and
                  Christoph Sprenger and
                  David A. Basin},
  title        = {IsaNet: {A} framework for verifying secure data plane protocols},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {217--259},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-220021},
  doi          = {10.3233/JCS-220021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KlenzeSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lmcs/RaszykBKT23,
  author       = {Martin Raszyk and
                  David A. Basin and
                  Srdan Krstic and
                  Dmitriy Traytel},
  title        = {Efficient Evaluation of Arbitrary Relational Calculus Queries},
  journal      = {Log. Methods Comput. Sci.},
  volume       = {19},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.46298/lmcs-19(4:38)2023},
  doi          = {10.46298/LMCS-19(4:38)2023},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lmcs/RaszykBKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/TuratiKCB23,
  author       = {Florian Turati and
                  Karel Kubicek and
                  Carlos Cotrini and
                  David A. Basin},
  title        = {Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on
                  Google's FLoC and the MinHash Hierarchy System},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {4},
  pages        = {117--131},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0101},
  doi          = {10.56553/POPETS-2023-0101},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/TuratiKCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/HuangLCWBLP23,
  author       = {Kaile Huang and
                  Si Liu and
                  Zhenge Chen and
                  Hengfeng Wei and
                  David A. Basin and
                  Haixiang Li and
                  Anqun Pan},
  title        = {Efficient Black-box Checking of Snapshot Isolation in Databases},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {16},
  number       = {6},
  pages        = {1264--1276},
  year         = {2023},
  url          = {https://www.vldb.org/pvldb/vol16/p1264-wei.pdf},
  doi          = {10.14778/3583140.3583145},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/HuangLCWBLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OchoaVTB23,
  author       = {Mart{\'{\i}}n Ochoa and
                  Hern{\'{a}}n Vanegas and
                  Jorge Toro{-}Pozo and
                  David A. Basin},
  title        = {SealClub: Computer-aided Paper Document Authentication},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {163--177},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627176},
  doi          = {10.1145/3627106.3627176},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OchoaVTB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/Basin23,
  author       = {David A. Basin},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {Formal Methods for Payment Protocols},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {326},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3596440},
  doi          = {10.1145/3579856.3596440},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/Basin23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atva/BasinKST23,
  author       = {David A. Basin and
                  Srdan Krstic and
                  Joshua Schneider and
                  Dmitriy Traytel},
  editor       = {{\'{E}}tienne Andr{\'{e}} and
                  Jun Sun},
  title        = {Correct and Efficient Policy Monitoring, a Retrospective},
  booktitle    = {Automated Technology for Verification and Analysis - 21st International
                  Symposium, {ATVA} 2023, Singapore, October 24-27, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14215},
  pages        = {3--30},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45329-8\_1},
  doi          = {10.1007/978-3-031-45329-8\_1},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atva/BasinKST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LinkerB23,
  author       = {Felix Linker and
                  David A. Basin},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {{ADEM:} An Authentic Digital EMblem},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2815--2829},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616578},
  doi          = {10.1145/3576915.3616578},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LinkerB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BasinGKNO23,
  author       = {David A. Basin and
                  Juan Guarnizo and
                  Srdan Krstic and
                  Hoang Nguyen Phuoc Bao and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Is Modeling Access Control Worth It?},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2830--2844},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623196},
  doi          = {10.1145/3576915.3623196},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BasinGKNO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HubletBK23,
  author       = {Fran{\c{c}}ois Hublet and
                  David A. Basin and
                  Srdan Krstic},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Enforcing the {GDPR}},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14345},
  pages        = {400--422},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51476-0\_20},
  doi          = {10.1007/978-3-031-51476-0\_20},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/HubletBK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/BasinDKPRST23,
  author       = {David A. Basin and
                  Daniel Stefan Dietiker and
                  Srdan Krstic and
                  Yvonne{-}Anne Pignolet and
                  Martin Raszyk and
                  Joshua Schneider and
                  Arshavir Ter{-}Gabrielyan},
  editor       = {Marsha Chechik and
                  Joost{-}Pieter Katoen and
                  Martin Leucker},
  title        = {Monitoring the Internet Computer},
  booktitle    = {Formal Methods - 25th International Symposium, {FM} 2023, L{\"{u}}beck,
                  Germany, March 6-10, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14000},
  pages        = {383--402},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-27481-7\_22},
  doi          = {10.1007/978-3-031-27481-7\_22},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fm/BasinDKPRST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/DuanFL0BP23,
  author       = {Huayi Duan and
                  Rub{\'{e}}n Fischer and
                  Jie Lou and
                  Si Liu and
                  David A. Basin and
                  Adrian Perrig},
  editor       = {Mahesh Balakrishnan and
                  Manya Ghobadi},
  title        = {{RHINE:} Robust and High-performance Internet Naming with {E2E} Authenticity},
  booktitle    = {20th {USENIX} Symposium on Networked Systems Design and Implementation,
                  {NSDI} 2023, Boston, MA, April 17-19, 2023},
  pages        = {531--553},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/nsdi23/presentation/duan},
  timestamp    = {Thu, 11 May 2023 17:08:22 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/DuanFL0BP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/0003DHBVBP23,
  author       = {Si Liu and
                  Huayi Duan and
                  Lukas Heimes and
                  Marco Bearzi and
                  Jodok Vieli and
                  David A. Basin and
                  Adrian Perrig},
  editor       = {Henning Schulzrinne and
                  Vishal Misra and
                  Eddie Kohler and
                  David A. Maltz},
  title        = {A Formal Framework for End-to-End {DNS} Resolution},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2023 Conference, {ACM} {SIGCOMM}
                  2023, New York, NY, USA, 10-14 September 2023},
  pages        = {932--949},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3603269.3604870},
  doi          = {10.1145/3603269.3604870},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/0003DHBVBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ArquintWLSSWBM23,
  author       = {Linard Arquint and
                  Felix A. Wolf and
                  Joseph Lallemand and
                  Ralf Sasse and
                  Christoph Sprenger and
                  Sven N. Wiesner and
                  David A. Basin and
                  Peter M{\"{u}}ller},
  title        = {Sound Verification of Security Protocols: From Design to Interoperable
                  Implementations},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1077--1093},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179325},
  doi          = {10.1109/SP46215.2023.10179325},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ArquintWLSSWBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GligorPB23,
  author       = {Virgil D. Gligor and
                  Adrian Perrig and
                  David A. Basin},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Determining an Economic Value of High Assurance for Commodity Software
                  Security},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {228--242},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_23},
  doi          = {10.1007/978-3-031-43033-6\_23},
  timestamp    = {Tue, 24 Oct 2023 15:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GligorPB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BasinST23,
  author       = {David A. Basin and
                  Patrick Schaller and
                  Jorge Toro{-}Pozo},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Inducing Authentication Failures to Bypass Credit Card PINs},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3065--3079},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/basin},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BasinST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KrahenbuhlWBLPS23,
  author       = {Cyrill Kr{\"{a}}henb{\"{u}}hl and
                  Marc Wyss and
                  David A. Basin and
                  Vincent Lenders and
                  Adrian Perrig and
                  Martin Strohmeier},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{FABRID:} Flexible Attestation-Based Routing for Inter-Domain Networks},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5755--5772},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/krahenbuhl},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KrahenbuhlWBLPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-07313,
  author       = {Kaile Huang and
                  Si Liu and
                  Zhenge Chen and
                  Hengfeng Wei and
                  David A. Basin and
                  Haixiang Li and
                  Anqun Pan},
  title        = {Efficient Black-box Checking of Snapshot Isolation in Databases},
  journal      = {CoRR},
  volume       = {abs/2301.07313},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.07313},
  doi          = {10.48550/ARXIV.2301.07313},
  eprinttype    = {arXiv},
  eprint       = {2301.07313},
  timestamp    = {Mon, 08 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-07313.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-13635,
  author       = {Florian Turati and
                  Carlos Cotrini and
                  Karel Kubicek and
                  David A. Basin},
  title        = {Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on
                  Google's FLoC and the MinHash Hierarchy System},
  journal      = {CoRR},
  volume       = {abs/2302.13635},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.13635},
  doi          = {10.48550/ARXIV.2302.13635},
  eprinttype    = {arXiv},
  eprint       = {2302.13635},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-13635.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-03108,
  author       = {Cyrill Kr{\"{a}}henb{\"{u}}hl and
                  Marc Wyss and
                  David A. Basin and
                  Vincent Lenders and
                  Adrian Perrig and
                  Martin Strohmeier},
  title        = {{FABRID:} Flexible Attestation-Based Routing for Inter-Domain Networks},
  journal      = {CoRR},
  volume       = {abs/2304.03108},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.03108},
  doi          = {10.48550/ARXIV.2304.03108},
  eprinttype    = {arXiv},
  eprint       = {2304.03108},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-03108.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Chuat22,
  author       = {Laurent Chuat and
                  Markus Legner and
                  David A. Basin and
                  David Hausheer and
                  Samuel Hitz and
                  Peter M{\"{u}}ller and
                  Adrian Perrig},
  title        = {The Complete Guide to {SCION} - From Design Principles to Formal Verification},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-05288-0},
  doi          = {10.1007/978-3-031-05288-0},
  isbn         = {978-3-031-05287-3},
  timestamp    = {Wed, 25 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Chuat22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BasinCDS22,
  author       = {David A. Basin and
                  Cas Cremers and
                  Jannik Dreier and
                  Ralf Sasse},
  title        = {Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {3},
  pages        = {24--32},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2022.3154689},
  doi          = {10.1109/MSEC.2022.3154689},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BasinCDS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/LiuMOZB22,
  author       = {Si Liu and
                  Jos{\'{e}} Meseguer and
                  Peter Csaba {\"{O}}lveczky and
                  Min Zhang and
                  David A. Basin},
  title        = {Bridging the semantic gap between qualitative and quantitative models
                  of distributed systems},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {6},
  number       = {{OOPSLA2}},
  pages        = {315--344},
  year         = {2022},
  url          = {https://doi.org/10.1145/3563299},
  doi          = {10.1145/3563299},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmpl/LiuMOZB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KubicekMCSBB22,
  author       = {Karel Kubicek and
                  Jakob Merane and
                  Carlos Cotrini and
                  Alexander Stremitzer and
                  Stefan Bechtold and
                  David A. Basin},
  title        = {Checking Websites' {GDPR} Consent Compliance for Marketing Emails},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {2},
  pages        = {282--303},
  year         = {2022},
  url          = {https://doi.org/10.2478/popets-2022-0046},
  doi          = {10.2478/POPETS-2022-0046},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/KubicekMCSBB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/HammannCRSB22,
  author       = {Sven Hammann and
                  Michael Crabb and
                  Sasa Radomirovic and
                  Ralf Sasse and
                  David A. Basin},
  editor       = {Simone D. J. Barbosa and
                  Cliff Lampe and
                  Caroline Appert and
                  David A. Shamma and
                  Steven Mark Drucker and
                  Julie R. Williamson and
                  Koji Yatani},
  title        = {"I'm Surprised So Much Is Connected"},
  booktitle    = {{CHI} '22: {CHI} Conference on Human Factors in Computing Systems,
                  New Orleans, LA, USA, 29 April 2022 - 5 May 2022},
  pages        = {620:1--620:13},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491102.3502125},
  doi          = {10.1145/3491102.3502125},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/HammannCRSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KaramiBJ22,
  author       = {Farzane Karami and
                  David A. Basin and
                  Einar Broch Johnsen},
  title        = {{DPL:} {A} Language for {GDPR} Enforcement},
  booktitle    = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  pages        = {112--129},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSF54842.2022.9919687},
  doi          = {10.1109/CSF54842.2022.9919687},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/KaramiBJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/WeghornLSPB22,
  author       = {Thilo Weghorn and
                  Si Liu and
                  Christoph Sprenger and
                  Adrian Perrig and
                  David A. Basin},
  title        = {N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware
                  Internet Architectures},
  booktitle    = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  pages        = {147--162},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSF54842.2022.9919646},
  doi          = {10.1109/CSF54842.2022.9919646},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/WeghornLSPB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CeragioliGDB22,
  author       = {Lorenzo Ceragioli and
                  Letterio Galletta and
                  Pierpaolo Degano and
                  David A. Basin},
  title        = {{IFCIL:} An Information Flow Configuration Language for SELinux},
  booktitle    = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  pages        = {243--259},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSF54842.2022.9919690},
  doi          = {10.1109/CSF54842.2022.9919690},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/CeragioliGDB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HubletBK22,
  author       = {Fran{\c{c}}ois Hublet and
                  David A. Basin and
                  Srdan Krstic},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Real-Time Policy Enforcement with Metric First-Order Temporal Logic},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13555},
  pages        = {211--232},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17146-8\_11},
  doi          = {10.1007/978-3-031-17146-8\_11},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/HubletBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdt/RaszykBKT22,
  author       = {Martin Raszyk and
                  David A. Basin and
                  Srdan Krstic and
                  Dmitriy Traytel},
  editor       = {Dan Olteanu and
                  Nils Vortmeier},
  title        = {Practical Relational Calculus Query Evaluation},
  booktitle    = {25th International Conference on Database Theory, {ICDT} 2022, March
                  29 to April 1, 2022, Edinburgh, {UK} (Virtual Conference)},
  series       = {LIPIcs},
  volume       = {220},
  pages        = {11:1--11:21},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ICDT.2022.11},
  doi          = {10.4230/LIPICS.ICDT.2022.11},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdt/RaszykBKT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictac/BasinDHHMKKMRST22,
  author       = {David A. Basin and
                  Thibault Dardinier and
                  Nico Hauser and
                  Lukas Heimes and
                  Jonathan Juli{\'{a}}n Huerta y Munive and
                  Nicolas Kaletsch and
                  Srdan Krstic and
                  Emanuele Marsicano and
                  Martin Raszyk and
                  Joshua Schneider and
                  Dawit Legesse Tirore and
                  Dmitriy Traytel and
                  Sheila Zingg},
  editor       = {Helmut Seidl and
                  Zhiming Liu and
                  Corina S. Pasareanu},
  title        = {VeriMon: {A} Formally Verified Monitoring Tool},
  booktitle    = {Theoretical Aspects of Computing - {ICTAC} 2022 - 19th International
                  Colloquium, Tbilisi, Georgia, September 27-29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13572},
  pages        = {1--6},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17715-6\_1},
  doi          = {10.1007/978-3-031-17715-6\_1},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ictac/BasinDHHMKKMRST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BollingerKCB22,
  author       = {Dino Bollinger and
                  Karel Kubicek and
                  Carlos Cotrini and
                  David A. Basin},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Automating Cookie Consent and {GDPR} Violation Detection},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {2893--2910},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/bollinger},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BollingerKCB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-15915,
  author       = {Lorenzo Ceragioli and
                  Letterio Galletta and
                  Pierpaolo Degano and
                  David A. Basin},
  title        = {{IFCIL:} An Information Flow Configuration Language for SELinux (Extended
                  Version)},
  journal      = {CoRR},
  volume       = {abs/2205.15915},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.15915},
  doi          = {10.48550/ARXIV.2205.15915},
  eprinttype    = {arXiv},
  eprint       = {2205.15915},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-15915.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-07884,
  author       = {Mart{\'{\i}}n Ochoa and
                  Jorge Toro{-}Pozo and
                  David A. Basin},
  title        = {SealClub: Computer-aided Paper Document Authentication},
  journal      = {CoRR},
  volume       = {abs/2210.07884},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.07884},
  doi          = {10.48550/ARXIV.2210.07884},
  eprinttype    = {arXiv},
  eprint       = {2210.07884},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-07884.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-09964,
  author       = {Martin Raszyk and
                  David A. Basin and
                  Srdan Krstic and
                  Dmitriy Traytel},
  title        = {Efficient Evaluation of Arbitrary Relational Calculus Queries},
  journal      = {CoRR},
  volume       = {abs/2210.09964},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.09964},
  doi          = {10.48550/ARXIV.2210.09964},
  eprinttype    = {arXiv},
  eprint       = {2210.09964},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-09964.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-04171,
  author       = {Linard Arquint and
                  Felix A. Wolf and
                  Joseph Lallemand and
                  Ralf Sasse and
                  Christoph Sprenger and
                  Sven N. Wiesner and
                  David A. Basin and
                  Peter M{\"{u}}ller},
  title        = {Sound Verification of Security Protocols: From Design to Interoperable
                  Implementations (extended version)},
  journal      = {CoRR},
  volume       = {abs/2212.04171},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.04171},
  doi          = {10.48550/ARXIV.2212.04171},
  eprinttype    = {arXiv},
  eprint       = {2212.04171},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-04171.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/SchneiderBBKT21,
  author       = {Joshua Schneider and
                  David A. Basin and
                  Frederik Brix and
                  Srdan Krstic and
                  Dmitriy Traytel},
  title        = {Scalable online first-order monitoring},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {23},
  number       = {2},
  pages        = {185--208},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10009-021-00607-1},
  doi          = {10.1007/S10009-021-00607-1},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/SchneiderBBKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BasinDGR21,
  author       = {David A. Basin and
                  Jannik Dreier and
                  Sofia Giampietro and
                  Sasa Radomirovic},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Verifying Table-Based Elections},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2632--2652},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484555},
  doi          = {10.1145/3460120.3484555},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BasinDGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BasinLMS21,
  author       = {David A. Basin and
                  Andreas Lochbihler and
                  Ueli Maurer and
                  S. Reza Sefidgar},
  title        = {Abstract Modeling of System Communication in Constructive Cryptography
                  using CryptHOL},
  booktitle    = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik,
                  Croatia, June 21-25, 2021},
  pages        = {1--16},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSF51468.2021.00047},
  doi          = {10.1109/CSF51468.2021.00047},
  timestamp    = {Fri, 13 Aug 2021 09:20:41 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BasinLMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HirschiSB21,
  author       = {Lucca Hirschi and
                  Lara Schmid and
                  David A. Basin},
  title        = {Fixing the Achilles Heel of E-Voting: The Bulletin Board},
  booktitle    = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik,
                  Croatia, June 21-25, 2021},
  pages        = {1--17},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSF51468.2021.00016},
  doi          = {10.1109/CSF51468.2021.00016},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/HirschiSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Klenze0B21,
  author       = {Tobias Klenze and
                  Christoph Sprenger and
                  David A. Basin},
  title        = {Formal Verification of Secure Forwarding Protocols},
  booktitle    = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik,
                  Croatia, June 21-25, 2021},
  pages        = {1--16},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSF51468.2021.00018},
  doi          = {10.1109/CSF51468.2021.00018},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Klenze0B21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BasinST21,
  author       = {David A. Basin and
                  Ralf Sasse and
                  Jorge Toro{-}Pozo},
  title        = {The {EMV} Standard: Break, Fix, Verify},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {1766--1781},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00037},
  doi          = {10.1109/SP40001.2021.00037},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BasinST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BasinST21,
  author       = {David A. Basin and
                  Ralf Sasse and
                  Jorge Toro{-}Pozo},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Card Brand Mixup Attack: Bypassing the {PIN} in non-Visa Cards by
                  Using Them for Visa Transactions},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {179--194},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/basin},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BasinST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PeltonenSB21,
  author       = {Aleksi Peltonen and
                  Ralf Sasse and
                  David A. Basin},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {A comprehensive formal analysis of 5G handover},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467823},
  doi          = {10.1145/3448300.3467823},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PeltonenSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/GiuliariKLBPS20,
  author       = {Giacomo Giuliari and
                  Tobias Klenze and
                  Markus Legner and
                  David A. Basin and
                  Adrian Perrig and
                  Ankit Singla},
  title        = {Internet backbones in space},
  journal      = {Comput. Commun. Rev.},
  volume       = {50},
  number       = {1},
  pages        = {25--37},
  year         = {2020},
  url          = {https://doi.org/10.1145/3390251.3390256},
  doi          = {10.1145/3390251.3390256},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccr/GiuliariKLBPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/TroncosoPHSLLSP20,
  author       = {Carmela Troncoso and
                  Mathias Payer and
                  Jean{-}Pierre Hubaux and
                  Marcel Salath{\'{e}} and
                  James R. Larus and
                  Wouter Lueks and
                  Theresa Stadler and
                  Apostolos Pyrgelis and
                  Daniele Antonioli and
                  Ludovic Barman and
                  Sylvain Chatel and
                  Kenneth G. Paterson and
                  Srdjan Capkun and
                  David A. Basin and
                  Jan Beutel and
                  Dennis Jackson and
                  Marc Roeschlin and
                  Patrick Leu and
                  Bart Preneel and
                  Nigel P. Smart and
                  Aysajan Abidin and
                  Seda Gurses and
                  Michael Veale and
                  Cas Cremers and
                  Michael Backes and
                  Nils Ole Tippenhauer and
                  Reuben Binns and
                  Ciro Cattuto and
                  Alain Barrat and
                  Dario Fiore and
                  Manuel Barbosa and
                  Rui Oliveira and
                  Jos{\'{e}} Pereira},
  title        = {Decentralized Privacy-Preserving Proximity Tracing},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {43},
  number       = {2},
  pages        = {36--66},
  year         = {2020},
  url          = {http://sites.computer.org/debull/A20june/p36.pdf},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/debu/TroncosoPHSLLSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/CostaGDBB20,
  author       = {Gabriele Costa and
                  Letterio Galletta and
                  Pierpaolo Degano and
                  David A. Basin and
                  Chiara Bodei},
  title        = {Natural Projection as Partial Model Checking},
  journal      = {J. Autom. Reason.},
  volume       = {64},
  number       = {7},
  pages        = {1445--1481},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10817-020-09568-7},
  doi          = {10.1007/S10817-020-09568-7},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/CostaGDBB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BasinLS20,
  author       = {David A. Basin and
                  Andreas Lochbihler and
                  S. Reza Sefidgar},
  title        = {CryptHOL: Game-Based Proofs in Higher-Order Logic},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {2},
  pages        = {494--566},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-019-09341-z},
  doi          = {10.1007/S00145-019-09341-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BasinLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/0001KEW0CB20,
  author       = {Christoph Sprenger and
                  Tobias Klenze and
                  Marco Eilers and
                  Felix A. Wolf and
                  Peter M{\"{u}}ller and
                  Martin Clochard and
                  David A. Basin},
  title        = {Igloo: soundly linking compositional refinement and separation logic
                  for distributed system verification},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {4},
  number       = {{OOPSLA}},
  pages        = {152:1--152:31},
  year         = {2020},
  url          = {https://doi.org/10.1145/3428220},
  doi          = {10.1145/3428220},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmpl/0001KEW0CB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/BasinKZ20,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  title        = {Runtime Verification over Out-of-order Streams},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {21},
  number       = {1},
  pages        = {5:1--5:43},
  year         = {2020},
  url          = {https://doi.org/10.1145/3355609},
  doi          = {10.1145/3355609},
  timestamp    = {Fri, 24 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocl/BasinKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atva/RaszykBT20,
  author       = {Martin Raszyk and
                  David A. Basin and
                  Dmitriy Traytel},
  editor       = {Dang Van Hung and
                  Oleg Sokolsky},
  title        = {Multi-head Monitoring of Metric Dynamic Logic},
  booktitle    = {Automated Technology for Verification and Analysis - 18th International
                  Symposium, {ATVA} 2020, Hanoi, Vietnam, October 19-23, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12302},
  pages        = {233--250},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59152-6\_13},
  doi          = {10.1007/978-3-030-59152-6\_13},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atva/RaszykBT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/BasinDHKR0T20,
  author       = {David A. Basin and
                  Thibault Dardinier and
                  Lukas Heimes and
                  Srdan Krstic and
                  Martin Raszyk and
                  Joshua Schneider and
                  Dmitriy Traytel},
  editor       = {Nicolas Peltier and
                  Viorica Sofronie{-}Stokkermans},
  title        = {A Formally Verified, Optimized Monitor for Metric First-Order Dynamic
                  Logic},
  booktitle    = {Automated Reasoning - 10th International Joint Conference, {IJCAR}
                  2020, Paris, France, July 1-4, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12166},
  pages        = {432--453},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51074-9\_25},
  doi          = {10.1007/978-3-030-51074-9\_25},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/BasinDHKR0T20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HammannSB20,
  author       = {Sven Hammann and
                  Ralf Sasse and
                  David A. Basin},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Privacy-Preserving OpenID Connect},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {277--289},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384724},
  doi          = {10.1145/3320269.3384724},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HammannSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BasinRS20,
  author       = {David A. Basin and
                  Sasa Radomirovic and
                  Lara Schmid},
  title        = {Dispute Resolution in Voting},
  booktitle    = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston,
                  MA, USA, June 22-26, 2020},
  pages        = {1--16},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CSF49147.2020.00009},
  doi          = {10.1109/CSF49147.2020.00009},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BasinRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ChuatAS0BP20,
  author       = {Laurent Chuat and
                  AbdelRahman Abdou and
                  Ralf Sasse and
                  Christoph Sprenger and
                  David A. Basin and
                  Adrian Perrig},
  title        = {SoK: Delegation and Revocation, the Missing Links in the Web's Chain
                  of Trust},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2020, Genoa, Italy, September 7-11, 2020},
  pages        = {624--638},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSP48549.2020.00046},
  doi          = {10.1109/EUROSP48549.2020.00046},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/ChuatAS0BP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/BasinGKS20,
  author       = {David A. Basin and
                  Matthieu Gras and
                  Srdan Krstic and
                  Joshua Schneider},
  editor       = {Jyotirmoy Deshmukh and
                  Dejan Nickovic},
  title        = {Scalable Online Monitoring of Distributed Systems},
  booktitle    = {Runtime Verification - 20th International Conference, {RV} 2020, Los
                  Angeles, CA, USA, October 6-9, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12399},
  pages        = {197--220},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60508-7\_11},
  doi          = {10.1007/978-3-030-60508-7\_11},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/BasinGKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GirolHSJCB20,
  author       = {Guillaume Girol and
                  Lucca Hirschi and
                  Ralf Sasse and
                  Dennis Jackson and
                  Cas Cremers and
                  David A. Basin},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {A Spectral Analysis of Noise: {A} Comprehensive, Automated, Formal
                  Analysis of Diffie-Hellman Protocols},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {1857--1874},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/girol},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GirolHSJCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-03749,
  author       = {David A. Basin and
                  Sasa Radomirovic and
                  Lara Schmid},
  title        = {Dispute Resolution in Voting},
  journal      = {CoRR},
  volume       = {abs/2005.03749},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.03749},
  eprinttype    = {arXiv},
  eprint       = {2005.03749},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-03749.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-12273,
  author       = {Carmela Troncoso and
                  Mathias Payer and
                  Jean{-}Pierre Hubaux and
                  Marcel Salath{\'{e}} and
                  James R. Larus and
                  Edouard Bugnion and
                  Wouter Lueks and
                  Theresa Stadler and
                  Apostolos Pyrgelis and
                  Daniele Antonioli and
                  Ludovic Barman and
                  Sylvain Chatel and
                  Kenneth G. Paterson and
                  Srdjan Capkun and
                  David A. Basin and
                  Jan Beutel and
                  Dennis Jackson and
                  Marc Roeschlin and
                  Patrick Leu and
                  Bart Preneel and
                  Nigel P. Smart and
                  Aysajan Abidin and
                  Seda F. G{\"{u}}rses and
                  Michael Veale and
                  Cas Cremers and
                  Michael Backes and
                  Nils Ole Tippenhauer and
                  Reuben Binns and
                  Ciro Cattuto and
                  Alain Barrat and
                  Dario Fiore and
                  Manuel Barbosa and
                  Rui Oliveira and
                  Jos{\'{e}} Pereira},
  title        = {Decentralized Privacy-Preserving Proximity Tracing},
  journal      = {CoRR},
  volume       = {abs/2005.12273},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.12273},
  eprinttype    = {arXiv},
  eprint       = {2005.12273},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-12273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-08249,
  author       = {David A. Basin and
                  Ralf Sasse and
                  Jorge Toro{-}Pozo},
  title        = {The {EMV} Standard: Break, Fix, Verify},
  journal      = {CoRR},
  volume       = {abs/2006.08249},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.08249},
  eprinttype    = {arXiv},
  eprint       = {2006.08249},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-08249.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-10387,
  author       = {Mohammad Torabi Dashti and
                  David A. Basin},
  title        = {A Theory of Black-Box Tests},
  journal      = {CoRR},
  volume       = {abs/2006.10387},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.10387},
  eprinttype    = {arXiv},
  eprint       = {2006.10387},
  timestamp    = {Tue, 23 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-10387.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-04749,
  author       = {Christoph Sprenger and
                  Tobias Klenze and
                  Marco Eilers and
                  Felix A. Wolf and
                  Peter M{\"{u}}ller and
                  Martin Clochard and
                  David A. Basin},
  title        = {Igloo: Soundly Linking Compositional Refinement and Separation Logic
                  for Distributed System Verification},
  journal      = {CoRR},
  volume       = {abs/2010.04749},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.04749},
  eprinttype    = {arXiv},
  eprint       = {2010.04749},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-04749.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirschiSB20,
  author       = {Lucca Hirschi and
                  Lara Schmid and
                  David A. Basin},
  title        = {Fixing the Achilles Heel of E-Voting: The Bulletin Board},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirschiSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/BasinBKT19,
  author       = {David A. Basin and
                  Bhargav Nagaraja Bhatt and
                  Srdan Krstic and
                  Dmitriy Traytel},
  title        = {Almost event-rate independent monitoring},
  journal      = {Formal Methods Syst. Des.},
  volume       = {54},
  number       = {3},
  pages        = {449--478},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10703-018-00328-3},
  doi          = {10.1007/S10703-018-00328-3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fmsd/BasinBKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DesfontainesLB19,
  author       = {Damien Desfontaines and
                  Andreas Lochbihler and
                  David A. Basin},
  title        = {Cardinality Estimators do not Preserve Privacy},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2019},
  number       = {2},
  pages        = {26--46},
  year         = {2019},
  url          = {https://doi.org/10.2478/popets-2019-0018},
  doi          = {10.2478/POPETS-2019-0018},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DesfontainesLB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atva/0001BBKT19,
  author       = {Joshua Schneider and
                  David A. Basin and
                  Frederik Brix and
                  Srdan Krstic and
                  Dmitriy Traytel},
  editor       = {Yu{-}Fang Chen and
                  Chih{-}Hong Cheng and
                  Javier Esparza},
  title        = {Adaptive Online First-Order Monitoring},
  booktitle    = {Automated Technology for Verification and Analysis - 17th International
                  Symposium, {ATVA} 2019, Taipei, Taiwan, October 28-31, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11781},
  pages        = {133--150},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31784-3\_8},
  doi          = {10.1007/978-3-030-31784-3\_8},
  timestamp    = {Mon, 03 Jan 2022 17:11:32 +0100},
  biburl       = {https://dblp.org/rec/conf/atva/0001BBKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atva/RaszykBKT19,
  author       = {Martin Raszyk and
                  David A. Basin and
                  Srdan Krstic and
                  Dmitriy Traytel},
  editor       = {Yu{-}Fang Chen and
                  Chih{-}Hong Cheng and
                  Javier Esparza},
  title        = {Multi-head Monitoring of Metric Temporal Logic},
  booktitle    = {Automated Technology for Verification and Analysis - 17th International
                  Symposium, {ATVA} 2019, Taipei, Taiwan, October 28-31, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11781},
  pages        = {151--170},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31784-3\_9},
  doi          = {10.1007/978-3-030-31784-3\_9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atva/RaszykBKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BasinHS19,
  author       = {David A. Basin and
                  Lucca Hirschi and
                  Ralf Sasse},
  editor       = {Joshua D. Guttman and
                  Carl E. Landwehr and
                  Jos{\'{e}} Meseguer and
                  Dusko Pavlovic},
  title        = {Symbolic Analysis of Identity-Based Protocols},
  booktitle    = {Foundations of Security, Protocols, and Equational Reasoning - Essays
                  Dedicated to Catherine A. Meadows},
  series       = {Lecture Notes in Computer Science},
  volume       = {11565},
  pages        = {112--134},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-19052-1\_9},
  doi          = {10.1007/978-3-030-19052-1\_9},
  timestamp    = {Thu, 21 Sep 2023 09:08:34 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/BasinHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CotriniCWB19,
  author       = {Carlos Cotrini and
                  Luca Corinzia and
                  Thilo Weghorn and
                  David A. Basin},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {The Next 700 Policy Miners: {A} Universal Method for Building Policy
                  Miners},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {95--112},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354196},
  doi          = {10.1145/3319535.3354196},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CotriniCWB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HammannRSB19,
  author       = {Sven Hammann and
                  Sasa Radomirovic and
                  Ralf Sasse and
                  David A. Basin},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {User Account Access Graphs},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1405--1422},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354193},
  doi          = {10.1145/3319535.3354193},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HammannRSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LochbihlerSBM19,
  author       = {Andreas Lochbihler and
                  S. Reza Sefidgar and
                  David A. Basin and
                  Ueli Maurer},
  title        = {Formalizing Constructive Cryptography using CryptHOL},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {152--166},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00018},
  doi          = {10.1109/CSF.2019.00018},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/LochbihlerSBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ArfeltBD19,
  author       = {Emma Arfelt and
                  David A. Basin and
                  S{\o}ren Debois},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Monitoring the {GDPR}},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {681--699},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_33},
  doi          = {10.1007/978-3-030-29959-0\_33},
  timestamp    = {Fri, 07 Aug 2020 17:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ArfeltBD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/GuarnieriBSBS19,
  author       = {Marco Guarnieri and
                  Musard Balliu and
                  Daniel Schoepe and
                  David A. Basin and
                  Andrei Sabelfeld},
  title        = {Information-Flow Control for Database-Backed Applications},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {79--94},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00016},
  doi          = {10.1109/EUROSP.2019.00016},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/GuarnieriBSBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/RaszykBT19,
  author       = {Martin Raszyk and
                  David A. Basin and
                  Dmitriy Traytel},
  editor       = {Christel Baier and
                  Ioannis Chatzigiannakis and
                  Paola Flocchini and
                  Stefano Leonardi},
  title        = {From Nondeterministic to Multi-Head Deterministic Finite-State Transducers},
  booktitle    = {46th International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2019, July 9-12, 2019, Patras, Greece},
  series       = {LIPIcs},
  volume       = {132},
  pages        = {127:1--127:14},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2019},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2019.127},
  doi          = {10.4230/LIPICS.ICALP.2019.127},
  timestamp    = {Tue, 27 Dec 2022 09:06:31 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/RaszykBT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/0001BKT19,
  author       = {Joshua Schneider and
                  David A. Basin and
                  Srdan Krstic and
                  Dmitriy Traytel},
  editor       = {Bernd Finkbeiner and
                  Leonardo Mariani},
  title        = {A Formally Verified Monitor for Metric First-Order Temporal Logic},
  booktitle    = {Runtime Verification - 19th International Conference, {RV} 2019, Porto,
                  Portugal, October 8-11, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11757},
  pages        = {310--328},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32079-9\_18},
  doi          = {10.1007/978-3-030-32079-9\_18},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/0001BKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-10775,
  author       = {Laurent Chuat and
                  AbdelRahman Abdou and
                  Ralf Sasse and
                  Christoph Sprenger and
                  David A. Basin and
                  Adrian Perrig},
  title        = {Proxy Certificates: The Missing Link in the Web's Chain of Trust},
  journal      = {CoRR},
  volume       = {abs/1906.10775},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.10775},
  eprinttype    = {arXiv},
  eprint       = {1906.10775},
  timestamp    = {Wed, 19 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-10775.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-05994,
  author       = {Carlos Cotrini and
                  Luca Corinzia and
                  Thilo Weghorn and
                  David A. Basin},
  title        = {The Next 700 Policy Miners: {A} Universal Method for Building Policy
                  Miners},
  journal      = {CoRR},
  volume       = {abs/1908.05994},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.05994},
  eprinttype    = {arXiv},
  eprint       = {1908.05994},
  timestamp    = {Mon, 19 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-05994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-11593,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  title        = {Runtime Verification over Out-of-order Streams},
  journal      = {CoRR},
  volume       = {abs/1909.11593},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.11593},
  eprinttype    = {arXiv},
  eprint       = {1909.11593},
  timestamp    = {Fri, 27 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-11593.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acta/BasinKZ18,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  title        = {Algorithms for monitoring real-time properties},
  journal      = {Acta Informatica},
  volume       = {55},
  number       = {4},
  pages        = {309--338},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00236-017-0295-4},
  doi          = {10.1007/S00236-017-0295-4},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/acta/BasinKZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SprengerB18,
  author       = {Christoph Sprenger and
                  David A. Basin},
  title        = {Refining security protocols},
  journal      = {J. Comput. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {71--120},
  year         = {2018},
  url          = {https://doi.org/10.3233/JCS-16814},
  doi          = {10.3233/JCS-16814},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SprengerB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BasinCKPSS18,
  author       = {David A. Basin and
                  Cas Cremers and
                  Tiffany Hyun{-}Jin Kim and
                  Adrian Perrig and
                  Ralf Sasse and
                  Pawel Szalachowski},
  title        = {Design, Analysis, and Implementation of {ARPKI:} An Attack-Resilient
                  Public-Key Infrastructure},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {3},
  pages        = {393--408},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2601610},
  doi          = {10.1109/TDSC.2016.2601610},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BasinCKPSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atva/BasinBT18,
  author       = {David A. Basin and
                  Bhargav Nagaraja Bhatt and
                  Dmitriy Traytel},
  editor       = {Shuvendu K. Lahiri and
                  Chao Wang},
  title        = {Optimal Proofs for Linear Temporal Logic on Lasso Words},
  booktitle    = {Automated Technology for Verification and Analysis - 16th International
                  Symposium, {ATVA} 2018, Los Angeles, CA, USA, October 7-10, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11138},
  pages        = {37--55},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01090-4\_3},
  doi          = {10.1007/978-3-030-01090-4\_3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atva/BasinBT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BasinDHRSS18,
  author       = {David A. Basin and
                  Jannik Dreier and
                  Lucca Hirschi and
                  Sasa Radomirovic and
                  Ralf Sasse and
                  Vincent Stettler},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {A Formal Analysis of 5G Authentication},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1383--1396},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243846},
  doi          = {10.1145/3243734.3243846},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BasinDHRSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BasinRS18,
  author       = {David A. Basin and
                  Sasa Radomirovic and
                  Lara Schmid},
  title        = {Alethea: {A} Provably Secure Random Sample Voting Protocol},
  booktitle    = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford,
                  United Kingdom, July 9-12, 2018},
  pages        = {283--297},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CSF.2018.00028},
  doi          = {10.1109/CSF.2018.00028},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BasinRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/CotriniWB18,
  author       = {Carlos Cotrini and
                  Thilo Weghorn and
                  David A. Basin},
  title        = {Mining {ABAC} Rules from Sparse Logs},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {31--46},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00011},
  doi          = {10.1109/EUROSP.2018.00011},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/CotriniWB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BasinDH18,
  author       = {David A. Basin and
                  S{\o}ren Debois and
                  Thomas T. Hildebrandt},
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {On Purpose and by Necessity: Compliance Under the {GDPR}},
  booktitle    = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {20--37},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6\_2},
  doi          = {10.1007/978-3-662-58387-6\_2},
  timestamp    = {Fri, 30 Aug 2019 11:17:01 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BasinDH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/KlenzeGPPB18,
  author       = {Tobias Klenze and
                  Giacomo Giuliari and
                  Christos Pappas and
                  Adrian Perrig and
                  David A. Basin},
  title        = {Networking in Heaven as on Earth},
  booktitle    = {Proceedings of the 17th {ACM} Workshop on Hot Topics in Networks,
                  HotNets 2018, Redmond, WA, USA, November 15-16, 2018},
  pages        = {22--28},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3286062.3286066},
  doi          = {10.1145/3286062.3286066},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hotnets/KlenzeGPPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/SchneiderBBKT18,
  author       = {Joshua Schneider and
                  David A. Basin and
                  Frederik Brix and
                  Srdan Krstic and
                  Dmitriy Traytel},
  editor       = {Christian Colombo and
                  Martin Leucker},
  title        = {Scalable Online First-Order Monitoring},
  booktitle    = {Runtime Verification - 18th International Conference, {RV} 2018, Limassol,
                  Cyprus, November 10-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11237},
  pages        = {353--371},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03769-7\_20},
  doi          = {10.1007/978-3-030-03769-7\_20},
  timestamp    = {Sat, 12 Jun 2021 11:01:04 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/SchneiderBBKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/CostaBBDG18,
  author       = {Gabriele Costa and
                  David A. Basin and
                  Chiara Bodei and
                  Pierpaolo Degano and
                  Letterio Galletta},
  editor       = {Dirk Beyer and
                  Marieke Huisman},
  title        = {From Natural Projection to Partial Model Checking and Back},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 24th International Conference, {TACAS} 2018, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10805},
  pages        = {344--361},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89960-2\_19},
  doi          = {10.1007/978-3-319-89960-2\_19},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/CostaBBDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/mc/BasinCM18,
  author       = {David A. Basin and
                  Cas Cremers and
                  Catherine Meadows},
  editor       = {Edmund M. Clarke and
                  Thomas A. Henzinger and
                  Helmut Veith and
                  Roderick Bloem},
  title        = {Model Checking Security Protocols},
  booktitle    = {Handbook of Model Checking},
  pages        = {727--762},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-10575-8\_22},
  doi          = {10.1007/978-3-319-10575-8\_22},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/mc/BasinCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-10360,
  author       = {David A. Basin and
                  Jannik Dreier and
                  Lucca Hirschi and
                  Sasa Radomirovic and
                  Ralf Sasse and
                  Vincent Stettler},
  title        = {Formal Analysis of 5G Authentication},
  journal      = {CoRR},
  volume       = {abs/1806.10360},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.10360},
  eprinttype    = {arXiv},
  eprint       = {1806.10360},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-10360.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-05879,
  author       = {Damien Desfontaines and
                  Andreas Lochbihler and
                  David A. Basin},
  title        = {Cardinality Estimators do not Preserve Privacy},
  journal      = {CoRR},
  volume       = {abs/1808.05879},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.05879},
  eprinttype    = {arXiv},
  eprint       = {1808.05879},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-05879.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siglog/BasinCDS17,
  author       = {David A. Basin and
                  Cas Cremers and
                  Jannik Dreier and
                  Ralf Sasse},
  title        = {Symbolically analyzing security protocols using tamarin},
  journal      = {{ACM} {SIGLOG} News},
  volume       = {4},
  number       = {4},
  pages        = {19--30},
  year         = {2017},
  url          = {https://doi.org/10.1145/3157831.3157835},
  doi          = {10.1145/3157831.3157835},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siglog/BasinCDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atva/DashtiB17,
  author       = {Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Deepak D'Souza and
                  K. Narayan Kumar},
  title        = {Tests and Refutation},
  booktitle    = {Automated Technology for Verification and Analysis - 15th International
                  Symposium, {ATVA} 2017, Pune, India, October 3-6, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10482},
  pages        = {119--138},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68167-2\_9},
  doi          = {10.1007/978-3-319-68167-2\_9},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/atva/DashtiB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/MaricSB17,
  author       = {Ognjen Maric and
                  Christoph Sprenger and
                  David A. Basin},
  editor       = {Rupak Majumdar and
                  Viktor Kuncak},
  title        = {Cutoff Bounds for Consensus Algorithms},
  booktitle    = {Computer Aided Verification - 29th International Conference, {CAV}
                  2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10427},
  pages        = {217--237},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63390-9\_12},
  doi          = {10.1007/978-3-319-63390-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/MaricSB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/BasinKZ17,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  editor       = {Rupak Majumdar and
                  Viktor Kuncak},
  title        = {Runtime Verification of Temporal Properties over Out-of-Order Data
                  Streams},
  booktitle    = {Computer Aided Verification - 29th International Conference, {CAV}
                  2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10426},
  pages        = {356--376},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63387-9\_18},
  doi          = {10.1007/978-3-319-63387-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/BasinKZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GuarnieriMB17,
  author       = {Marco Guarnieri and
                  Srdjan Marinovic and
                  David A. Basin},
  title        = {Securing Databases from Probabilistic Inference},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {343--359},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.30},
  doi          = {10.1109/CSF.2017.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GuarnieriMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/LallemandBS17,
  author       = {Joseph Lallemand and
                  David A. Basin and
                  Christoph Sprenger},
  title        = {Refining Authenticated Key Agreement with Strong Adversaries},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {92--107},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.22},
  doi          = {10.1109/EUROSP.2017.22},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/LallemandBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/GuarnieriTBDB17,
  author       = {Marco Guarnieri and
                  Petar Tsankov and
                  Tristan Buchs and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Tevfik Bultan and
                  Koushik Sen},
  title        = {Test execution checkpointing for web applications},
  booktitle    = {Proceedings of the 26th {ACM} {SIGSOFT} International Symposium on
                  Software Testing and Analysis, Santa Barbara, CA, USA, July 10 - 14,
                  2017},
  pages        = {203--214},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092703.3092710},
  doi          = {10.1145/3092703.3092710},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issta/GuarnieriTBDB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/BasinKZ17,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  editor       = {Giles Reger and
                  Klaus Havelund},
  title        = {The MonPoly Monitoring Tool},
  booktitle    = {RV-CuBES 2017. An International Workshop on Competitions, Usability,
                  Benchmarks, Evaluation, and Standardisation for Runtime Verification
                  Tools, September 15, 2017, Seattle, WA, {USA}},
  series       = {Kalpa Publications in Computing},
  volume       = {3},
  pages        = {19--28},
  publisher    = {EasyChair},
  year         = {2017},
  url          = {https://doi.org/10.29007/89hs},
  doi          = {10.29007/89HS},
  timestamp    = {Sun, 15 Aug 2021 10:46:48 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/BasinKZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/BasinKT17a,
  author       = {David A. Basin and
                  Srdjan Krstic and
                  Dmitriy Traytel},
  editor       = {Giles Reger and
                  Klaus Havelund},
  title        = {{AERIAL:} Almost Event-Rate Independent Algorithms for Monitoring
                  Metric Regular Properties},
  booktitle    = {RV-CuBES 2017. An International Workshop on Competitions, Usability,
                  Benchmarks, Evaluation, and Standardisation for Runtime Verification
                  Tools, September 15, 2017, Seattle, WA, {USA}},
  series       = {Kalpa Publications in Computing},
  volume       = {3},
  pages        = {29--36},
  publisher    = {EasyChair},
  year         = {2017},
  url          = {https://doi.org/10.29007/bm4c},
  doi          = {10.29007/BM4C},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/BasinKT17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/BasinKT17,
  author       = {David A. Basin and
                  Srdan Krstic and
                  Dmitriy Traytel},
  editor       = {Shuvendu K. Lahiri and
                  Giles Reger},
  title        = {Almost Event-Rate Independent Monitoring of Metric Dynamic Logic},
  booktitle    = {Runtime Verification - 17th International Conference, {RV} 2017, Seattle,
                  WA, USA, September 13-16, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10548},
  pages        = {85--102},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67531-2\_6},
  doi          = {10.1007/978-3-319-67531-2\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/BasinKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/BasinBT17,
  author       = {David A. Basin and
                  Bhargav Nagaraja Bhatt and
                  Dmitriy Traytel},
  editor       = {Axel Legay and
                  Tiziana Margaria},
  title        = {Almost Event-Rate Independent Monitoring of Metric Temporal Logic},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 23rd International Conference, {TACAS} 2017, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10206},
  pages        = {94--112},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54580-5\_6},
  doi          = {10.1007/978-3-662-54580-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/BasinBT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/BasinGMST17,
  author       = {David A. Basin and
                  Hans Gersbach and
                  Akaki Mamageishvili and
                  Lara Schmid and
                  Oriol Tejada},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Nadja Braun Binder and
                  Norbert Kersting and
                  Olivier Pereira and
                  Carsten Sch{\"{u}}rmann},
  title        = {Election Security and Economics: It's All About Eve},
  booktitle    = {Electronic Voting - Second International Joint Conference, E-Vote-ID
                  2017, Bregenz, Austria, October 24-27, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10615},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68687-5\_1},
  doi          = {10.1007/978-3-319-68687-5\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/BasinGMST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GuarnieriMB17,
  author       = {Marco Guarnieri and
                  Srdjan Marinovic and
                  David A. Basin},
  title        = {Securing Databases from Probabilistic Inference},
  journal      = {CoRR},
  volume       = {abs/1706.02473},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.02473},
  eprinttype    = {arXiv},
  eprint       = {1706.02473},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GuarnieriMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BasinKZ17,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  title        = {Runtime Verification of Temporal Properties over Out-of-order Data
                  Streams},
  journal      = {CoRR},
  volume       = {abs/1707.05555},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.05555},
  eprinttype    = {arXiv},
  eprint       = {1707.05555},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BasinKZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BasinLS17,
  author       = {David A. Basin and
                  Andreas Lochbihler and
                  S. Reza Sefidgar},
  title        = {CryptHOL: Game-based Proofs in Higher-order Logic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {753},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/753},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BasinLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/BasinCEHKM16,
  author       = {David A. Basin and
                  Germano Caronni and
                  Sarah Ereth and
                  Mat{\'{u}}s Harvan and
                  Felix Klaedtke and
                  Heiko Mantel},
  title        = {Scalable offline monitoring of temporal specifications},
  journal      = {Formal Methods Syst. Des.},
  volume       = {49},
  number       = {1-2},
  pages        = {75--108},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10703-016-0242-y},
  doi          = {10.1007/S10703-016-0242-Y},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fmsd/BasinCEHKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/FurstHBSM16,
  author       = {Andreas F{\"{u}}rst and
                  Thai Son Hoang and
                  David A. Basin and
                  Naoto Sato and
                  Kunihiko Miyazaki},
  title        = {Large-scale system development using Abstract Data Types and refinement},
  journal      = {Sci. Comput. Program.},
  volume       = {131},
  pages        = {59--75},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.scico.2016.04.010},
  doi          = {10.1016/J.SCICO.2016.04.010},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/FurstHBSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BasinDH16,
  author       = {David A. Basin and
                  S{\o}ren Debois and
                  Thomas T. Hildebrandt},
  title        = {In the Nick of Time: Proactive Prevention of Obligation Violations},
  booktitle    = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon,
                  Portugal, June 27 - July 1, 2016},
  pages        = {120--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSF.2016.16},
  doi          = {10.1109/CSF.2016.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BasinDH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BasinRS16,
  author       = {David A. Basin and
                  Sasa Radomirovic and
                  Lara Schmid},
  title        = {Modeling Human Errors in Security Protocols},
  booktitle    = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon,
                  Portugal, June 27 - July 1, 2016},
  pages        = {325--340},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSF.2016.30},
  doi          = {10.1109/CSF.2016.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BasinRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/TsankovDB16,
  author       = {Petar Tsankov and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  title        = {Access Control Synthesis for Physical Spaces},
  booktitle    = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon,
                  Portugal, June 27 - July 1, 2016},
  pages        = {443--457},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSF.2016.38},
  doi          = {10.1109/CSF.2016.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/TsankovDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/DashtiB16,
  author       = {Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Juan Caballero and
                  Eric Bodden and
                  Elias Athanasopoulos},
  title        = {Security Testing Beyond Functional Tests},
  booktitle    = {Engineering Secure Software and Systems - 8th International Symposium,
                  ESSoS 2016, London, UK, April 6-8, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9639},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-30806-7\_1},
  doi          = {10.1007/978-3-319-30806-7\_1},
  timestamp    = {Tue, 01 Jun 2021 15:22:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/DashtiB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/GuarnieriMB16,
  author       = {Marco Guarnieri and
                  Srdjan Marinovic and
                  David A. Basin},
  title        = {Strong and Provably Secure Database Access Control},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages        = {163--178},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EuroSP.2016.23},
  doi          = {10.1109/EUROSP.2016.23},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/GuarnieriMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TsankovDB16,
  author       = {Petar Tsankov and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  title        = {Access Control Synthesis for Physical Spaces},
  journal      = {CoRR},
  volume       = {abs/1605.01769},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.01769},
  eprinttype    = {arXiv},
  eprint       = {1605.01769},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TsankovDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/YuSBC16,
  author       = {Der{-}Yeuan Yu and
                  Elizabeth Stobert and
                  David A. Basin and
                  Srdjan Capkun},
  title        = {Exploring Website Location as a Security Indicator},
  journal      = {CoRR},
  volume       = {abs/1610.03647},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.03647},
  eprinttype    = {arXiv},
  eprint       = {1610.03647},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/YuSBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/BasinKMZ15,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Srdjan Marinovic and
                  Eugen Zalinescu},
  title        = {Monitoring of temporal first-order properties with aggregations},
  journal      = {Formal Methods Syst. Des.},
  volume       = {46},
  number       = {3},
  pages        = {262--285},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10703-015-0222-7},
  doi          = {10.1007/S10703-015-0222-7},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fmsd/BasinKMZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BasinCMRW15,
  author       = {David A. Basin and
                  Cas Cremers and
                  Kunihiko Miyazaki and
                  Sasa Radomirovic and
                  Dai Watanabe},
  title        = {Improving the Security of Cryptographic Protocol Standards},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {3},
  pages        = {24--31},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2013.162},
  doi          = {10.1109/MSP.2013.162},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BasinCMRW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/BasinKZ15,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  title        = {Greedily computing associative aggregations on sliding windows},
  journal      = {Inf. Process. Lett.},
  volume       = {115},
  number       = {2},
  pages        = {186--192},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ipl.2014.09.009},
  doi          = {10.1016/J.IPL.2014.09.009},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/BasinKZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/BasinKMZ15,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Samuel M{\"{u}}ller and
                  Eugen Zalinescu},
  title        = {Monitoring Metric First-Order Temporal Properties},
  journal      = {J. {ACM}},
  volume       = {62},
  number       = {2},
  pages        = {15:1--15:45},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699444},
  doi          = {10.1145/2699444},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/BasinKMZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BasinKRS15,
  author       = {David A. Basin and
                  Michel Keller and
                  Sasa Radomirovic and
                  Ralf Sasse},
  editor       = {Narciso Mart{\'{\i}}{-}Oliet and
                  Peter Csaba {\"{O}}lveczky and
                  Carolyn L. Talcott},
  title        = {Alice and Bob Meet Equational Theories},
  booktitle    = {Logic, Rewriting, and Concurrency - Essays dedicated to Jos{\'{e}}
                  Meseguer on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9200},
  pages        = {160--180},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23165-5\_7},
  doi          = {10.1007/978-3-319-23165-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/BasinKRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BasinDS15,
  author       = {David A. Basin and
                  Jannik Dreier and
                  Ralf Sasse},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Automated Symbolic Proofs of Observational Equivalence},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1144--1155},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813662},
  doi          = {10.1145/2810103.2813662},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BasinDS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JimenezWBC15,
  author       = {Carlos Cotrini Jim{\'{e}}nez and
                  Thilo Weghorn and
                  David A. Basin and
                  Manuel Clavel},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {Analyzing First-Order Role Based Access Control},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {3--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.8},
  doi          = {10.1109/CSF.2015.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/JimenezWBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BasinRS15,
  author       = {David A. Basin and
                  Sasa Radomirovic and
                  Michael Schl{\"{a}}pfer},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {A Complete Characterization of Secure Human-Server Communication},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {199--213},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.21},
  doi          = {10.1109/CSF.2015.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BasinRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/MaricSB15,
  author       = {Ognjen Maric and
                  Christoph Sprenger and
                  David A. Basin},
  title        = {Consensus Refined},
  booktitle    = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015},
  pages        = {391--402},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/DSN.2015.38},
  doi          = {10.1109/DSN.2015.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/MaricSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/BasinKZ15,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  editor       = {Prahladh Harsha and
                  G. Ramalingam},
  title        = {Failure-aware Runtime Verification of Distributed Systems},
  booktitle    = {35th {IARCS} Annual Conference on Foundation of Software Technology
                  and Theoretical Computer Science, {FSTTCS} 2015, December 16-18, 2015,
                  Bangalore, India},
  series       = {LIPIcs},
  volume       = {45},
  pages        = {590--603},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2015},
  url          = {https://doi.org/10.4230/LIPIcs.FSTTCS.2015.590},
  doi          = {10.4230/LIPICS.FSTTCS.2015.590},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/fsttcs/BasinKZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/time/MareticDB15,
  author       = {Grgur Petric Maretic and
                  Muhammad Torabi Dashti and
                  David A. Basin},
  editor       = {Fabio Grandi and
                  Martin Lange and
                  Alessio Lomuscio},
  title        = {Semantic Vacuity},
  booktitle    = {22nd International Symposium on Temporal Representation and Reasoning,
                  {TIME} 2015, Kassel, Germany, September 23-25, 2015},
  pages        = {111--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIME.2015.14},
  doi          = {10.1109/TIME.2015.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/time/MareticDB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GuarnieriMB15,
  author       = {Marco Guarnieri and
                  Srdjan Marinovic and
                  David A. Basin},
  title        = {Strong and Provably Secure Database Access Control},
  journal      = {CoRR},
  volume       = {abs/1512.01479},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.01479},
  eprinttype    = {arXiv},
  eprint       = {1512.01479},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GuarnieriMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ReardonBC14,
  author       = {Joel Reardon and
                  David A. Basin and
                  Srdjan Capkun},
  title        = {On Secure Data Deletion},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {37--44},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.159},
  doi          = {10.1109/MSP.2013.159},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ReardonBC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/MareticDB14,
  author       = {Grgur Petric Maretic and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  title        = {{LTL} is closed under topological closure},
  journal      = {Inf. Process. Lett.},
  volume       = {114},
  number       = {8},
  pages        = {408--413},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ipl.2014.03.001},
  doi          = {10.1016/J.IPL.2014.03.001},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/MareticDB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/BasinJKZ14,
  author       = {David A. Basin and
                  Carlos Cotrini Jim{\'{e}}nez and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  title        = {Deciding safety and liveness in {TPTL}},
  journal      = {Inf. Process. Lett.},
  volume       = {114},
  number       = {12},
  pages        = {680--688},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ipl.2014.06.005},
  doi          = {10.1016/J.IPL.2014.06.005},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/BasinJKZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BasinBK14,
  author       = {David A. Basin and
                  Samuel J. Burri and
                  G{\"{u}}nter Karjoth},
  title        = {Obstruction-free authorization enforcement: Aligning security and
                  business objectives},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {661--698},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140500},
  doi          = {10.3233/JCS-140500},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BasinBK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/GuarnieriB14,
  author       = {Marco Guarnieri and
                  David A. Basin},
  title        = {Optimal Security-Aware Query Processing},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {7},
  number       = {12},
  pages        = {1307--1318},
  year         = {2014},
  url          = {http://www.vldb.org/pvldb/vol7/p1307-guarnieri.pdf},
  doi          = {10.14778/2732977.2733003},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/GuarnieriB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BasinC14,
  author       = {David A. Basin and
                  Cas Cremers},
  title        = {Know Your Enemy: Compromising Adversaries in Protocol Analysis},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {7:1--7:31},
  year         = {2014},
  url          = {https://doi.org/10.1145/2658996},
  doi          = {10.1145/2658996},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BasinC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/BasinCEDD14,
  author       = {David A. Basin and
                  Manuel Clavel and
                  Marina Egea and
                  Miguel Angel Garc{\'{\i}}a de Dios and
                  Carolina Dania},
  title        = {A Model-Driven Methodology for Developing Secure Data-Management Applications},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {40},
  number       = {4},
  pages        = {324--337},
  year         = {2014},
  url          = {https://doi.org/10.1109/TSE.2013.2297116},
  doi          = {10.1109/TSE.2013.2297116},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/BasinCEDD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asm/FurstHBSM14,
  author       = {Andreas F{\"{u}}rst and
                  Thai Son Hoang and
                  David A. Basin and
                  Naoto Sato and
                  Kunihiko Miyazaki},
  editor       = {Yamine A{\"{\i}}t Ameur and
                  Klaus{-}Dieter Schewe},
  title        = {Formal System Modelling Using Abstract Data Types in Event-B},
  booktitle    = {Abstract State Machines, Alloy, B, TLA, VDM, and {Z} - 4th International
                  Conference, {ABZ} 2014, Toulouse, France, June 2-6, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8477},
  pages        = {222--237},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43652-3\_20},
  doi          = {10.1007/978-3-662-43652-3\_20},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/asm/FurstHBSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BasinCKPSS14,
  author       = {David A. Basin and
                  Cas Cremers and
                  Tiffany Hyun{-}Jin Kim and
                  Adrian Perrig and
                  Ralf Sasse and
                  Pawel Szalachowski},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{ARPKI:} Attack Resilient Public-Key Infrastructure},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {382--393},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660298},
  doi          = {10.1145/2660267.2660298},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BasinCKPSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TsankovMDB14,
  author       = {Petar Tsankov and
                  Srdjan Marinovic and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Fail-Secure Access Control},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1157--1168},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660307},
  doi          = {10.1145/2660267.2660307},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TsankovMDB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BasinCH14,
  author       = {David A. Basin and
                  Cas Cremers and
                  Marko Horvat},
  title        = {Actor Key Compromise: Consequences and Countermeasures},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {244--258},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.25},
  doi          = {10.1109/CSF.2014.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BasinCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/MareticDB14,
  author       = {Grgur Petric Maretic and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Thomas A. Henzinger and
                  Dale Miller},
  title        = {Anchored {LTL} separation},
  booktitle    = {Joint Meeting of the Twenty-Third {EACSL} Annual Conference on Computer
                  Science Logic {(CSL)} and the Twenty-Ninth Annual {ACM/IEEE} Symposium
                  on Logic in Computer Science (LICS), {CSL-LICS} '14, Vienna, Austria,
                  July 14 - 18, 2014},
  pages        = {74:1--74:9},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2603088.2603139},
  doi          = {10.1145/2603088.2603139},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csl/MareticDB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifm/FurstHBDSM14,
  author       = {Andreas F{\"{u}}rst and
                  Thai Son Hoang and
                  David A. Basin and
                  Krishnaji Desai and
                  Naoto Sato and
                  Kunihiko Miyazaki},
  editor       = {Elvira Albert and
                  Emil Sekerinski},
  title        = {Code Generation for Event-B},
  booktitle    = {Integrated Formal Methods - 11th International Conference, {IFM} 2014,
                  Bertinoro, Italy, September 9-11, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8739},
  pages        = {323--338},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10181-1\_20},
  doi          = {10.1007/978-3-319-10181-1\_20},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifm/FurstHBDSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/TsankovMDB14,
  author       = {Petar Tsankov and
                  Srdjan Marinovic and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Decentralized Composite Access Control},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {245--264},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_14},
  doi          = {10.1007/978-3-642-54792-8\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/post/TsankovMDB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/BasinCEHKM14,
  author       = {David A. Basin and
                  Germano Caronni and
                  Sarah Ereth and
                  Mat{\'{u}}s Harvan and
                  Felix Klaedtke and
                  Heiko Mantel},
  editor       = {Borzoo Bonakdarpour and
                  Scott A. Smolka},
  title        = {Scalable Offline Monitoring},
  booktitle    = {Runtime Verification - 5th International Conference, {RV} 2014, Toronto,
                  ON, Canada, September 22-25, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8734},
  pages        = {31--47},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11164-3\_4},
  doi          = {10.1007/978-3-319-11164-3\_4},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/BasinCEHKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/BasinKMZ14,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Srdjan Marinovic and
                  Eugen Zalinescu},
  editor       = {Borzoo Bonakdarpour and
                  Scott A. Smolka},
  title        = {On Real-Time Monitoring with Imprecise Timestamps},
  booktitle    = {Runtime Verification - 5th International Conference, {RV} 2014, Toronto,
                  ON, Canada, September 22-25, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8734},
  pages        = {193--198},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11164-3\_16},
  doi          = {10.1007/978-3-319-11164-3\_16},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/BasinKMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SchmidtSCB14,
  author       = {Benedikt Schmidt and
                  Ralf Sasse and
                  Cas Cremers and
                  David A. Basin},
  title        = {Automated Verification of Group Key Agreement Protocols},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {179--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.19},
  doi          = {10.1109/SP.2014.19},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SchmidtSCB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/YuRLCB14,
  author       = {Der{-}Yeuan Yu and
                  Aanjhan Ranganathan and
                  Thomas Locher and
                  Srdjan Capkun and
                  David A. Basin},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Short paper: detection of {GPS} spoofing attacks in power grids},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {99--104},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627398},
  doi          = {10.1145/2627393.2627398},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/YuRLCB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/DiosDBC14,
  author       = {Miguel Angel Garc{\'{\i}}a de Dios and
                  Carolina Dania and
                  David A. Basin and
                  Manuel Clavel},
  editor       = {Maritta Heisel and
                  Wouter Joosen and
                  Javier L{\'{o}}pez and
                  Fabio Martinelli},
  title        = {Model-Driven Development of a Secure eHealth Application},
  booktitle    = {Engineering Secure Future Internet Services and Systems - Current
                  Research},
  series       = {Lecture Notes in Computer Science},
  volume       = {8431},
  pages        = {97--118},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07452-8\_4},
  doi          = {10.1007/978-3-319-07452-8\_4},
  timestamp    = {Thu, 29 Aug 2019 08:09:56 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/DiosDBC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MeierCB13,
  author       = {Simon Meier and
                  Cas Cremers and
                  David A. Basin},
  title        = {Efficient construction of machine-checked symbolic protocol security
                  proofs},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {41--87},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-2012-0455},
  doi          = {10.3233/JCS-2012-0455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MeierCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BasinCM13,
  author       = {David A. Basin and
                  Cas Cremers and
                  Simon Meier},
  title        = {Provably repairing the {ISO/IEC} 9798 standard for entity authentication},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {6},
  pages        = {817--846},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-130472},
  doi          = {10.3233/JCS-130472},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BasinCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/FrankBB13,
  author       = {Mario Frank and
                  Joachim M. Buhmann and
                  David A. Basin},
  title        = {Role Mining with Probabilistic Models},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {15:1--15:28},
  year         = {2013},
  url          = {https://doi.org/10.1145/2445566.2445567},
  doi          = {10.1145/2445566.2445567},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/FrankBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BasinJKZ13,
  author       = {David A. Basin and
                  Vincent Jug{\'{e}} and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  title        = {Enforceable Security Policies Revisited},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {3},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487222.2487225},
  doi          = {10.1145/2487222.2487225},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BasinJKZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/FischerBEE13,
  author       = {Daniel Fischer and
                  David A. Basin and
                  Knut Eckstein and
                  Thomas Engel},
  title        = {Predictable Mobile Routing for Spacecraft Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {12},
  number       = {6},
  pages        = {1174--1187},
  year         = {2013},
  url          = {https://doi.org/10.1109/TMC.2012.93},
  doi          = {10.1109/TMC.2012.93},
  timestamp    = {Sun, 26 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/FischerBEE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/BasinHKZ13,
  author       = {David A. Basin and
                  Mat{\'{u}}s Harvan and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  title        = {Monitoring Data Usage in Distributed Systems},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {39},
  number       = {10},
  pages        = {1403--1426},
  year         = {2013},
  url          = {https://doi.org/10.1109/TSE.2013.18},
  doi          = {10.1109/TSE.2013.18},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/BasinHKZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/MeierSCB13,
  author       = {Simon Meier and
                  Benedikt Schmidt and
                  Cas Cremers and
                  David A. Basin},
  editor       = {Natasha Sharygina and
                  Helmut Veith},
  title        = {The {TAMARIN} Prover for the Symbolic Analysis of Security Protocols},
  booktitle    = {Computer Aided Verification - 25th International Conference, {CAV}
                  2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8044},
  pages        = {696--701},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39799-8\_48},
  doi          = {10.1007/978-3-642-39799-8\_48},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/MeierSCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ReardonRBC13,
  author       = {Joel Reardon and
                  Hubert Ritzdorf and
                  David A. Basin and
                  Srdjan Capkun},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Secure data deletion from persistent media},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {271--284},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516699},
  doi          = {10.1145/2508859.2516699},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ReardonRBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ConchinhaBC13,
  author       = {Bruno Conchinha and
                  David A. Basin and
                  Carlos Caleiro},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Symbolic Probabilistic Analysis of Off-Line Guessing},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {363--380},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_21},
  doi          = {10.1007/978-3-642-40203-6\_21},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ConchinhaBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/TsankovDB13,
  author       = {Petar Tsankov and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Mauro Pezz{\`{e}} and
                  Mark Harman},
  title        = {Semi-valid input coverage for fuzz testing},
  booktitle    = {International Symposium on Software Testing and Analysis, {ISSTA}
                  '13, Lugano, Switzerland, July 15-20, 2013},
  pages        = {56--66},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2483760.2483787},
  doi          = {10.1145/2483760.2483787},
  timestamp    = {Sun, 02 Oct 2022 16:10:12 +0200},
  biburl       = {https://dblp.org/rec/conf/issta/TsankovDB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/BasinKMZ13,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Srdjan Marinovic and
                  Eugen Zalinescu},
  editor       = {Axel Legay and
                  Saddek Bensalem},
  title        = {Monitoring of Temporal First-Order Properties with Aggregations},
  booktitle    = {Runtime Verification - 4th International Conference, {RV} 2013, Rennes,
                  France, September 24-27, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8174},
  pages        = {40--58},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40787-1\_3},
  doi          = {10.1007/978-3-642-40787-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/BasinKMZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ReardonBC13,
  author       = {Joel Reardon and
                  David A. Basin and
                  Srdjan Capkun},
  title        = {SoK: Secure Data Deletion},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {301--315},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.28},
  doi          = {10.1109/SP.2013.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ReardonBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/BasinH13,
  author       = {David A. Basin and
                  Thai Son Hoang},
  editor       = {Alexander B. Romanovsky and
                  Martyn Thomas},
  title        = {Technology Transfer},
  booktitle    = {Industrial Deployment of System Engineering Methods},
  pages        = {187--196},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-33170-1\_13},
  doi          = {10.1007/978-3-642-33170-1\_13},
  timestamp    = {Mon, 05 Feb 2024 20:35:54 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/p/BasinH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2013,
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1},
  doi          = {10.1007/978-3-642-36830-1},
  isbn         = {978-3-642-36829-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BasinC12,
  author       = {David A. Basin and
                  Srdjan Capkun},
  title        = {The research value of publishing attacks},
  journal      = {Commun. {ACM}},
  volume       = {55},
  number       = {11},
  pages        = {22--24},
  year         = {2012},
  url          = {https://doi.org/10.1145/2366316.2366324},
  doi          = {10.1145/2366316.2366324},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/BasinC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmlr/FrankSBB12,
  author       = {Mario Frank and
                  Andreas P. Streich and
                  David A. Basin and
                  Joachim M. Buhmann},
  title        = {Multi-Assignment Clustering for Boolean Data},
  journal      = {J. Mach. Learn. Res.},
  volume       = {13},
  pages        = {459--489},
  year         = {2012},
  url          = {https://dl.acm.org/doi/10.5555/2503308.2188400},
  doi          = {10.5555/2503308.2188400},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmlr/FrankSBB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BasinBK12,
  author       = {David A. Basin and
                  Samuel J. Burri and
                  G{\"{u}}nter Karjoth},
  title        = {Dynamic enforcement of abstract separation of duty constraints},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {13:1--13:30},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382448.2382451},
  doi          = {10.1145/2382448.2382451},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BasinBK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ReardonMCB12,
  author       = {Joel Reardon and
                  Claudio Marforio and
                  Srdjan Capkun and
                  David A. Basin},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {User-level secure deletion on log-structured file systems},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {63--64},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414493},
  doi          = {10.1145/2414456.2414493},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ReardonMCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SchmidtMCB12,
  author       = {Benedikt Schmidt and
                  Simon Meier and
                  Cas Cremers and
                  David A. Basin},
  editor       = {Stephen Chong},
  title        = {Automated Analysis of Diffie-Hellman Protocols and Advanced Security
                  Properties},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {78--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.25},
  doi          = {10.1109/CSF.2012.25},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/SchmidtMCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SprengerB12,
  author       = {Christoph Sprenger and
                  David A. Basin},
  editor       = {Stephen Chong},
  title        = {Refining Key Establishment},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {230--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.21},
  doi          = {10.1109/CSF.2012.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/SprengerB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/TsankovDB12,
  author       = {Petar Tsankov and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Daniel Hoffman and
                  John Hughes and
                  Dianxiang Xu},
  title        = {{SECFUZZ:} Fuzz-testing security protocols},
  booktitle    = {7th International Workshop on Automation of Software Test, {AST} 2012,
                  Zurich, Switzerland, June 2-3, 2012},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IWAST.2012.6228985},
  doi          = {10.1109/IWAST.2012.6228985},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/TsankovDB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BasinCM12,
  author       = {David A. Basin and
                  Cas Cremers and
                  Simon Meier},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {Provably Repairing the {ISO/IEC} 9798 Standard for Entity Authentication},
  booktitle    = {Principles of Security and Trust - First International Conference,
                  {POST} 2012, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
                  - April 1, 2012, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7215},
  pages        = {129--148},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28641-4\_8},
  doi          = {10.1007/978-3-642-28641-4\_8},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BasinCM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BasinJKZ12,
  author       = {David A. Basin and
                  Vincent Jug{\'{e}} and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {Enforceable Security Policies Revisited},
  booktitle    = {Principles of Security and Trust - First International Conference,
                  {POST} 2012, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
                  - April 1, 2012, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7215},
  pages        = {309--328},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28641-4\_17},
  doi          = {10.1007/978-3-642-28641-4\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BasinJKZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/BasinKMZ12,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Srdjan Marinovic and
                  Eugen Zalinescu},
  editor       = {Shaz Qadeer and
                  Serdar Tasiran},
  title        = {Monitoring Compliance Policies over Incomplete and Disagreeing Logs},
  booktitle    = {Runtime Verification, Third International Conference, {RV} 2012, Istanbul,
                  Turkey, September 25-28, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7687},
  pages        = {151--167},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35632-2\_17},
  doi          = {10.1007/978-3-642-35632-2\_17},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/BasinKMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BasinBK12,
  author       = {David A. Basin and
                  Samuel J. Burri and
                  G{\"{u}}nter Karjoth},
  editor       = {Vijay Atluri and
                  Jaideep Vaidya and
                  Axel Kern and
                  Murat Kantarcioglu},
  title        = {Optimal workflow-aware authorizations},
  booktitle    = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  pages        = {93--102},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2295136.2295154},
  doi          = {10.1145/2295136.2295154},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/BasinBK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ReardonCB12,
  author       = {Joel Reardon and
                  Srdjan Capkun and
                  David A. Basin},
  editor       = {Tadayoshi Kohno},
  title        = {Data Node Encrypted File System: Efficient Secure Deletion for Flash
                  Memory},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {333--348},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/reardon},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ReardonCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-7283,
  author       = {David A. Basin and
                  Andreas F{\"{u}}rst and
                  Thai Son Hoang and
                  Kunihiko Miyazaki and
                  Naoto Sato},
  title        = {Abstract Data Types in Event-B - An Application of Generic Instantiation},
  journal      = {CoRR},
  volume       = {abs/1210.7283},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.7283},
  eprinttype    = {arXiv},
  eprint       = {1210.7283},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-7283.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1212-4775,
  author       = {Mario Frank and
                  Joachim M. Buhmann and
                  David A. Basin},
  title        = {Role Mining with Probabilistic Models},
  journal      = {CoRR},
  volume       = {abs/1212.4775},
  year         = {2012},
  url          = {http://arxiv.org/abs/1212.4775},
  eprinttype    = {arXiv},
  eprint       = {1212.4775},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1212-4775.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0028269,
  author       = {David A. Basin and
                  Patrick Schaller and
                  Michael Schl{\"{a}}pfer},
  title        = {Applied Information Security - a Hands-on Approach},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24474-2},
  doi          = {10.1007/978-3-642-24474-2},
  isbn         = {978-3-642-24473-5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0028269.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KopfB11,
  author       = {Boris K{\"{o}}pf and
                  David A. Basin},
  title        = {Automatically deriving information-theoretic bounds for adaptive side-channel
                  attacks},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {1--31},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2009-0397},
  doi          = {10.3233/JCS-2009-0397},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KopfB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BasinCRV11,
  author       = {David A. Basin and
                  Carlos Caleiro and
                  Jaime Ramos and
                  Luca Vigan{\`{o}}},
  title        = {Distributed temporal logic for the analysis of security protocol models},
  journal      = {Theor. Comput. Sci.},
  volume       = {412},
  number       = {31},
  pages        = {4007--4043},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.tcs.2011.04.006},
  doi          = {10.1016/J.TCS.2011.04.006},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BasinCRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BasinCSS11,
  author       = {David A. Basin and
                  Srdjan Capkun and
                  Patrick Schaller and
                  Benedikt Schmidt},
  title        = {Formal Reasoning about Physical Properties of Security Protocols},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {16:1--16:28},
  year         = {2011},
  url          = {https://doi.org/10.1145/2019599.2019601},
  doi          = {10.1145/2019599.2019601},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BasinCSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BasinBK11,
  author       = {David A. Basin and
                  Samuel J. Burri and
                  G{\"{u}}nter Karjoth},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Separation of duties as a service},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {423--429},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966972},
  doi          = {10.1145/1966913.1966972},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BasinBK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BasinBK11,
  author       = {David A. Basin and
                  Samuel J. Burri and
                  G{\"{u}}nter Karjoth},
  title        = {Obstruction-Free Authorization Enforcement: Aligning Security with
                  Business Objectives},
  booktitle    = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages        = {99--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSF.2011.14},
  doi          = {10.1109/CSF.2011.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BasinBK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/BasinCEDDOV10,
  author       = {David A. Basin and
                  Manuel Clavel and
                  Marina Egea and
                  Miguel Angel Garc{\'{\i}}a de Dios and
                  Carolina Dania and
                  Gonzalo Ortiz and
                  Javier Valdazo},
  editor       = {Alessandro Aldini and
                  Roberto Gorrieri},
  title        = {Model-Driven Development of Security-Aware GUIs for Data-Centric Applications},
  booktitle    = {Foundations of Security Analysis and Design {VI} - {FOSAD} Tutorial
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {6858},
  pages        = {101--124},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23082-0\_4},
  doi          = {10.1007/978-3-642-23082-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/BasinCEDDOV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/opodis/TsankovTB11,
  author       = {Petar Tsankov and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Antonio Fern{\'{a}}ndez Anta and
                  Giuseppe Lipari and
                  Matthieu Roy},
  title        = {Constructing Mid-Points for Two-Party Asynchronous Protocols},
  booktitle    = {Principles of Distributed Systems - 15th International Conference,
                  {OPODIS} 2011, Toulouse, France, December 13-16, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7109},
  pages        = {481--496},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25873-2\_33},
  doi          = {10.1007/978-3-642-25873-2\_33},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/opodis/TsankovTB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/ConchinhaBC11,
  author       = {Bruno Conchinha and
                  David A. Basin and
                  Carlos Caleiro},
  editor       = {Manfred Schmidt{-}Schau{\ss}},
  title        = {{FAST:} An Efficient Decision Procedure for Deduction and Static Equivalence},
  booktitle    = {Proceedings of the 22nd International Conference on Rewriting Techniques
                  and Applications, {RTA} 2011, May 30 - June 1, 2011, Novi Sad, Serbia},
  series       = {LIPIcs},
  volume       = {10},
  pages        = {11--20},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2011},
  url          = {https://doi.org/10.4230/LIPIcs.RTA.2011.11},
  doi          = {10.4230/LIPICS.RTA.2011.11},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/rta/ConchinhaBC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/BasinKZ11,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  editor       = {Sarfraz Khurshid and
                  Koushik Sen},
  title        = {Algorithms for Monitoring Real-Time Properties},
  booktitle    = {Runtime Verification - Second International Conference, {RV} 2011,
                  San Francisco, CA, USA, September 27-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7186},
  pages        = {260--275},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29860-8\_20},
  doi          = {10.1007/978-3-642-29860-8\_20},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/BasinKZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/BasinHKZ11,
  author       = {David A. Basin and
                  Mat{\'{u}}s Harvan and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  editor       = {Sarfraz Khurshid and
                  Koushik Sen},
  title        = {{MONPOLY:} Monitoring Usage-Control Policies},
  booktitle    = {Runtime Verification - Second International Conference, {RV} 2011,
                  San Francisco, CA, USA, September 27-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7186},
  pages        = {360--364},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29860-8\_27},
  doi          = {10.1007/978-3-642-29860-8\_27},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/BasinHKZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BasinCE11,
  author       = {David A. Basin and
                  Manuel Clavel and
                  Marina Egea},
  editor       = {Ruth Breu and
                  Jason Crampton and
                  Jorge Lobo},
  title        = {A decade of model-driven security},
  booktitle    = {16th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2011, Innsbruck, Austria, June 15-17, 2011, Proceedings},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998441.1998443},
  doi          = {10.1145/1998441.1998443},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/BasinCE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/time/BasinHKZ11,
  author       = {David A. Basin and
                  Mat{\'{u}}s Harvan and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  editor       = {Carlo Combi and
                  Martin Leucker and
                  Frank Wolter},
  title        = {Monitoring Usage-Control Policies in Distributed Systems},
  booktitle    = {Eighteenth International Symposium on Temporal Representation and
                  Reasoning, {TIME} 2011, L{\"{u}}beck , Germany, September 12-14,
                  2011},
  pages        = {88--95},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIME.2011.14},
  doi          = {10.1109/TIME.2011.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/time/BasinHKZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1106-0917,
  author       = {Joel Reardon and
                  Claudio Marforio and
                  Srdjan Capkun and
                  David A. Basin},
  title        = {Secure Deletion on Log-structured File Systems},
  journal      = {CoRR},
  volume       = {abs/1106.0917},
  year         = {2011},
  url          = {http://arxiv.org/abs/1106.0917},
  eprinttype    = {arXiv},
  eprint       = {1106.0917},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1106-0917.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ModersheimVB10,
  author       = {Sebastian M{\"{o}}dersheim and
                  Luca Vigan{\`{o}} and
                  David A. Basin},
  title        = {Constraint differentiation: Search-space reduction for the constraint-based
                  analysis of security protocols},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {575--618},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-0351},
  doi          = {10.3233/JCS-2009-0351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ModersheimVB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/WahlerBBK10,
  author       = {Michael Wahler and
                  David A. Basin and
                  Achim D. Brucker and
                  Jana Koehler},
  title        = {Efficient analysis of pattern-based constraint specifications},
  journal      = {Softw. Syst. Model.},
  volume       = {9},
  number       = {2},
  pages        = {225--255},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10270-009-0123-6},
  doi          = {10.1007/S10270-009-0123-6},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sosym/WahlerBBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PopperBCC10,
  author       = {Christina P{\"{o}}pper and
                  David A. Basin and
                  Srdjan Capkun and
                  Cas Cremers},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Keeping data secret under full compromise using porter devices},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {241--250},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920297},
  doi          = {10.1145/1920261.1920297},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PopperBCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/BasinKM10,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Samuel M{\"{u}}ller},
  editor       = {Tayssir Touili and
                  Byron Cook and
                  Paul B. Jackson},
  title        = {Policy Monitoring in First-Order Temporal Logic},
  booktitle    = {Computer Aided Verification, 22nd International Conference, {CAV}
                  2010, Edinburgh, UK, July 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6174},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14295-6\_1},
  doi          = {10.1007/978-3-642-14295-6\_1},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/BasinKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SprengerB10,
  author       = {Christoph Sprenger and
                  David A. Basin},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Developing security protocols by refinement},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {361--374},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866349},
  doi          = {10.1145/1866307.1866349},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SprengerB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MeierCB10,
  author       = {Simon Meier and
                  Cas Cremers and
                  David A. Basin},
  title        = {Strong Invariants for the Efficient Construction of Machine-Checked
                  Protocol Security Proofs},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {231--245},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.23},
  doi          = {10.1109/CSF.2010.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MeierCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SchmidtSB10,
  author       = {Benedikt Schmidt and
                  Patrick Schaller and
                  David A. Basin},
  title        = {Impossibility Results for Secret Establishment},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {261--273},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.25},
  doi          = {10.1109/CSF.2010.25},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/SchmidtSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/BasinC10,
  author       = {David A. Basin and
                  Cas Cremers},
  editor       = {Anuj Dawar and
                  Helmut Veith},
  title        = {Degrees of Security: Protocol Guarantees in the Face of Compromising
                  Adversaries},
  booktitle    = {Computer Science Logic, 24th International Workshop, {CSL} 2010, 19th
                  Annual Conference of the EACSL, Brno, Czech Republic, August 23-27,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6247},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15205-4\_1},
  doi          = {10.1007/978-3-642-15205-4\_1},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/BasinC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BasinC10,
  author       = {David A. Basin and
                  Cas Cremers},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Modeling and Analyzing Security in the Presence of Compromising Adversaries},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {340--356},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_21},
  doi          = {10.1007/978-3-642-15497-3\_21},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BasinC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/BasinCES10,
  author       = {David A. Basin and
                  Manuel Clavel and
                  Marina Egea and
                  Michael Schl{\"{a}}pfer},
  editor       = {Fabio Massacci and
                  Dan S. Wallach and
                  Nicola Zannone},
  title        = {Automatic Generation of Smart, Security-Aware {GUI} Models},
  booktitle    = {Engineering Secure Software and Systems, Second International Symposium,
                  ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5965},
  pages        = {201--217},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11747-3\_16},
  doi          = {10.1007/978-3-642-11747-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/BasinCES10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MatsuoMOB10,
  author       = {Shin'ichiro Matsuo and
                  Kunihiko Miyazaki and
                  Akira Otsuka and
                  David A. Basin},
  editor       = {Radu Sion and
                  Reza Curtmola and
                  Sven Dietrich and
                  Aggelos Kiayias and
                  Josep M. Miret and
                  Kazue Sako and
                  Francesc Seb{\'{e}}},
  title        = {How to Evaluate the Security of Real-Life Cryptographic Protocols?
                  - The Cases of {ISO/IEC} 29128 and {CRYPTREC}},
  booktitle    = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
                  WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {182--194},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14992-4\_16},
  doi          = {10.1007/978-3-642-14992-4\_16},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MatsuoMOB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/DiosDSBCE10,
  author       = {Miguel Angel Garc{\'{\i}}a de Dios and
                  Carolina Dania and
                  Michael Schl{\"{a}}pfer and
                  David A. Basin and
                  Manuel Clavel and
                  Marina Egea},
  editor       = {Jeff Kramer and
                  Judith Bishop and
                  Premkumar T. Devanbu and
                  Sebasti{\'{a}}n Uchitel},
  title        = {{SSG:} a model-based development environment for smart, security-aware
                  GUIs},
  booktitle    = {Proceedings of the 32nd {ACM/IEEE} International Conference on Software
                  Engineering - Volume 2, {ICSE} 2010, Cape Town, South Africa, 1-8
                  May 2010},
  pages        = {311--312},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1810295.1810366},
  doi          = {10.1145/1810295.1810366},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/DiosDSBCE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/ConchinhaBC10,
  author       = {Bruno Conchinha and
                  David A. Basin and
                  Carlos Caleiro},
  editor       = {Pierpaolo Degano and
                  Sandro Etalle and
                  Joshua D. Guttman},
  title        = {Efficient Decision Procedures for Message Deducibility and Static
                  Equivalence},
  booktitle    = {Formal Aspects of Security and Trust - 7th International Workshop,
                  {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6561},
  pages        = {34--49},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19751-2\_3},
  doi          = {10.1007/978-3-642-19751-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/ConchinhaBC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BasinKM10,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Samuel M{\"{u}}ller},
  editor       = {James B. D. Joshi and
                  Barbara Carminati},
  title        = {Monitoring security policies with metric first-order temporal logic},
  booktitle    = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  pages        = {23--34},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1809842.1809849},
  doi          = {10.1145/1809842.1809849},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/BasinKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/FrankBB10,
  author       = {Mario Frank and
                  Joachim M. Buhmann and
                  David A. Basin},
  editor       = {James B. D. Joshi and
                  Barbara Carminati},
  title        = {On the definition of role mining},
  booktitle    = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1809842.1809851},
  doi          = {10.1145/1809842.1809851},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/FrankBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010asia,
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  publisher    = {{ACM}},
  year         = {2010},
  isbn         = {978-1-60558-936-7},
  timestamp    = {Fri, 03 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2010asia.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/BasinCDE09,
  author       = {David A. Basin and
                  Manuel Clavel and
                  J{\"{u}}rgen Doser and
                  Marina Egea},
  title        = {Automated analysis of security-design models},
  journal      = {Inf. Softw. Technol.},
  volume       = {51},
  number       = {5},
  pages        = {815--831},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.infsof.2008.05.011},
  doi          = {10.1016/J.INFSOF.2008.05.011},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/BasinCDE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/logcom/BasinCRV09,
  author       = {David A. Basin and
                  Carlos Caleiro and
                  Jaime Ramos and
                  Luca Vigan{\`{o}}},
  title        = {Labelled Tableaux for Distributed Temporal Logic},
  journal      = {J. Log. Comput.},
  volume       = {19},
  number       = {6},
  pages        = {1245--1279},
  year         = {2009},
  url          = {https://doi.org/10.1093/logcom/exp022},
  doi          = {10.1093/LOGCOM/EXP022},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/logcom/BasinCRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/HoangKBA09,
  author       = {Thai Son Hoang and
                  Hironobu Kuruma and
                  David A. Basin and
                  Jean{-}Raymond Abrial},
  title        = {Developing topology discovery in Event-B},
  journal      = {Sci. Comput. Program.},
  volume       = {74},
  number       = {11-12},
  pages        = {879--899},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.scico.2009.07.006},
  doi          = {10.1016/J.SCICO.2009.07.006},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/HoangKBA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FrankSBB09,
  author       = {Mario Frank and
                  Andreas P. Streich and
                  David A. Basin and
                  Joachim M. Buhmann},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {A probabilistic approach to hybrid role mining},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {101--111},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653675},
  doi          = {10.1145/1653662.1653675},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FrankSBB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SchallerSBC09,
  author       = {Patrick Schaller and
                  Benedikt Schmidt and
                  David A. Basin and
                  Srdjan Capkun},
  title        = {Modeling and Verifying Physical Properties of Security Protocols for
                  Wireless Networks},
  booktitle    = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009},
  pages        = {109--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSF.2009.6},
  doi          = {10.1109/CSF.2009.6},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/SchallerSBC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BasinBK09,
  author       = {David A. Basin and
                  Samuel J. Burri and
                  G{\"{u}}nter Karjoth},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Dynamic Enforcement of Abstract Separation of Duty Constraints},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {250--267},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_16},
  doi          = {10.1007/978-3-642-04444-1\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BasinBK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/StreichFBB09,
  author       = {Andreas P. Streich and
                  Mario Frank and
                  David A. Basin and
                  Joachim M. Buhmann},
  editor       = {Andrea Pohoreckyj Danyluk and
                  L{\'{e}}on Bottou and
                  Michael L. Littman},
  title        = {Multi-assignment clustering for Boolean data},
  booktitle    = {Proceedings of the 26th Annual International Conference on Machine
                  Learning, {ICML} 2009, Montreal, Quebec, Canada, June 14-18, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {382},
  pages        = {969--976},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1553374.1553498},
  doi          = {10.1145/1553374.1553498},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/StreichFBB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifm/HoangKBA09,
  author       = {Thai Son Hoang and
                  Hironobu Kuruma and
                  David A. Basin and
                  Jean{-}Raymond Abrial},
  editor       = {Michael Leuschel and
                  Heike Wehrheim},
  title        = {Developing Topology Discovery in Event-B},
  booktitle    = {Integrated Formal Methods, 7th International Conference, {IFM} 2009,
                  D{\"{u}}sseldorf, Germany, February 16-19, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5423},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00255-7\_1},
  doi          = {10.1007/978-3-642-00255-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifm/HoangKBA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tphol/BasinCSS09,
  author       = {David A. Basin and
                  Srdjan Capkun and
                  Patrick Schaller and
                  Benedikt Schmidt},
  editor       = {Stefan Berghofer and
                  Tobias Nipkow and
                  Christian Urban and
                  Makarius Wenzel},
  title        = {Let's Get Physical: Models and Methods for Real-World Security Protocols},
  booktitle    = {Theorem Proving in Higher Order Logics, 22nd International Conference,
                  TPHOLs 2009, Munich, Germany, August 17-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5674},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03359-9\_1},
  doi          = {10.1007/978-3-642-03359-9\_1},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tphol/BasinCSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2009,
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  isbn         = {978-1-60558-460-7},
  timestamp    = {Fri, 20 Mar 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BasinC09,
  author       = {David A. Basin and
                  Cas Cremers},
  title        = {From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in
                  the Presence of Compromising Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/079},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BasinC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/NafB08,
  author       = {Michael N{\"{a}}f and
                  David A. Basin},
  title        = {Two approaches to an information security laboratory},
  journal      = {Commun. {ACM}},
  volume       = {51},
  number       = {12},
  pages        = {138--142},
  year         = {2008},
  url          = {https://doi.org/10.1145/1409360.1409386},
  doi          = {10.1145/1409360.1409386},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/NafB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/PapadimitratosP08,
  author       = {Panos Papadimitratos and
                  Marcin Poturalski and
                  Patrick Schaller and
                  Pascal Lafourcade and
                  David A. Basin and
                  Srdjan Capkun and
                  Jean{-}Pierre Hubaux},
  title        = {Secure neighborhood discovery: a fundamental element for mobile ad
                  hoc networking},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {46},
  number       = {2},
  pages        = {132--139},
  year         = {2008},
  url          = {https://doi.org/10.1109/MCOM.2008.4473095},
  doi          = {10.1109/MCOM.2008.4473095},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/PapadimitratosP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OppligerHB08,
  author       = {Rolf Oppliger and
                  Ralf Hauser and
                  David A. Basin},
  title        = {{SSL/TLS} session-aware user authentication revisited},
  journal      = {Comput. Secur.},
  volume       = {27},
  number       = {3-4},
  pages        = {64--70},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.cose.2008.04.005},
  doi          = {10.1016/J.COSE.2008.04.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OppligerHB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/OppligerHB08,
  author       = {Rolf Oppliger and
                  Ralf Hauser and
                  David A. Basin},
  title        = {{SSL/TLS} Session-Aware User Authentication},
  journal      = {Computer},
  volume       = {41},
  number       = {3},
  pages        = {59--65},
  year         = {2008},
  url          = {https://doi.org/10.1109/MC.2008.98},
  doi          = {10.1109/MC.2008.98},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/OppligerHB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PretschnerHBSW08,
  author       = {Alexander Pretschner and
                  Manuel Hilty and
                  David A. Basin and
                  Christian Schaefer and
                  Thomas Walter},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {Mechanisms for usage control},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {240--244},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368344},
  doi          = {10.1145/1368310.1368344},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PretschnerHBSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FrankBB08,
  author       = {Mario Frank and
                  David A. Basin and
                  Joachim M. Buhmann},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {A class of probabilistic models for role engineering},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {299--310},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455809},
  doi          = {10.1145/1455770.1455809},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FrankBB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SprengerB08,
  author       = {Christoph Sprenger and
                  David A. Basin},
  title        = {Cryptographically-Sound Protocol-Model Abstractions},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {115--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.19},
  doi          = {10.1109/CSF.2008.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/SprengerB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/BasinKMP08,
  author       = {David A. Basin and
                  Felix Klaedtke and
                  Samuel M{\"{u}}ller and
                  Birgit Pfitzmann},
  editor       = {Ramesh Hariharan and
                  Madhavan Mukund and
                  V. Vinay},
  title        = {Runtime Monitoring of Metric First-order Temporal Properties},
  booktitle    = {{IARCS} Annual Conference on Foundations of Software Technology and
                  Theoretical Computer Science, {FSTTCS} 2008, December 9-11, 2008,
                  Bangalore, India},
  series       = {LIPIcs},
  volume       = {2},
  pages        = {49--60},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2008},
  url          = {https://doi.org/10.4230/LIPIcs.FSTTCS.2008.1740},
  doi          = {10.4230/LIPICS.FSTTCS.2008.1740},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/fsttcs/BasinKMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/FischerBE08,
  author       = {Daniel Fischer and
                  David A. Basin and
                  Thomas Engel},
  title        = {Topology dynamics and routing for predictable mobile networks},
  booktitle    = {Proceedings of the 16th annual {IEEE} International Conference on
                  Network Protocols, 2008. {ICNP} 2008, Orlando, Florida, USA, 19-22
                  October 2008},
  pages        = {207--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICNP.2008.4697039},
  doi          = {10.1109/ICNP.2008.4697039},
  timestamp    = {Sun, 26 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/FischerBE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/time/BasinCRV08,
  author       = {David A. Basin and
                  Carlos Caleiro and
                  Jaime Ramos and
                  Luca Vigan{\`{o}}},
  editor       = {St{\'{e}}phane Demri and
                  Christian S. Jensen},
  title        = {A Labeled Tableaux Systemfor the Distributed Temporal Logic {DTL}},
  booktitle    = {15th International Symposium on Temporal Representation and Reasoning,
                  {TIME} 2008, Universit{\'{e}} du Qu{\'{e}}bec {\`{a}} Montr{\'{e}}al,
                  Canada, 16-18 June 2008},
  pages        = {101--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIME.2008.21},
  doi          = {10.1109/TIME.2008.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/time/BasinCRV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/BasinKMTW07,
  author       = {David A. Basin and
                  Hironobu Kuruma and
                  Kunihiko Miyazaki and
                  Kazuo Takaragi and
                  Burkhart Wolff},
  title        = {Verifying a signature architecture: a comparative case study},
  journal      = {Formal Aspects Comput.},
  volume       = {19},
  number       = {1},
  pages        = {63--91},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00165-006-0012-5},
  doi          = {10.1007/S00165-006-0012-5},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/BasinKMTW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BackesBW07,
  author       = {Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Preface},
  journal      = {J. Comput. Secur.},
  volume       = {15},
  number       = {6},
  pages        = {561},
  year         = {2007},
  url          = {https://doi.org/10.3233/jcs-2007-15601},
  doi          = {10.3233/JCS-2007-15601},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BackesBW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BidderBC07,
  author       = {Diana von Bidder and
                  David A. Basin and
                  Germano Caronni},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Midpoints Versus Endpoints: From Protocols to Firewalls},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {46--64},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_4},
  doi          = {10.1007/978-3-540-72738-5\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BidderBC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SchallerCB07,
  author       = {Patrick Schaller and
                  Srdjan Capkun and
                  David A. Basin},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {{BAP:} Broadcast Authentication Using Cryptographic Puzzles},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {401--419},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_26},
  doi          = {10.1007/978-3-540-72738-5\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SchallerCB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BasinOS07,
  author       = {David A. Basin and
                  Ernst{-}R{\"{u}}diger Olderog and
                  Paul E. Sevin{\c{c}}},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Specifying and analyzing security automata using {CSP-OZ}},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {70--81},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229299},
  doi          = {10.1145/1229285.1229299},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BasinOS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KopfB07,
  author       = {Boris K{\"{o}}pf and
                  David A. Basin},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {An information-theoretic model for adaptive side-channel attacks},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {286--296},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315282},
  doi          = {10.1145/1315245.1315282},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KopfB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HiltyPBSW07,
  author       = {Manuel Hilty and
                  Alexander Pretschner and
                  David A. Basin and
                  Christian Schaefer and
                  Thomas Walter},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {A Policy Language for Distributed Usage Control},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {531--546},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_35},
  doi          = {10.1007/978-3-540-74835-9\_35},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HiltyPBSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/HiltyPBSW07,
  author       = {Manuel Hilty and
                  Alexander Pretschner and
                  David A. Basin and
                  Christian Schaefer and
                  Thomas Walter},
  editor       = {Sandro Etalle and
                  Stephen Marsh},
  title        = {Monitors for Usage Control},
  booktitle    = {Trust Management - Proceedings of {IFIPTM} 2007: Joint iTrust and
                  {PST} Conferences on Privacy, Trust Management and Security, July
                  30- August 2, 2007, Moncton, New Brunswick, Canada},
  series       = {{IFIP}},
  volume       = {238},
  pages        = {411--414},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-73655-6\_29},
  doi          = {10.1007/978-0-387-73655-6\_29},
  timestamp    = {Tue, 29 Dec 2020 11:03:37 +0100},
  biburl       = {https://dblp.org/rec/conf/ifiptm/HiltyPBSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kivs/OppligerHBRK07,
  author       = {Rolf Oppliger and
                  Ralf Hauser and
                  David A. Basin and
                  Aldo Rodenhaeuser and
                  Bruno Kaiser},
  editor       = {Torsten Braun and
                  Georg Carle and
                  Burkhard Stiller},
  title        = {A Proof of Concept Implementation of {SSL/TLS} Session-Aware User
                  Authentication {(TLS-SA)}},
  booktitle    = {Kommunikation in Verteilten Systemen (KiVS), 15. Fachtagung Kommunikation
                  in Verteilten Systemen, KiVS 2007, Bern, Schweiz, 26. Februar - 2.
                  M{\"{a}}rz 2007},
  series       = {Informatik Aktuell},
  pages        = {225--236},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-69962-0\_19},
  doi          = {10.1007/978-3-540-69962-0\_19},
  timestamp    = {Tue, 23 May 2017 01:06:28 +0200},
  biburl       = {https://dblp.org/rec/conf/kivs/OppligerHBRK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/BasinCDE07,
  author       = {David A. Basin and
                  Manuel Clavel and
                  J{\"{u}}rgen Doser and
                  Marina Egea},
  editor       = {Gregor Engels and
                  Bill Opdyke and
                  Douglas C. Schmidt and
                  Frank Weil},
  title        = {A Metamodel-Based Approach for Analyzing Security-Design Models},
  booktitle    = {Model Driven Engineering Languages and Systems, 10th International
                  Conference, MoDELS 2007, Nashville, USA, September 30 - October 5,
                  2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4735},
  pages        = {420--435},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75209-7\_29},
  doi          = {10.1007/978-3-540-75209-7\_29},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/models/BasinCDE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tphol/SprengerB07,
  author       = {Christoph Sprenger and
                  David A. Basin},
  editor       = {Klaus Schneider and
                  Jens Brandt},
  title        = {A Monad-Based Modeling and Verification Toolbox with Application to
                  Security Protocols},
  booktitle    = {Theorem Proving in Higher Order Logics, 20th International Conference,
                  TPHOLs 2007, Kaiserslautern, Germany, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4732},
  pages        = {302--318},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74591-4\_23},
  doi          = {10.1007/978-3-540-74591-4\_23},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/tphol/SprengerB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SevincSB07,
  author       = {Paul E. Sevin{\c{c}} and
                  Mario Strasser and
                  David A. Basin},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Securing the Distribution and Storage of Secrets with Trusted Platform
                  Modules},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {53--66},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_5},
  doi          = {10.1007/978-3-540-72354-7\_5},
  timestamp    = {Sun, 02 Oct 2022 16:17:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SevincSB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/PretschnerHB06,
  author       = {Alexander Pretschner and
                  Manuel Hilty and
                  David A. Basin},
  title        = {Distributed usage control},
  journal      = {Commun. {ACM}},
  volume       = {49},
  number       = {9},
  pages        = {39--44},
  year         = {2006},
  url          = {https://doi.org/10.1145/1151030.1151053},
  doi          = {10.1145/1151030.1151053},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/PretschnerHB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/OppligerHB06,
  author       = {Rolf Oppliger and
                  Ralf Hauser and
                  David A. Basin},
  title        = {{SSL/TLS} session-aware user authentication - Or how to effectively
                  thwart the man-in-the-middle},
  journal      = {Comput. Commun.},
  volume       = {29},
  number       = {12},
  pages        = {2238--2246},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comcom.2006.03.004},
  doi          = {10.1016/J.COMCOM.2006.03.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/OppligerHB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/ArmandoBCRV06,
  author       = {Alessandro Armando and
                  David A. Basin and
                  Jorge Cu{\'{e}}llar and
                  Micha{\"{e}}l Rusinowitch and
                  Luca Vigan{\`{o}}},
  title        = {Automated Reasoning for Security Protocol Analysis},
  journal      = {J. Autom. Reason.},
  volume       = {36},
  number       = {1-2},
  pages        = {1--3},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10817-005-9014-x},
  doi          = {10.1007/S10817-005-9014-X},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/ArmandoBCRV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/CaleiroVB06,
  author       = {Carlos Caleiro and
                  Luca Vigan{\`{o}} and
                  David A. Basin},
  title        = {On the semantics of Alice{\&}Bob specifications of security protocols},
  journal      = {Theor. Comput. Sci.},
  volume       = {367},
  number       = {1-2},
  pages        = {88--122},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.tcs.2006.08.041},
  doi          = {10.1016/J.TCS.2006.08.041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/CaleiroVB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/BasinDL06,
  author       = {David A. Basin and
                  J{\"{u}}rgen Doser and
                  Torsten Lodderstedt},
  title        = {Model driven security: From {UML} models to access control infrastructures},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {15},
  number       = {1},
  pages        = {39--91},
  year         = {2006},
  url          = {https://doi.org/10.1145/1125808.1125810},
  doi          = {10.1145/1125808.1125810},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/BasinDL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Basin06,
  author       = {David A. Basin},
  title        = {Model Driven Security},
  booktitle    = {Proceedings of the The First International Conference on Availability,
                  Reliability and Security, {ARES} 2006, The International Dependability
                  Conference - Bridging Theory and Practice, April 20-22 2006, Vienna
                  University of Technology, Austria},
  pages        = {4},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ARES.2006.82},
  doi          = {10.1109/ARES.2006.82},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Basin06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SprengerBBPW06,
  author       = {Christoph Sprenger and
                  Michael Backes and
                  David A. Basin and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {Cryptographically Sound Theorem Proving},
  booktitle    = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
                  5-7 July 2006, Venice, Italy},
  pages        = {153--166},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CSFW.2006.10},
  doi          = {10.1109/CSFW.2006.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/SprengerBBPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KopfB06,
  author       = {Boris K{\"{o}}pf and
                  David A. Basin},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {Timing-Sensitive Information Flow Analysis for Synchronous Systems},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {243--262},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_16},
  doi          = {10.1007/11863908\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KopfB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etrics/SevincBO06,
  author       = {Paul E. Sevin{\c{c}} and
                  David A. Basin and
                  Ernst{-}R{\"{u}}diger Olderog},
  editor       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {Controlling Access to Documents: {A} Formal Access Control Model},
  booktitle    = {Emerging Trends in Information and Communication Security, International
                  Conference, {ETRICS} 2006, Freiburg, Germany, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3995},
  pages        = {352--367},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11766155\_25},
  doi          = {10.1007/11766155\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/etrics/SevincBO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/DrielsmaMVB06,
  author       = {Paul Hankes Drielsma and
                  Sebastian M{\"{o}}dersheim and
                  Luca Vigan{\`{o}} and
                  David A. Basin},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Formalizing and Analyzing Sender Invariance},
  booktitle    = {Formal Aspects in Security and Trust, Fourth International Workshop,
                  {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4691},
  pages        = {80--95},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-75227-1\_6},
  doi          = {10.1007/978-3-540-75227-1\_6},
  timestamp    = {Sun, 02 Oct 2022 16:07:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/DrielsmaMVB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SprengerBBPW06,
  author       = {Christoph Sprenger and
                  Michael Backes and
                  David A. Basin and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {Cryptographically Sound Theorem Proving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SprengerBBPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0013358,
  author       = {Alan Bundy and
                  David A. Basin and
                  Dieter Hutter and
                  Andrew Ireland},
  title        = {Rippling - meta-level guidance for mathematical reasoning},
  series       = {Cambridge tracts in theoretical computer science},
  volume       = {56},
  publisher    = {Cambridge University Press},
  year         = {2005},
  isbn         = {978-0-521-83449-0},
  timestamp    = {Fri, 12 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0013358.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/igpl/CaleiroVB05,
  author       = {Carlos Caleiro and
                  Luca Vigan{\`{o}} and
                  David A. Basin},
  title        = {Relating Strand Spaces and Distributed Temporal Logic for Security
                  Protocol Analysis},
  journal      = {Log. J. {IGPL}},
  volume       = {13},
  number       = {6},
  pages        = {637--663},
  year         = {2005},
  url          = {https://doi.org/10.1093/jigpal/jzi048},
  doi          = {10.1093/JIGPAL/JZI048},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/igpl/CaleiroVB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BasinMV05,
  author       = {David A. Basin and
                  Sebastian M{\"{o}}dersheim and
                  Luca Vigan{\`{o}}},
  title        = {{OFMC:} {A} symbolic model checker for security protocols},
  journal      = {Int. J. Inf. Sec.},
  volume       = {4},
  number       = {3},
  pages        = {181--208},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10207-004-0055-7},
  doi          = {10.1007/S10207-004-0055-7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BasinMV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/insk/NafB05,
  author       = {Michael N{\"{a}}f and
                  David A. Basin},
  title        = {Konflikt oder Review zwei Ans{\"{a}}tze f{\"{u}}r Labors
                  in angewandter Informationssicherheit},
  journal      = {Inform. Spektrum},
  volume       = {28},
  number       = {5},
  pages        = {407--412},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00287-005-0020-5},
  doi          = {10.1007/S00287-005-0020-5},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/insk/NafB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ArmandoBBCCCDHKMMORSTVV05,
  author       = {Alessandro Armando and
                  David A. Basin and
                  Yohan Boichut and
                  Yannick Chevalier and
                  Luca Compagna and
                  Jorge Cu{\'{e}}llar and
                  Paul Hankes Drielsma and
                  Pierre{-}Cyrille H{\'{e}}am and
                  Olga Kouchnarenko and
                  Jacopo Mantovani and
                  Sebastian M{\"{o}}dersheim and
                  David von Oheimb and
                  Micha{\"{e}}l Rusinowitch and
                  Judson Santiago and
                  Mathieu Turuani and
                  Luca Vigan{\`{o}} and
                  Laurent Vigneron},
  editor       = {Kousha Etessami and
                  Sriram K. Rajamani},
  title        = {The {AVISPA} Tool for the Automated Validation of Internet Security
                  Protocols and Applications},
  booktitle    = {Computer Aided Verification, 17th International Conference, {CAV}
                  2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3576},
  pages        = {281--285},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11513988\_27},
  doi          = {10.1007/11513988\_27},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ArmandoBBCCCDHKMMORSTVV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HiltyBP05,
  author       = {Manuel Hilty and
                  David A. Basin and
                  Alexander Pretschner},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {On Obligations},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {98--117},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_7},
  doi          = {10.1007/11555827\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HiltyBP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/BasinKTW05,
  author       = {David A. Basin and
                  Hironobu Kuruma and
                  Kazuo Takaragi and
                  Burkhart Wolff},
  editor       = {John S. Fitzgerald and
                  Ian J. Hayes and
                  Andrzej Tarlecki},
  title        = {Verification of a Signature Architecture with {HOL-Z}},
  booktitle    = {{FM} 2005: Formal Methods, International Symposium of Formal Methods
                  Europe, Newcastle, UK, July 18-22, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3582},
  pages        = {269--285},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11526841\_19},
  doi          = {10.1007/11526841\_19},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/BasinKTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lpar/BasinMV05,
  author       = {David A. Basin and
                  Sebastian M{\"{o}}dersheim and
                  Luca Vigan{\`{o}}},
  editor       = {Geoff Sutcliffe and
                  Andrei Voronkov},
  title        = {Algebraic Intruder Deductions},
  booktitle    = {Logic for Programming, Artificial Intelligence, and Reasoning, 12th
                  International Conference, {LPAR} 2005, Montego Bay, Jamaica, December
                  2-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3835},
  pages        = {549--564},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11591191\_38},
  doi          = {10.1007/11591191\_38},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/lpar/BasinMV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pts/SennBC05,
  author       = {Diana Senn and
                  David A. Basin and
                  Germano Caronni},
  editor       = {Ferhat Khendek and
                  Rachida Dssouli},
  title        = {Firewall Conformance Testing},
  booktitle    = {Testing of Communicating Systems, 17th {IFIP} {TC6/WG} 6.1 International
                  Conference, TestCom 2005, Montreal, Canada, May 31 - June 2, 2005,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3502},
  pages        = {226--241},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11430230\_16},
  doi          = {10.1007/11430230\_16},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/pts/SennBC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CaleiroVB05a,
  author       = {Carlos Caleiro and
                  Luca Vigan{\`{o}} and
                  David A. Basin},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Deconstructing Alice and Bob},
  booktitle    = {Proceedings of the Second Workshop on Automated Reasoning for Security
                  Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {135},
  number       = {1},
  pages        = {3--22},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.06.007},
  doi          = {10.1016/J.ENTCS.2005.06.007},
  timestamp    = {Thu, 15 Dec 2022 13:58:28 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/CaleiroVB05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lisp/BasinDH04,
  author       = {David A. Basin and
                  Olivier Danvy and
                  Robert Harper},
  title        = {Editorial},
  journal      = {High. Order Symb. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {171},
  year         = {2004},
  url          = {https://doi.org/10.1023/B:LISP.0000029480.20108.7d},
  doi          = {10.1023/B:LISP.0000029480.20108.7D},
  timestamp    = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lisp/BasinDH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/BasinCM04,
  author       = {David A. Basin and
                  Manuel Clavel and
                  Jos{\'{e}} Meseguer},
  title        = {Reflective metalogical frameworks},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {5},
  number       = {3},
  pages        = {528--576},
  year         = {2004},
  url          = {https://doi.org/10.1145/1013560.1013566},
  doi          = {10.1145/1013560.1013566},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tocl/BasinCM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CaleiroVB05,
  author       = {Carlos Caleiro and
                  Luca Vigan{\`{o}} and
                  David A. Basin},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Metareasoning about Security Protocols using Distributed Temporal
                  Logic},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {67--89},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.020},
  doi          = {10.1016/J.ENTCS.2004.05.020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/CaleiroVB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/lopstr/BasinDFHN04,
  author       = {David A. Basin and
                  Yves Deville and
                  Pierre Flener and
                  Andreas Hamfelt and
                  J{\o}rgen Fischer Nilsson},
  editor       = {Maurice Bruynooghe and
                  Kung{-}Kiu Lau},
  title        = {Synthesis of Programs in Computational Logic},
  booktitle    = {Program Development in Computational Logic: {A} Decade of Research
                  Advances in Logic-Based Program Development},
  series       = {Lecture Notes in Computer Science},
  volume       = {3049},
  pages        = {30--65},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25951-0\_2},
  doi          = {10.1007/978-3-540-25951-0\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lopstr/BasinDFHN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cade/2004,
  editor       = {David A. Basin and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Automated Reasoning - Second International Joint Conference, {IJCAR}
                  2004, Cork, Ireland, July 4-8, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3097},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b98691},
  doi          = {10.1007/B98691},
  isbn         = {3-540-22345-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2004,
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {http://dl.acm.org/citation.cfm?id=1030083},
  isbn         = {1-58113-971-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/BasinFG03,
  author       = {David A. Basin and
                  Stefan Friedrich and
                  Marek Gawkowski},
  title        = {Bytecode Verification by Model Checking},
  journal      = {J. Autom. Reason.},
  volume       = {30},
  number       = {3-4},
  pages        = {399--444},
  year         = {2003},
  url          = {https://doi.org/10.1023/A:1025059508087},
  doi          = {10.1023/A:1025059508087},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jar/BasinFG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AyariBK03,
  author       = {Abdelwaheb Ayari and
                  David A. Basin and
                  Felix Klaedtke},
  title        = {Decision procedures for inductive Boolean functions based on alternating
                  automata},
  journal      = {Theor. Comput. Sci.},
  volume       = {300},
  number       = {1-3},
  pages        = {301--329},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0304-3975(02)00089-0},
  doi          = {10.1016/S0304-3975(02)00089-0},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/AyariBK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BasinMV03,
  author       = {David A. Basin and
                  Sebastian M{\"{o}}dersheim and
                  Luca Vigan{\`{o}}},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {CDiff: a new reduction technique for constraint-based analysis of
                  security protocols},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {335--344},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948154},
  doi          = {10.1145/948109.948154},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BasinMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BasinMV03,
  author       = {David A. Basin and
                  Sebastian M{\"{o}}dersheim and
                  Luca Vigan{\`{o}}},
  editor       = {Einar Snekkenes and
                  Dieter Gollmann},
  title        = {An On-the-Fly Model-Checker for Security Protocol Analysis},
  booktitle    = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research
                  in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2808},
  pages        = {253--270},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39650-5\_15},
  doi          = {10.1007/978-3-540-39650-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BasinMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BasinDL03,
  author       = {David A. Basin and
                  J{\"{u}}rgen Doser and
                  Torsten Lodderstedt},
  editor       = {Elena Ferrari and
                  David F. Ferraiolo},
  title        = {Model driven security for process-oriented systems},
  booktitle    = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings},
  pages        = {100--109},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/775412.775425},
  doi          = {10.1145/775412.775425},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/BasinDL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/BasinMT03,
  author       = {David A. Basin and
                  Kunihiko Miyazaki and
                  Kazuo Takaragi},
  editor       = {Sushil Jajodia and
                  Leon Strous},
  title        = {A Formal Analysis of a Digital Signature Architecture},
  booktitle    = {Integrity and Internal Control in Information Systems {VI} - {IFIP}
                  {TC11/WG11.5} Sixth Working Conference on Integrity and Internal Control
                  in Information Systems {(IICIS)} 13-14 November 2003, Lausanne, Switzerland},
  series       = {{IFIP}},
  volume       = {140},
  pages        = {31--47},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/1-4020-7901-X\_3},
  doi          = {10.1007/1-4020-7901-X\_3},
  timestamp    = {Tue, 23 May 2017 01:07:20 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/BasinMT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2003fmse,
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  publisher    = {{ACM}},
  year         = {2003},
  isbn         = {1-58113-781-8},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2003fmse.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tphol/2003,
  editor       = {David A. Basin and
                  Burkhart Wolff},
  title        = {Theorem Proving in Higher Order Logics, 16th International Conference,
                  TPHOLs 2003, Rom, Italy, September 8-12, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2758},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b11935},
  doi          = {10.1007/B11935},
  isbn         = {3-540-40664-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tphol/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ArmandoBBCCMRTVV02,
  author       = {Alessandro Armando and
                  David A. Basin and
                  Mehdi Bouallagui and
                  Yannick Chevalier and
                  Luca Compagna and
                  Sebastian M{\"{o}}dersheim and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani and
                  Luca Vigan{\`{o}} and
                  Laurent Vigneron},
  editor       = {Ed Brinksma and
                  Kim Guldstrand Larsen},
  title        = {The {AVISS} Security Protocol Analysis Tool},
  booktitle    = {Computer Aided Verification, 14th International Conference, {CAV}
                  2002,Copenhagen, Denmark, July 27-31, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2404},
  pages        = {349--353},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45657-0\_27},
  doi          = {10.1007/3-540-45657-0\_27},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ArmandoBBCCMRTVV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/Basin02,
  author       = {David A. Basin},
  editor       = {Lars{-}Henrik Eriksson and
                  Peter A. Lindsay},
  title        = {The Next 700 Synthesis Calculi},
  booktitle    = {{FME} 2002: Formal Methods - Getting {IT} Right, International Symposium
                  of Formal Methods Europe, Copenhagen, Denmark, July 22-24, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2391},
  pages        = {430},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45614-7\_24},
  doi          = {10.1007/3-540-45614-7\_24},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/Basin02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmcad/AyariB02,
  author       = {Abdelwaheb Ayari and
                  David A. Basin},
  editor       = {Mark D. Aagaard and
                  John W. O'Leary},
  title        = {{QUBOS:} Deciding Quantified Boolean Logic Using Propositional Satisfiability
                  Solvers},
  booktitle    = {Formal Methods in Computer-Aided Design, 4th International Conference,
                  {FMCAD} 2002, Portland, OR, USA, November 6-8, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2517},
  pages        = {187--201},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36126-X\_12},
  doi          = {10.1007/3-540-36126-X\_12},
  timestamp    = {Fri, 10 Jan 2020 14:50:18 +0100},
  biburl       = {https://dblp.org/rec/conf/fmcad/AyariB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spin/BasinFGP02,
  author       = {David A. Basin and
                  Stefan Friedrich and
                  Marek Gawkowski and
                  Joachim Posegga},
  editor       = {Dragan Bosnacki and
                  Stefan Leue},
  title        = {Bytecode Model Checking: An Experimental Analysis},
  booktitle    = {Model Checking of Software, 9th International {SPIN} Workshop, Grenoble,
                  France, April 11-13, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2318},
  pages        = {42--59},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46017-9\_6},
  doi          = {10.1007/3-540-46017-9\_6},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spin/BasinFGP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tphol/BasinFG02,
  author       = {David A. Basin and
                  Stefan Friedrich and
                  Marek Gawkowski},
  editor       = {Victor Carre{\~{n}}o and
                  C{\'{e}}sar A. Mu{\~{n}}oz and
                  Sofi{\`{e}}ne Tahar},
  title        = {Verified Bytecode Model Checkers},
  booktitle    = {Theorem Proving in Higher Order Logics, 15th International Conference,
                  TPHOLs 2002, Hampton, VA, USA, August 20-23, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2410},
  pages        = {47--66},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45685-6\_5},
  doi          = {10.1007/3-540-45685-6\_5},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tphol/BasinFG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uml/LodderstedtBD02,
  author       = {Torsten Lodderstedt and
                  David A. Basin and
                  J{\"{u}}rgen Doser},
  editor       = {Jean{-}Marc J{\'{e}}z{\'{e}}quel and
                  Heinrich Hu{\ss}mann and
                  Stephen Cook},
  title        = {SecureUML: {A} UML-Based Modeling Language for Model-Driven Security},
  booktitle    = {{UML} 2002 - The Unified Modeling Language, 5th International Conference,
                  Dresden, Germany, September 30 - October 4, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2460},
  pages        = {426--441},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45800-X\_33},
  doi          = {10.1007/3-540-45800-X\_33},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uml/LodderstedtBD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/zum/BasinRV02,
  author       = {David A. Basin and
                  Frank Rittinger and
                  Luca Vigan{\`{o}}},
  editor       = {Didier Bert and
                  Jonathan P. Bowen and
                  Martin C. Henson and
                  Ken Robinson},
  title        = {A Formal Analysis of the {CORBA} Security Service},
  booktitle    = {{ZB} 2002: Formal Specification and Development in {Z} and B, 2nd
                  International Conference of {B} and {Z} Users, Grenoble, France, January
                  23-25, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2272},
  pages        = {330--349},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45648-1\_17},
  doi          = {10.1007/3-540-45648-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/zum/BasinRV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/BasinG01,
  author       = {David A. Basin and
                  Harald Ganzinger},
  title        = {Automated complexity analysis based on ordered resolution},
  journal      = {J. {ACM}},
  volume       = {48},
  number       = {1},
  pages        = {70--109},
  year         = {2001},
  url          = {https://doi.org/10.1145/363647.363681},
  doi          = {10.1145/363647.363681},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/BasinG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/BasinF01,
  author       = {David A. Basin and
                  Amy P. Felty},
  title        = {Current Trends in Logical Frameworks and Metalanguages},
  journal      = {J. Autom. Reason.},
  volume       = {27},
  number       = {1},
  pages        = {1--2},
  year         = {2001},
  url          = {https://doi.org/10.1023/A:1010624702918},
  doi          = {10.1023/A:1010624702918},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/BasinF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/AyariB01,
  author       = {Abdelwaheb Ayari and
                  David A. Basin},
  title        = {A Higher-order Interpretation of Deductive Tableau},
  journal      = {J. Symb. Comput.},
  volume       = {31},
  number       = {5},
  pages        = {487--520},
  year         = {2001},
  url          = {https://doi.org/10.1006/jsco.2001.0444},
  doi          = {10.1006/JSCO.2001.0444},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/AyariB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/FrankB01,
  author       = {Ian Frank and
                  David A. Basin},
  title        = {A theoretical and empirical investigation of search in imperfect information
                  games},
  journal      = {Theor. Comput. Sci.},
  volume       = {252},
  number       = {1-2},
  pages        = {217--256},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0304-3975(00)00083-9},
  doi          = {10.1016/S0304-3975(00)00083-9},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/FrankB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/BasinRV01,
  author       = {David A. Basin and
                  Frank Rittinger and
                  Luca Vigan{\`{o}}},
  editor       = {A Min Tjoa and
                  Volker Gruhn},
  title        = {A formal data-model of the {CORBA} security service},
  booktitle    = {Proceedings of the 8th European Software Engineering Conference held
                  jointly with 9th {ACM} {SIGSOFT} International Symposium on Foundations
                  of Software Engineering 2001, Vienna, Austria, September 10-14, 2001},
  pages        = {303--304},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/503209.503253},
  doi          = {10.1145/503209.503253},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/BasinRV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/AccorsiBV01,
  author       = {Rafael Accorsi and
                  David A. Basin and
                  Luca Vigan{\`{o}}},
  editor       = {Jean Goubault{-}Larrecq},
  title        = {Towards an awareness-based semantics for security protocol analysis},
  booktitle    = {Logical Aspects of Cryptographic Protocol Verification, {LACPV} 2001,
                  in connection with {CAV} 2001, Paris, France, July 23, 2001},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {55},
  number       = {1},
  pages        = {5--24},
  publisher    = {Elsevier},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1571-0661(04)00242-7},
  doi          = {10.1016/S1571-0661(04)00242-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/AccorsiBV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/BasinM00,
  author       = {David A. Basin and
                  Se{\'{a}}n Matthews},
  title        = {Structuring Metatheory on Inductive Definitions},
  journal      = {Inf. Comput.},
  volume       = {162},
  number       = {1-2},
  pages        = {80--95},
  year         = {2000},
  url          = {https://doi.org/10.1006/inco.2000.2858},
  doi          = {10.1006/INCO.2000.2858},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/BasinM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/AndersonB00,
  author       = {Penny Anderson and
                  David A. Basin},
  title        = {Program Development Schemata as Derived Rules},
  journal      = {J. Symb. Comput.},
  volume       = {30},
  number       = {1},
  pages        = {5--36},
  year         = {2000},
  url          = {https://doi.org/10.1006/jsco.1999.0346},
  doi          = {10.1006/JSCO.1999.0346},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/AndersonB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/FrankBB00,
  author       = {Ian Frank and
                  David A. Basin and
                  Alan Bundy},
  editor       = {Henry A. Kautz and
                  Bruce W. Porter},
  title        = {Combining Knowledge and Search to Solve Single-Suit Bridge},
  booktitle    = {Proceedings of the Seventeenth National Conference on Artificial Intelligence
                  and Twelfth Conference on on Innovative Applications of Artificial
                  Intelligence, July 30 - August 3, 2000, Austin, Texas, {USA}},
  pages        = {195--200},
  publisher    = {{AAAI} Press / The {MIT} Press},
  year         = {2000},
  url          = {http://www.aaai.org/Library/AAAI/2000/aaai00-030.php},
  timestamp    = {Tue, 05 Sep 2023 09:10:47 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/FrankBB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/AyariB00,
  author       = {Abdelwaheb Ayari and
                  David A. Basin},
  editor       = {E. Allen Emerson and
                  A. Prasad Sistla},
  title        = {Bounded Model Construction for Monadic Second-Order Logics},
  booktitle    = {Computer Aided Verification, 12th International Conference, {CAV}
                  2000, Chicago, IL, USA, July 15-19, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1855},
  pages        = {99--112},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722167\_11},
  doi          = {10.1007/10722167\_11},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/AyariB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/AyariBK00,
  author       = {Abdelwaheb Ayari and
                  David A. Basin and
                  Felix Klaedtke},
  editor       = {E. Allen Emerson and
                  A. Prasad Sistla},
  title        = {Decision Procedures for Inductive Boolean Functions Based on Alternating
                  Automata},
  booktitle    = {Computer Aided Verification, 12th International Conference, {CAV}
                  2000, Chicago, IL, USA, July 15-19, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1855},
  pages        = {170--185},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722167\_16},
  doi          = {10.1007/10722167\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/AyariBK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmcad/BasinFM00,
  author       = {David A. Basin and
                  Stefan Friedrich and
                  Sebastian M{\"{o}}dersheim},
  editor       = {Warren A. Hunt Jr. and
                  Steven D. Johnson},
  title        = {{B2M:} {A} Semantic Based Tool for {BLIF} Hardware Descriptions},
  booktitle    = {Formal Methods in Computer-Aided Design, Third International Conference,
                  {FMCAD} 2000, Austin, Texas, USA, November 1-3, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1954},
  pages        = {91--107},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-40922-X\_7},
  doi          = {10.1007/3-540-40922-X\_7},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fmcad/BasinFM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/BasinCM00,
  author       = {David A. Basin and
                  Manuel Clavel and
                  Jos{\'{e}} Meseguer},
  editor       = {Sanjiv Kapoor and
                  Sanjiva Prasad},
  title        = {Rewriting Logic as a Metalogical Framework},
  booktitle    = {Foundations of Software Technology and Theoretical Computer Science,
                  20th Conference, {FST} {TCS} 2000 New Delhi, India, December 13-15,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1974},
  pages        = {55--80},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44450-5\_4},
  doi          = {10.1007/3-540-44450-5\_4},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/BasinCM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BasinD00,
  author       = {David A. Basin and
                  Grit Denker},
  editor       = {Kokichi Futatsugi},
  title        = {Maude versus Haskell: an Experimental Comparison in Security Protocol
                  Analysis},
  booktitle    = {The 3rd International Workshop on Rewriting Logic and its Applications,
                  {WRLA} 2000, Kanzawa, Japan, September 18-20, 2000},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {36},
  pages        = {235--256},
  publisher    = {Elsevier},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1571-0661(05)80141-0},
  doi          = {10.1016/S1571-0661(05)80141-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/BasinD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/BasinF99,
  author       = {David A. Basin and
                  Stefan Friedrich},
  title        = {Modeling a Hardware Synthesis Methodology in Isabelle},
  journal      = {Formal Methods Syst. Des.},
  volume       = {15},
  number       = {2},
  pages        = {99--122},
  year         = {1999},
  url          = {https://doi.org/10.1023/A:1008758500273},
  doi          = {10.1023/A:1008758500273},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fmsd/BasinF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/BasinFPV99,
  author       = {David A. Basin and
                  Stefan Friedrich and
                  Joachim Posegga and
                  Harald Vogt},
  editor       = {Nicolas Halbwachs and
                  Doron A. Peled},
  title        = {Java Bytecode Verification by Model Checking},
  booktitle    = {Computer Aided Verification, 11th International Conference, {CAV}
                  '99, Trento, Italy, July 6-10, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1633},
  pages        = {491--494},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48683-6\_43},
  doi          = {10.1007/3-540-48683-6\_43},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cav/BasinFPV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cqre/Basin99,
  author       = {David A. Basin},
  editor       = {Rainer Baumgart},
  title        = {Lazy Infinite-State Analysis of Security Protocols},
  booktitle    = {Secure Networking - {CQRE} (Secure) '99, International Exhibition
                  and Congress D{\"{u}}sseldorf, Germany, November 30 - December
                  2, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1740},
  pages        = {30--42},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46701-7\_3},
  doi          = {10.1007/3-540-46701-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cqre/Basin99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ismvl/AyariBF99,
  author       = {Abdelwaheb Ayari and
                  David A. Basin and
                  Stefan Friedrich},
  title        = {Structural and Behavioral Modeling with Monadic Logics},
  booktitle    = {29th {IEEE} International Symposium on Multiple-Valued Logic, {ISMVL}
                  1999, Freiburg im Breisgau, Germany, May 20-22, 1999, Proceedings},
  pages        = {142--151},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/ISMVL.1999.779709},
  doi          = {10.1109/ISMVL.1999.779709},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ismvl/AyariBF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ifip/BasinK99,
  author       = {David A. Basin and
                  Bernd Krieg{-}Br{\"{u}}ckner},
  editor       = {Egidio Astesiano and
                  Hans{-}J{\"{o}}rg Kreowski and
                  Bernd Krieg{-}Br{\"{u}}ckner},
  title        = {Formalization of the Development Process},
  booktitle    = {Algebraic Foundations of Systems Specification},
  series       = {{IFIP} State-of-the-Art Reports},
  pages        = {521--562},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-642-59851-7\_14},
  doi          = {10.1007/978-3-642-59851-7\_14},
  timestamp    = {Tue, 16 May 2017 14:24:23 +0200},
  biburl       = {https://dblp.org/rec/series/ifip/BasinK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ai/FrankB98,
  author       = {Ian Frank and
                  David A. Basin},
  title        = {Search in Games with Incomplete Information: {A} Case Study Using
                  Bridge Card Play},
  journal      = {Artif. Intell.},
  volume       = {100},
  number       = {1-2},
  pages        = {87--123},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0004-3702(97)00082-9},
  doi          = {10.1016/S0004-3702(97)00082-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ai/FrankB98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Basin98,
  author       = {David A. Basin},
  title        = {Logical-Framework-Based Program Development},
  journal      = {{ACM} Comput. Surv.},
  volume       = {30},
  number       = {3es},
  pages        = {1},
  year         = {1998},
  url          = {https://doi.org/10.1145/289121.289122},
  doi          = {10.1145/289121.289122},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/Basin98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icga/FrankB98,
  author       = {Ian Frank and
                  David A. Basin},
  title        = {Search in Games with Incomplete Information: {A} Case Study Using
                  Bridge Card Play},
  journal      = {J. Int. Comput. Games Assoc.},
  volume       = {21},
  number       = {3},
  pages        = {194},
  year         = {1998},
  url          = {https://doi.org/10.3233/ICG-1998-21308},
  doi          = {10.3233/ICG-1998-21308},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icga/FrankB98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jolli/BasinMV98,
  author       = {David A. Basin and
                  Se{\'{a}}n Matthews and
                  Luca Vigan{\`{o}}},
  title        = {Labelled Modal Logics: Quantifiers},
  journal      = {J. Log. Lang. Inf.},
  volume       = {7},
  number       = {3},
  pages        = {237--263},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1008278803780},
  doi          = {10.1023/A:1008278803780},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jolli/BasinMV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sLogica/BasinMV98,
  author       = {David A. Basin and
                  Se{\'{a}}n Matthews and
                  Luca Vigan{\`{o}}},
  title        = {Natural Deduction for Non-Classical Logics},
  journal      = {Stud Logica},
  volume       = {60},
  number       = {1},
  pages        = {119--160},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1005003904639},
  doi          = {10.1023/A:1005003904639},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sLogica/BasinMV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/FrankBM98,
  author       = {Ian Frank and
                  David A. Basin and
                  Hitoshi Matsubara},
  editor       = {Jack Mostow and
                  Chuck Rich},
  title        = {Finding Optimal Strategies for Imperfect Information Games},
  booktitle    = {Proceedings of the Fifteenth National Conference on Artificial Intelligence
                  and Tenth Innovative Applications of Artificial Intelligence Conference,
                  {AAAI} 98, {IAAI} 98, July 26-30, 1998, Madison, Wisconsin, {USA}},
  pages        = {500--507},
  publisher    = {{AAAI} Press / The {MIT} Press},
  year         = {1998},
  url          = {http://www.aaai.org/Library/AAAI/1998/aaai98-071.php},
  timestamp    = {Tue, 05 Sep 2023 09:10:47 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/FrankBM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cg/FrankB98,
  author       = {Ian Frank and
                  David A. Basin},
  editor       = {H. Jaap van den Herik and
                  Hiroyuki Iida},
  title        = {Optimal Play against Best Defence: Complexity and Heuristics},
  booktitle    = {Computers and Games, First International Conference, CG'98, Tsukuba,
                  Japan, November 11-12, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1558},
  pages        = {50--73},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48957-6\_4},
  doi          = {10.1007/3-540-48957-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/cg/FrankB98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/frocos/BasinF98,
  author       = {David A. Basin and
                  Stefan Friedrich},
  editor       = {Dov M. Gabbay and
                  Maarten de Rijke},
  title        = {Combining {WS1S} and {HOL}},
  booktitle    = {Frontiers of Combining Systems, Second International Workshop, FroCoS
                  1998, Amsterdam, The Netherlands, October 2-4, 1998, Proceedings},
  pages        = {39--56},
  publisher    = {Research Studies Press/Wiley},
  year         = {1998},
  timestamp    = {Mon, 22 Nov 2021 11:39:04 +0100},
  biburl       = {https://dblp.org/rec/conf/frocos/BasinF98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/frocos/BasinV98,
  author       = {David A. Basin and
                  Luca Vigan{\`{o}}},
  editor       = {Dov M. Gabbay and
                  Maarten de Rijke},
  title        = {A Recipe for the Complexity Analysis of Non-Classical Logics},
  booktitle    = {Frontiers of Combining Systems, Second International Workshop, FroCoS
                  1998, Amsterdam, The Netherlands, October 2-4, 1998, Proceedings},
  pages        = {57--76},
  publisher    = {Research Studies Press/Wiley},
  year         = {1998},
  timestamp    = {Wed, 24 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/frocos/BasinV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BasinM98,
  author       = {David A. Basin and
                  Se{\'{a}}n Matthews},
  editor       = {Claude Kirchner and
                  H{\'{e}}l{\`{e}}ne Kirchner},
  title        = {Scoped metatheorems},
  booktitle    = {1998 International Workshop on Rewriting Logic and its Applications,
                  {WRLA} 1998, Abbaye des Pr{\'{e}}montr{\'{e}}s at Pont-{\`{a}}-Mousson,
                  France, September 1998},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {15},
  pages        = {353--366},
  publisher    = {Elsevier},
  year         = {1998},
  url          = {https://doi.org/10.1016/S1571-0661(05)80021-0},
  doi          = {10.1016/S1571-0661(05)80021-0},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BasinM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/logcom/BasinMV97,
  author       = {David A. Basin and
                  Se{\'{a}}n Matthews and
                  Luca Vigan{\`{o}}},
  title        = {Labelled Propositional Modal Logics: Theory and Practice},
  journal      = {J. Log. Comput.},
  volume       = {7},
  number       = {6},
  pages        = {685--717},
  year         = {1997},
  url          = {https://doi.org/10.1093/logcom/7.6.685},
  doi          = {10.1093/LOGCOM/7.6.685},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/logcom/BasinMV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/AyariBP97,
  author       = {Abdelwaheb Ayari and
                  David A. Basin and
                  Andreas Podelski},
  editor       = {Mogens Nielsen and
                  Wolfgang Thomas},
  title        = {{LISA:} {A} Specification Language Based on {WS2S}},
  booktitle    = {Computer Science Logic, 11th International Workshop, {CSL} '97, Annual
                  Conference of the EACSL, Aarhus, Denmark, August 23-29, 1997, Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {1414},
  pages        = {18--34},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028005},
  doi          = {10.1007/BFB0028005},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/AyariBP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kgc/BasinMV97,
  author       = {David A. Basin and
                  Se{\'{a}}n Matthews and
                  Luca Vigan{\`{o}}},
  editor       = {Georg Gottlob and
                  Alexander Leitsch and
                  Daniele Mundici},
  title        = {A New Method for Bounding the Complexity of Modal Logics},
  booktitle    = {Computational Logic and Proof Theory, 5th Kurt G{\"{o}}del Colloquium,
                  KGC'97, Vienna, Austria, August 25-29, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1289},
  pages        = {89--102},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63385-5\_35},
  doi          = {10.1007/3-540-63385-5\_35},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/kgc/BasinMV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ki/BasinMV97,
  author       = {David A. Basin and
                  Se{\'{a}}n Matthews and
                  Luca Vigan{\`{o}}},
  editor       = {Gerhard Brewka and
                  Christopher Habel and
                  Bernhard Nebel},
  title        = {Labelled Quantified Modal Logics},
  booktitle    = {{KI-97:} Advances in Artificial Intelligence, 21st Annual German Conference
                  on Artificial Intelligence, Freiburg, Germany, September 9-12, 1997,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1303},
  pages        = {171--182},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3540634932\_13},
  doi          = {10.1007/3540634932\_13},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ki/BasinMV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/KraanBB96,
  author       = {Ina Kraan and
                  David A. Basin and
                  Alan Bundy},
  title        = {Middle-Out Reasoning for Synthesis and Induction},
  journal      = {J. Autom. Reason.},
  volume       = {16},
  number       = {1-2},
  pages        = {113--145},
  year         = {1996},
  url          = {https://doi.org/10.1007/BF00244461},
  doi          = {10.1007/BF00244461},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/KraanBB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/BasinW96,
  author       = {David A. Basin and
                  Toby Walsh},
  title        = {A Calculus for and Termination of Rippling},
  journal      = {J. Autom. Reason.},
  volume       = {16},
  number       = {1-2},
  pages        = {147--180},
  year         = {1996},
  url          = {https://doi.org/10.1007/BF00244462},
  doi          = {10.1007/BF00244462},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/BasinW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/logcom/BasinM96,
  author       = {David A. Basin and
                  Se{\'{a}}n Matthews},
  title        = {Adding Metatheoretic Facilities to First-Order Theories},
  journal      = {J. Log. Comput.},
  volume       = {6},
  number       = {6},
  pages        = {835--849},
  year         = {1996},
  url          = {https://doi.org/10.1093/logcom/6.6.835},
  doi          = {10.1093/LOGCOM/6.6.835},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/logcom/BasinM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/BasinM96,
  author       = {David A. Basin and
                  Se{\'{a}}n Matthews},
  editor       = {Michael A. McRobbie and
                  John K. Slaney},
  title        = {Structuring Metatheory on Inductive Definitions},
  booktitle    = {Automated Deduction - CADE-13, 13th International Conference on Automated
                  Deduction, New Brunswick, NJ, USA, July 30 - August 3, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1104},
  pages        = {171--185},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61511-3\_79},
  doi          = {10.1007/3-540-61511-3\_79},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/BasinM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmcad/CantuBSB96,
  author       = {Francisco J. Cantu and
                  Alan Bundy and
                  Alan Smaill and
                  David A. Basin},
  editor       = {Mandayam K. Srivas and
                  Albert John Camilleri},
  title        = {Experiments in Automating Hardware Verification Using Inductive Proof
                  Planning},
  booktitle    = {Formal Methods in Computer-Aided Design, First International Conference,
                  {FMCAD} '96, Palo Alto, California, USA, November 6-8, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1166},
  pages        = {94--108},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0031802},
  doi          = {10.1007/BFB0031802},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fmcad/CantuBSB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/frocos/BasinMV96,
  author       = {David A. Basin and
                  Se{\'{a}}n Matthews and
                  Luca Vigan{\`{o}}},
  editor       = {Franz Baader and
                  Klaus U. Schulz},
  title        = {A Topography of Labelled Modal Logics},
  booktitle    = {Frontiers of Combining Systems, First International Workshop FroCoS
                  1996, Munich, Germany, March 26-29, 1996, Proceedings},
  series       = {Applied Logic Series},
  volume       = {3},
  pages        = {75--92},
  publisher    = {Kluwer Academic Publishers},
  year         = {1996},
  timestamp    = {Mon, 20 Mar 2017 13:54:49 +0100},
  biburl       = {https://dblp.org/rec/conf/frocos/BasinMV96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kr/BasinMV96,
  author       = {David A. Basin and
                  Se{\'{a}}n Matthews and
                  Luca Vigan{\`{o}}},
  editor       = {Luigia Carlucci Aiello and
                  Jon Doyle and
                  Stuart C. Shapiro},
  title        = {Implementing Modal and Relevance Logics in a Logical Framework},
  booktitle    = {Proceedings of the Fifth International Conference on Principles of
                  Knowledge Representation and Reasoning (KR'96), Cambridge, Massachusetts,
                  USA, November 5-8, 1996},
  pages        = {386--397},
  publisher    = {Morgan Kaufmann},
  year         = {1996},
  timestamp    = {Mon, 22 Aug 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kr/BasinMV96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/BasinG96,
  author       = {David A. Basin and
                  Harald Ganzinger},
  title        = {Complexity Analysis Based on Ordered Resolution},
  booktitle    = {Proceedings, 11th Annual {IEEE} Symposium on Logic in Computer Science,
                  New Brunswick, New Jersey, USA, July 27-30, 1996},
  pages        = {456--465},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/LICS.1996.561462},
  doi          = {10.1109/LICS.1996.561462},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/BasinG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/AyariB96,
  author       = {Abdelwaheb Ayari and
                  David A. Basin},
  editor       = {Tiziana Margaria and
                  Bernhard Steffen},
  title        = {Generic System Support for Deductive Program Development},
  booktitle    = {Tools and Algorithms for Construction and Analysis of Systems, Second
                  International Workshop, {TACAS} '96, Passau, Germany, March 27-29,
                  1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1055},
  pages        = {313--328},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61042-1\_52},
  doi          = {10.1007/3-540-61042-1\_52},
  timestamp    = {Sun, 02 Jun 2019 21:19:27 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/AyariB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tphol/BasinF96,
  author       = {David A. Basin and
                  Stefan Friedrich},
  editor       = {Joakim von Wright and
                  Jim Grundy and
                  John Harrison},
  title        = {Modeling a Hardware Synthesis Methodology in Isabelle},
  booktitle    = {Theorem Proving in Higher Order Logics, 9th International Conference,
                  TPHOLs'96, Turku, Finland, August 26-30, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1125},
  pages        = {33--50},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0105395},
  doi          = {10.1007/BFB0105395},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tphol/BasinF96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/AndersonB95,
  author       = {Penny Anderson and
                  David A. Basin},
  editor       = {Kanchana Kanchanasut and
                  Jean{-}Jacques L{\'{e}}vy},
  title        = {Deriving and Applying Logic Program Transformers},
  booktitle    = {Algorithms, Concurrency and Knowledge: 1995 Asian Computing Science
                  Conference, {ACSC} '95, Pathumthani, Thailand, December 11-13, 1995,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1023},
  pages        = {301--318},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60688-2\_52},
  doi          = {10.1007/3-540-60688-2\_52},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/AndersonB95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/BasinK95,
  author       = {David A. Basin and
                  Nils Klarlund},
  editor       = {Pierre Wolper},
  title        = {Hardware Verification using Monadic Second-Order Logic},
  booktitle    = {Computer Aided Verification, 7th International Conference, Li{\`{e}}ge,
                  Belgium, July, 3-5, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {939},
  pages        = {31--41},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60045-0\_38},
  doi          = {10.1007/3-540-60045-0\_38},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/BasinK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eik/Basin94,
  author       = {David A. Basin},
  title        = {Generalized Rewriting in Type Theory},
  journal      = {J. Inf. Process. Cybern.},
  volume       = {30},
  number       = {5/6},
  pages        = {249--259},
  year         = {1994},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eik/Basin94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Basin94,
  author       = {David A. Basin},
  title        = {A Term Equality Problem Equivalent to Graph Isomorphism},
  journal      = {Inf. Process. Lett.},
  volume       = {51},
  number       = {2},
  pages        = {61--66},
  year         = {1994},
  url          = {https://doi.org/10.1016/0020-0190(94)00084-0},
  doi          = {10.1016/0020-0190(94)00084-0},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Basin94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/BasinW94,
  author       = {David A. Basin and
                  Toby Walsh},
  editor       = {Alan Bundy},
  title        = {Termination Orderings for Rippling},
  booktitle    = {Automated Deduction - CADE-12, 12th International Conference on Automated
                  Deduction, Nancy, France, June 26 - July 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {814},
  pages        = {466--483},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58156-1\_34},
  doi          = {10.1007/3-540-58156-1\_34},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/BasinW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrs/BasinW94,
  author       = {David A. Basin and
                  Toby Walsh},
  editor       = {Nachum Dershowitz and
                  Naomi Lindenstrauss},
  title        = {A Calculus for Rippling},
  booktitle    = {Conditional and Typed Rewriting Systems, 4th International Workshop,
                  CTRS-94, Jerusalem, Israel, July 13-15, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {968},
  pages        = {15--30},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60381-6\_2},
  doi          = {10.1007/3-540-60381-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrs/BasinW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/YoshidaBGWB94,
  author       = {Tetsuya Yoshida and
                  Alan Bundy and
                  Ian Green and
                  Toby Walsh and
                  David A. Basin},
  editor       = {Anthony G. Cohn},
  title        = {Coloured Rippling: An Extension of a Theorem Proving Heuristic},
  booktitle    = {Proceedings of the Eleventh European Conference on Artificial Intelligence,
                  Amsterdam, The Netherlands, August 8-12, 1994},
  pages        = {85--89},
  publisher    = {John Wiley and Sons, Chichester},
  year         = {1994},
  timestamp    = {Tue, 20 Jun 2023 09:03:42 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai/YoshidaBGWB94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclp/Basin94,
  author       = {David A. Basin},
  editor       = {Pascal Van Hentenryck},
  title        = {IsaWhelk Interpreted in Isabelle},
  booktitle    = {Logic Programming, Proceedings of the Eleventh International Conference
                  on Logic Programming, Santa Marherita Ligure, Italy, June 13-18, 1994},
  pages        = {741},
  publisher    = {{MIT} Press},
  year         = {1994},
  timestamp    = {Fri, 29 Nov 2013 14:57:24 +0100},
  biburl       = {https://dblp.org/rec/conf/iclp/Basin94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lopstr/Basin94,
  author       = {David A. Basin},
  editor       = {Laurent Fribourg and
                  Franco Turini},
  title        = {Logic Frameworks for Logic Programs},
  booktitle    = {Logic Programming Synthesis and Transformation - Meta-Programming
                  in Logic. 4th Internation Workshops, LOPSTR'94 and META'94, Pisa,
                  Italy, June 20-21, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {883},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58792-6\_1},
  doi          = {10.1007/3-540-58792-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/lopstr/Basin94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amai/BarnettBH93,
  author       = {Richard Barnett and
                  David A. Basin and
                  Jane Hesketh},
  title        = {A Recursion Planning Analysis of Inductive Completion},
  journal      = {Ann. Math. Artif. Intell.},
  volume       = {8},
  number       = {3-4},
  pages        = {363--381},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01530798},
  doi          = {10.1007/BF01530798},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amai/BarnettBH93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/BasinM93,
  author       = {David A. Basin and
                  Se{\'{a}}n Matthews},
  editor       = {R. K. Shyamasundar},
  title        = {A Conservative Extension of First-order Logic and Its Application
                  to Theorem Proving},
  booktitle    = {Foundations of Software Technology and Theoretical Computer Science,
                  13th Conference, Bombay, India, December 15-17, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {761},
  pages        = {151--160},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-57529-4\_50},
  doi          = {10.1007/3-540-57529-4\_50},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/BasinM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclp/KraanBB93,
  author       = {Ina Kraan and
                  David A. Basin and
                  Alan Bundy},
  editor       = {David Scott Warren},
  title        = {Middle-Out Reasoning for Logic Program Synthesis},
  booktitle    = {Logic Programming, Proceedings of the Tenth International Conference
                  on Logic Programming, Budapest, Hungary, June 21-25, 1993},
  pages        = {441--455},
  publisher    = {{MIT} Press},
  year         = {1993},
  timestamp    = {Fri, 29 Nov 2013 14:57:24 +0100},
  biburl       = {https://dblp.org/rec/conf/iclp/KraanBB93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/BasinW93,
  author       = {David A. Basin and
                  Toby Walsh},
  editor       = {Ruzena Bajcsy},
  title        = {Difference Unification},
  booktitle    = {Proceedings of the 13th International Joint Conference on Artificial
                  Intelligence. Chamb{\'{e}}ry, France, August 28 - September 3,
                  1993},
  pages        = {116--122},
  publisher    = {Morgan Kaufmann},
  year         = {1993},
  url          = {http://ijcai.org/Proceedings/93-1/Papers/017.pdf},
  timestamp    = {Tue, 20 Aug 2019 16:18:33 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/BasinW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwssd/BasinBKM93,
  author       = {David A. Basin and
                  Alan Bundy and
                  Ina Kraan and
                  Se{\'{a}}n Matthews},
  editor       = {Jack C. Wileden and
                  Martin S. Feather and
                  Axel van Lamsweerde},
  title        = {A Framework for Program Development Based on Schematic Proof},
  booktitle    = {Proceedings of the 7th International Workshop on Software Specification
                  and Design, Redondo Beach, CA, USA, December 6-7, 1993},
  pages        = {162--171},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://dl.acm.org/doi/10.5555/951807.951833},
  doi          = {10.5555/951807.951833},
  timestamp    = {Fri, 13 May 2022 15:10:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iwssd/BasinBKM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/BasinW92,
  author       = {David A. Basin and
                  Toby Walsh},
  editor       = {Deepak Kapur},
  title        = {Difference Matching},
  booktitle    = {Automated Deduction - CADE-11, 11th International Conference on Automated
                  Deduction, Saratoga Springs, NY, USA, June 15-18, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {607},
  pages        = {295--309},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-55602-8\_173},
  doi          = {10.1007/3-540-55602-8\_173},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/BasinW92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/FrankBB92,
  author       = {Ian Frank and
                  David A. Basin and
                  Alan Bundy},
  editor       = {Bernd Neumann},
  title        = {An Adaptation of Proof-Planning to Declarer Play in Bridge},
  booktitle    = {10th European Conference on Artificial Intelligence, {ECAI} 92, Vienna,
                  Austria, August 3-7, 1992. Proceedings},
  pages        = {72--76},
  publisher    = {John Wiley and Sons},
  year         = {1992},
  timestamp    = {Wed, 31 Jul 2019 08:44:58 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai/FrankBB92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lopstr/KraanBB92,
  author       = {Ina Kraan and
                  David A. Basin and
                  Alan Bundy},
  editor       = {Kung{-}Kiu Lau and
                  Tim Clement},
  title        = {Logic Program Synthesis via Proof Planning},
  booktitle    = {Logic Program Synthesis and Transformation, Proceedings of {LOPSTR}
                  92, International Workshop on Logic Program Synthesis and Transformation,
                  University of Manchester, UK, 2-3 July 1992},
  series       = {Workshops in Computing},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/978-1-4471-3560-9\_1},
  doi          = {10.1007/978-1-4471-3560-9\_1},
  timestamp    = {Fri, 21 Jun 2019 13:08:59 +0200},
  biburl       = {https://dblp.org/rec/conf/lopstr/KraanBB92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/BasinBL91,
  author       = {David A. Basin and
                  Geoffrey M. Brown and
                  Miriam Leeser},
  title        = {Formally verified synthesis of combinational {CMOS} circuits},
  journal      = {Integr.},
  volume       = {11},
  number       = {3},
  pages        = {235--250},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-9260(91)90048-P},
  doi          = {10.1016/0167-9260(91)90048-P},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/integration/BasinBL91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiia/BasinGT91,
  author       = {David A. Basin and
                  Fausto Giunchiglia and
                  Paolo Traverso},
  editor       = {Edoardo Ardizzone and
                  Salvatore Gaglio and
                  Filippo Sorbello},
  title        = {Automating Meta-Theory Creation and System Extension},
  booktitle    = {Trends in Artificial Intelligence, 2nd Congress of the Italian Association
                  for Artificial Intelligence, AI*IA, Palermo, Italy, October, 29-31,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {549},
  pages        = {48--57},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54712-6\_217},
  doi          = {10.1007/3-540-54712-6\_217},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/aiia/BasinGT91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacs/BasinH91,
  author       = {David A. Basin and
                  Douglas J. Howe},
  editor       = {Takayasu Ito and
                  Albert R. Meyer},
  title        = {Some Normalization Properties of Martin-L{\"{o}}f's Type Theory,
                  and Applications},
  booktitle    = {Theoretical Aspects of Computer Software, International Conference
                  {TACS} '91, Sendai, Japan, September 24-27, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {526},
  pages        = {475--494},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54415-1\_60},
  doi          = {10.1007/3-540-54415-1\_60},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/tacs/BasinH91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Basin90,
  author       = {David A. Basin},
  title        = {Building Problem Solving Environments in Constructive Type Theory},
  school       = {Cornell University, {USA}},
  year         = {1990},
  timestamp    = {Mon, 28 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Basin90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/Basin90,
  author       = {David A. Basin},
  editor       = {Mark E. Stickel},
  title        = {Equality of Terms Containing Associative-Commutative Functions and
                  Commutative Binding Operators in Isomorphism Complete},
  booktitle    = {10th International Conference on Automated Deduction, Kaiserslautern,
                  FRG, July 24-27, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {449},
  pages        = {251--260},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-52885-7\_92},
  doi          = {10.1007/3-540-52885-7\_92},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/Basin90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ershov/Basin89,
  author       = {David A. Basin},
  editor       = {Albert R. Meyer and
                  Michael A. Taitslin},
  title        = {Building Theories in Nuprl},
  booktitle    = {Logic at Botik '89, Symposium on Logical Foundations of Computer Science,
                  Pereslav-Zalessky, USSR, July 3-8, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {363},
  pages        = {12--25},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-51237-3\_3},
  doi          = {10.1007/3-540-51237-3\_3},
  timestamp    = {Fri, 17 Jul 2020 16:12:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ershov/Basin89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msiw/BasinV89,
  author       = {David A. Basin and
                  Peter Del Vecchio},
  editor       = {Miriam Leeser and
                  Geoffrey Brown},
  title        = {Verification Of Combinational Logic in Nuprl},
  booktitle    = {Hardware Specification, Verification and Synthesis: Mathematical Aspects,
                  Mathematical Science Institute Workshop, Cornall University, Ithaca,
                  New York, USA, July 5-7, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {408},
  pages        = {333--357},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-97226-9\_36},
  doi          = {10.1007/0-387-97226-9\_36},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/msiw/BasinV89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/Basin88,
  author       = {David A. Basin},
  editor       = {Ewing L. Lusk and
                  Ross A. Overbeek},
  title        = {An Environment For Automated Reasoning About Partial Functions},
  booktitle    = {9th International Conference on Automated Deduction, Argonne, Illinois,
                  USA, May 23-26, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {310},
  pages        = {101--110},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/BFb0012825},
  doi          = {10.1007/BFB0012825},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/Basin88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics