Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: David A. Basin
@article{DBLP:journals/popets/KrsticNB24, author = {Srdan Krstic and Hoang Nguyen Phuoc Bao and David A. Basin}, title = {Model-driven Privacy}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {1}, pages = {314--329}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0018}, doi = {10.56553/POPETS-2024-0018}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/KrsticNB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/HubletBK24, author = {Fran{\c{c}}ois Hublet and David A. Basin and Srdan Krstic}, title = {User-Controlled Privacy: Taint, Track, and Control}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {1}, pages = {597--616}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0034}, doi = {10.56553/POPETS-2024-0034}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/HubletBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-03199, author = {Felix Linker and David A. Basin}, title = {{SOAP:} {A} Social Authentication Protocol}, journal = {CoRR}, volume = {abs/2402.03199}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.03199}, doi = {10.48550/ARXIV.2402.03199}, eprinttype = {arXiv}, eprint = {2402.03199}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-03199.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KlenzeSB23, author = {Tobias Klenze and Christoph Sprenger and David A. Basin}, title = {IsaNet: {A} framework for verifying secure data plane protocols}, journal = {J. Comput. Secur.}, volume = {31}, number = {3}, pages = {217--259}, year = {2023}, url = {https://doi.org/10.3233/JCS-220021}, doi = {10.3233/JCS-220021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KlenzeSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lmcs/RaszykBKT23, author = {Martin Raszyk and David A. Basin and Srdan Krstic and Dmitriy Traytel}, title = {Efficient Evaluation of Arbitrary Relational Calculus Queries}, journal = {Log. Methods Comput. Sci.}, volume = {19}, number = {4}, year = {2023}, url = {https://doi.org/10.46298/lmcs-19(4:38)2023}, doi = {10.46298/LMCS-19(4:38)2023}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lmcs/RaszykBKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/TuratiKCB23, author = {Florian Turati and Karel Kubicek and Carlos Cotrini and David A. Basin}, title = {Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {4}, pages = {117--131}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0101}, doi = {10.56553/POPETS-2023-0101}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/TuratiKCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/HuangLCWBLP23, author = {Kaile Huang and Si Liu and Zhenge Chen and Hengfeng Wei and David A. Basin and Haixiang Li and Anqun Pan}, title = {Efficient Black-box Checking of Snapshot Isolation in Databases}, journal = {Proc. {VLDB} Endow.}, volume = {16}, number = {6}, pages = {1264--1276}, year = {2023}, url = {https://www.vldb.org/pvldb/vol16/p1264-wei.pdf}, doi = {10.14778/3583140.3583145}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/HuangLCWBLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OchoaVTB23, author = {Mart{\'{\i}}n Ochoa and Hern{\'{a}}n Vanegas and Jorge Toro{-}Pozo and David A. Basin}, title = {SealClub: Computer-aided Paper Document Authentication}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {163--177}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627176}, doi = {10.1145/3627106.3627176}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OchoaVTB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/Basin23, author = {David A. Basin}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {Formal Methods for Payment Protocols}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {326}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3596440}, doi = {10.1145/3579856.3596440}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/Basin23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atva/BasinKST23, author = {David A. Basin and Srdan Krstic and Joshua Schneider and Dmitriy Traytel}, editor = {{\'{E}}tienne Andr{\'{e}} and Jun Sun}, title = {Correct and Efficient Policy Monitoring, a Retrospective}, booktitle = {Automated Technology for Verification and Analysis - 21st International Symposium, {ATVA} 2023, Singapore, October 24-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14215}, pages = {3--30}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45329-8\_1}, doi = {10.1007/978-3-031-45329-8\_1}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atva/BasinKST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LinkerB23, author = {Felix Linker and David A. Basin}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {{ADEM:} An Authentic Digital EMblem}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2815--2829}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616578}, doi = {10.1145/3576915.3616578}, timestamp = {Wed, 17 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LinkerB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinGKNO23, author = {David A. Basin and Juan Guarnizo and Srdan Krstic and Hoang Nguyen Phuoc Bao and Mart{\'{\i}}n Ochoa}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Is Modeling Access Control Worth It?}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2830--2844}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623196}, doi = {10.1145/3576915.3623196}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BasinGKNO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HubletBK23, author = {Fran{\c{c}}ois Hublet and David A. Basin and Srdan Krstic}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Enforcing the {GDPR}}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14345}, pages = {400--422}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51476-0\_20}, doi = {10.1007/978-3-031-51476-0\_20}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/HubletBK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/BasinDKPRST23, author = {David A. Basin and Daniel Stefan Dietiker and Srdan Krstic and Yvonne{-}Anne Pignolet and Martin Raszyk and Joshua Schneider and Arshavir Ter{-}Gabrielyan}, editor = {Marsha Chechik and Joost{-}Pieter Katoen and Martin Leucker}, title = {Monitoring the Internet Computer}, booktitle = {Formal Methods - 25th International Symposium, {FM} 2023, L{\"{u}}beck, Germany, March 6-10, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14000}, pages = {383--402}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-27481-7\_22}, doi = {10.1007/978-3-031-27481-7\_22}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fm/BasinDKPRST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/DuanFL0BP23, author = {Huayi Duan and Rub{\'{e}}n Fischer and Jie Lou and Si Liu and David A. Basin and Adrian Perrig}, editor = {Mahesh Balakrishnan and Manya Ghobadi}, title = {{RHINE:} Robust and High-performance Internet Naming with {E2E} Authenticity}, booktitle = {20th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2023, Boston, MA, April 17-19, 2023}, pages = {531--553}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/nsdi23/presentation/duan}, timestamp = {Thu, 11 May 2023 17:08:22 +0200}, biburl = {https://dblp.org/rec/conf/nsdi/DuanFL0BP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/0003DHBVBP23, author = {Si Liu and Huayi Duan and Lukas Heimes and Marco Bearzi and Jodok Vieli and David A. Basin and Adrian Perrig}, editor = {Henning Schulzrinne and Vishal Misra and Eddie Kohler and David A. Maltz}, title = {A Formal Framework for End-to-End {DNS} Resolution}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2023 Conference, {ACM} {SIGCOMM} 2023, New York, NY, USA, 10-14 September 2023}, pages = {932--949}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3603269.3604870}, doi = {10.1145/3603269.3604870}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/0003DHBVBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ArquintWLSSWBM23, author = {Linard Arquint and Felix A. Wolf and Joseph Lallemand and Ralf Sasse and Christoph Sprenger and Sven N. Wiesner and David A. Basin and Peter M{\"{u}}ller}, title = {Sound Verification of Security Protocols: From Design to Interoperable Implementations}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1077--1093}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179325}, doi = {10.1109/SP46215.2023.10179325}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ArquintWLSSWBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorPB23, author = {Virgil D. Gligor and Adrian Perrig and David A. Basin}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Determining an Economic Value of High Assurance for Commodity Software Security}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {228--242}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_23}, doi = {10.1007/978-3-031-43033-6\_23}, timestamp = {Tue, 24 Oct 2023 15:45:07 +0200}, biburl = {https://dblp.org/rec/conf/spw/GligorPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BasinST23, author = {David A. Basin and Patrick Schaller and Jorge Toro{-}Pozo}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Inducing Authentication Failures to Bypass Credit Card PINs}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3065--3079}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/basin}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BasinST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KrahenbuhlWBLPS23, author = {Cyrill Kr{\"{a}}henb{\"{u}}hl and Marc Wyss and David A. Basin and Vincent Lenders and Adrian Perrig and Martin Strohmeier}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{FABRID:} Flexible Attestation-Based Routing for Inter-Domain Networks}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5755--5772}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/krahenbuhl}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KrahenbuhlWBLPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-07313, author = {Kaile Huang and Si Liu and Zhenge Chen and Hengfeng Wei and David A. Basin and Haixiang Li and Anqun Pan}, title = {Efficient Black-box Checking of Snapshot Isolation in Databases}, journal = {CoRR}, volume = {abs/2301.07313}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.07313}, doi = {10.48550/ARXIV.2301.07313}, eprinttype = {arXiv}, eprint = {2301.07313}, timestamp = {Mon, 08 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-07313.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-13635, author = {Florian Turati and Carlos Cotrini and Karel Kubicek and David A. Basin}, title = {Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System}, journal = {CoRR}, volume = {abs/2302.13635}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.13635}, doi = {10.48550/ARXIV.2302.13635}, eprinttype = {arXiv}, eprint = {2302.13635}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-13635.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-03108, author = {Cyrill Kr{\"{a}}henb{\"{u}}hl and Marc Wyss and David A. Basin and Vincent Lenders and Adrian Perrig and Martin Strohmeier}, title = {{FABRID:} Flexible Attestation-Based Routing for Inter-Domain Networks}, journal = {CoRR}, volume = {abs/2304.03108}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.03108}, doi = {10.48550/ARXIV.2304.03108}, eprinttype = {arXiv}, eprint = {2304.03108}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-03108.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/Chuat22, author = {Laurent Chuat and Markus Legner and David A. Basin and David Hausheer and Samuel Hitz and Peter M{\"{u}}ller and Adrian Perrig}, title = {The Complete Guide to {SCION} - From Design Principles to Formal Verification}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-05288-0}, doi = {10.1007/978-3-031-05288-0}, isbn = {978-3-031-05287-3}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Chuat22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BasinCDS22, author = {David A. Basin and Cas Cremers and Jannik Dreier and Ralf Sasse}, title = {Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {3}, pages = {24--32}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2022.3154689}, doi = {10.1109/MSEC.2022.3154689}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BasinCDS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/LiuMOZB22, author = {Si Liu and Jos{\'{e}} Meseguer and Peter Csaba {\"{O}}lveczky and Min Zhang and David A. Basin}, title = {Bridging the semantic gap between qualitative and quantitative models of distributed systems}, journal = {Proc. {ACM} Program. Lang.}, volume = {6}, number = {{OOPSLA2}}, pages = {315--344}, year = {2022}, url = {https://doi.org/10.1145/3563299}, doi = {10.1145/3563299}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmpl/LiuMOZB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KubicekMCSBB22, author = {Karel Kubicek and Jakob Merane and Carlos Cotrini and Alexander Stremitzer and Stefan Bechtold and David A. Basin}, title = {Checking Websites' {GDPR} Consent Compliance for Marketing Emails}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {2}, pages = {282--303}, year = {2022}, url = {https://doi.org/10.2478/popets-2022-0046}, doi = {10.2478/POPETS-2022-0046}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KubicekMCSBB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/HammannCRSB22, author = {Sven Hammann and Michael Crabb and Sasa Radomirovic and Ralf Sasse and David A. Basin}, editor = {Simone D. J. Barbosa and Cliff Lampe and Caroline Appert and David A. Shamma and Steven Mark Drucker and Julie R. Williamson and Koji Yatani}, title = {"I'm Surprised So Much Is Connected"}, booktitle = {{CHI} '22: {CHI} Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022}, pages = {620:1--620:13}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3491102.3502125}, doi = {10.1145/3491102.3502125}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/HammannCRSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KaramiBJ22, author = {Farzane Karami and David A. Basin and Einar Broch Johnsen}, title = {{DPL:} {A} Language for {GDPR} Enforcement}, booktitle = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, pages = {112--129}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSF54842.2022.9919687}, doi = {10.1109/CSF54842.2022.9919687}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/KaramiBJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/WeghornLSPB22, author = {Thilo Weghorn and Si Liu and Christoph Sprenger and Adrian Perrig and David A. Basin}, title = {N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures}, booktitle = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, pages = {147--162}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSF54842.2022.9919646}, doi = {10.1109/CSF54842.2022.9919646}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/WeghornLSPB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CeragioliGDB22, author = {Lorenzo Ceragioli and Letterio Galletta and Pierpaolo Degano and David A. Basin}, title = {{IFCIL:} An Information Flow Configuration Language for SELinux}, booktitle = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, pages = {243--259}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSF54842.2022.9919690}, doi = {10.1109/CSF54842.2022.9919690}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/CeragioliGDB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HubletBK22, author = {Fran{\c{c}}ois Hublet and David A. Basin and Srdan Krstic}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Real-Time Policy Enforcement with Metric First-Order Temporal Logic}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13555}, pages = {211--232}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17146-8\_11}, doi = {10.1007/978-3-031-17146-8\_11}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/HubletBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdt/RaszykBKT22, author = {Martin Raszyk and David A. Basin and Srdan Krstic and Dmitriy Traytel}, editor = {Dan Olteanu and Nils Vortmeier}, title = {Practical Relational Calculus Query Evaluation}, booktitle = {25th International Conference on Database Theory, {ICDT} 2022, March 29 to April 1, 2022, Edinburgh, {UK} (Virtual Conference)}, series = {LIPIcs}, volume = {220}, pages = {11:1--11:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ICDT.2022.11}, doi = {10.4230/LIPICS.ICDT.2022.11}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdt/RaszykBKT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictac/BasinDHHMKKMRST22, author = {David A. Basin and Thibault Dardinier and Nico Hauser and Lukas Heimes and Jonathan Juli{\'{a}}n Huerta y Munive and Nicolas Kaletsch and Srdan Krstic and Emanuele Marsicano and Martin Raszyk and Joshua Schneider and Dawit Legesse Tirore and Dmitriy Traytel and Sheila Zingg}, editor = {Helmut Seidl and Zhiming Liu and Corina S. Pasareanu}, title = {VeriMon: {A} Formally Verified Monitoring Tool}, booktitle = {Theoretical Aspects of Computing - {ICTAC} 2022 - 19th International Colloquium, Tbilisi, Georgia, September 27-29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13572}, pages = {1--6}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17715-6\_1}, doi = {10.1007/978-3-031-17715-6\_1}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ictac/BasinDHHMKKMRST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BollingerKCB22, author = {Dino Bollinger and Karel Kubicek and Carlos Cotrini and David A. Basin}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Automating Cookie Consent and {GDPR} Violation Detection}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2893--2910}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/bollinger}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BollingerKCB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-15915, author = {Lorenzo Ceragioli and Letterio Galletta and Pierpaolo Degano and David A. Basin}, title = {{IFCIL:} An Information Flow Configuration Language for SELinux (Extended Version)}, journal = {CoRR}, volume = {abs/2205.15915}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.15915}, doi = {10.48550/ARXIV.2205.15915}, eprinttype = {arXiv}, eprint = {2205.15915}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-15915.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-07884, author = {Mart{\'{\i}}n Ochoa and Jorge Toro{-}Pozo and David A. Basin}, title = {SealClub: Computer-aided Paper Document Authentication}, journal = {CoRR}, volume = {abs/2210.07884}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.07884}, doi = {10.48550/ARXIV.2210.07884}, eprinttype = {arXiv}, eprint = {2210.07884}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-07884.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-09964, author = {Martin Raszyk and David A. Basin and Srdan Krstic and Dmitriy Traytel}, title = {Efficient Evaluation of Arbitrary Relational Calculus Queries}, journal = {CoRR}, volume = {abs/2210.09964}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.09964}, doi = {10.48550/ARXIV.2210.09964}, eprinttype = {arXiv}, eprint = {2210.09964}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-09964.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-04171, author = {Linard Arquint and Felix A. Wolf and Joseph Lallemand and Ralf Sasse and Christoph Sprenger and Sven N. Wiesner and David A. Basin and Peter M{\"{u}}ller}, title = {Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version)}, journal = {CoRR}, volume = {abs/2212.04171}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.04171}, doi = {10.48550/ARXIV.2212.04171}, eprinttype = {arXiv}, eprint = {2212.04171}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-04171.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/SchneiderBBKT21, author = {Joshua Schneider and David A. Basin and Frederik Brix and Srdan Krstic and Dmitriy Traytel}, title = {Scalable online first-order monitoring}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {23}, number = {2}, pages = {185--208}, year = {2021}, url = {https://doi.org/10.1007/s10009-021-00607-1}, doi = {10.1007/S10009-021-00607-1}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/SchneiderBBKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinDGR21, author = {David A. Basin and Jannik Dreier and Sofia Giampietro and Sasa Radomirovic}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Verifying Table-Based Elections}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2632--2652}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484555}, doi = {10.1145/3460120.3484555}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BasinDGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BasinLMS21, author = {David A. Basin and Andreas Lochbihler and Ueli Maurer and S. Reza Sefidgar}, title = {Abstract Modeling of System Communication in Constructive Cryptography using CryptHOL}, booktitle = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik, Croatia, June 21-25, 2021}, pages = {1--16}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSF51468.2021.00047}, doi = {10.1109/CSF51468.2021.00047}, timestamp = {Fri, 13 Aug 2021 09:20:41 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BasinLMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HirschiSB21, author = {Lucca Hirschi and Lara Schmid and David A. Basin}, title = {Fixing the Achilles Heel of E-Voting: The Bulletin Board}, booktitle = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik, Croatia, June 21-25, 2021}, pages = {1--17}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSF51468.2021.00016}, doi = {10.1109/CSF51468.2021.00016}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/HirschiSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Klenze0B21, author = {Tobias Klenze and Christoph Sprenger and David A. Basin}, title = {Formal Verification of Secure Forwarding Protocols}, booktitle = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik, Croatia, June 21-25, 2021}, pages = {1--16}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSF51468.2021.00018}, doi = {10.1109/CSF51468.2021.00018}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Klenze0B21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BasinST21, author = {David A. Basin and Ralf Sasse and Jorge Toro{-}Pozo}, title = {The {EMV} Standard: Break, Fix, Verify}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1766--1781}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00037}, doi = {10.1109/SP40001.2021.00037}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/BasinST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BasinST21, author = {David A. Basin and Ralf Sasse and Jorge Toro{-}Pozo}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Card Brand Mixup Attack: Bypassing the {PIN} in non-Visa Cards by Using Them for Visa Transactions}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {179--194}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/basin}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/BasinST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PeltonenSB21, author = {Aleksi Peltonen and Ralf Sasse and David A. Basin}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {A comprehensive formal analysis of 5G handover}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {1--12}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467823}, doi = {10.1145/3448300.3467823}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PeltonenSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/GiuliariKLBPS20, author = {Giacomo Giuliari and Tobias Klenze and Markus Legner and David A. Basin and Adrian Perrig and Ankit Singla}, title = {Internet backbones in space}, journal = {Comput. Commun. Rev.}, volume = {50}, number = {1}, pages = {25--37}, year = {2020}, url = {https://doi.org/10.1145/3390251.3390256}, doi = {10.1145/3390251.3390256}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccr/GiuliariKLBPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/TroncosoPHSLLSP20, author = {Carmela Troncoso and Mathias Payer and Jean{-}Pierre Hubaux and Marcel Salath{\'{e}} and James R. Larus and Wouter Lueks and Theresa Stadler and Apostolos Pyrgelis and Daniele Antonioli and Ludovic Barman and Sylvain Chatel and Kenneth G. Paterson and Srdjan Capkun and David A. Basin and Jan Beutel and Dennis Jackson and Marc Roeschlin and Patrick Leu and Bart Preneel and Nigel P. Smart and Aysajan Abidin and Seda Gurses and Michael Veale and Cas Cremers and Michael Backes and Nils Ole Tippenhauer and Reuben Binns and Ciro Cattuto and Alain Barrat and Dario Fiore and Manuel Barbosa and Rui Oliveira and Jos{\'{e}} Pereira}, title = {Decentralized Privacy-Preserving Proximity Tracing}, journal = {{IEEE} Data Eng. Bull.}, volume = {43}, number = {2}, pages = {36--66}, year = {2020}, url = {http://sites.computer.org/debull/A20june/p36.pdf}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/debu/TroncosoPHSLLSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/CostaGDBB20, author = {Gabriele Costa and Letterio Galletta and Pierpaolo Degano and David A. Basin and Chiara Bodei}, title = {Natural Projection as Partial Model Checking}, journal = {J. Autom. Reason.}, volume = {64}, number = {7}, pages = {1445--1481}, year = {2020}, url = {https://doi.org/10.1007/s10817-020-09568-7}, doi = {10.1007/S10817-020-09568-7}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/CostaGDBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BasinLS20, author = {David A. Basin and Andreas Lochbihler and S. Reza Sefidgar}, title = {CryptHOL: Game-Based Proofs in Higher-Order Logic}, journal = {J. Cryptol.}, volume = {33}, number = {2}, pages = {494--566}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09341-z}, doi = {10.1007/S00145-019-09341-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BasinLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/0001KEW0CB20, author = {Christoph Sprenger and Tobias Klenze and Marco Eilers and Felix A. Wolf and Peter M{\"{u}}ller and Martin Clochard and David A. Basin}, title = {Igloo: soundly linking compositional refinement and separation logic for distributed system verification}, journal = {Proc. {ACM} Program. Lang.}, volume = {4}, number = {{OOPSLA}}, pages = {152:1--152:31}, year = {2020}, url = {https://doi.org/10.1145/3428220}, doi = {10.1145/3428220}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmpl/0001KEW0CB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/BasinKZ20, author = {David A. Basin and Felix Klaedtke and Eugen Zalinescu}, title = {Runtime Verification over Out-of-order Streams}, journal = {{ACM} Trans. Comput. Log.}, volume = {21}, number = {1}, pages = {5:1--5:43}, year = {2020}, url = {https://doi.org/10.1145/3355609}, doi = {10.1145/3355609}, timestamp = {Fri, 24 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocl/BasinKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atva/RaszykBT20, author = {Martin Raszyk and David A. Basin and Dmitriy Traytel}, editor = {Dang Van Hung and Oleg Sokolsky}, title = {Multi-head Monitoring of Metric Dynamic Logic}, booktitle = {Automated Technology for Verification and Analysis - 18th International Symposium, {ATVA} 2020, Hanoi, Vietnam, October 19-23, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12302}, pages = {233--250}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59152-6\_13}, doi = {10.1007/978-3-030-59152-6\_13}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atva/RaszykBT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/BasinDHKR0T20, author = {David A. Basin and Thibault Dardinier and Lukas Heimes and Srdan Krstic and Martin Raszyk and Joshua Schneider and Dmitriy Traytel}, editor = {Nicolas Peltier and Viorica Sofronie{-}Stokkermans}, title = {A Formally Verified, Optimized Monitor for Metric First-Order Dynamic Logic}, booktitle = {Automated Reasoning - 10th International Joint Conference, {IJCAR} 2020, Paris, France, July 1-4, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12166}, pages = {432--453}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51074-9\_25}, doi = {10.1007/978-3-030-51074-9\_25}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cade/BasinDHKR0T20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HammannSB20, author = {Sven Hammann and Ralf Sasse and David A. Basin}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Privacy-Preserving OpenID Connect}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {277--289}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384724}, doi = {10.1145/3320269.3384724}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HammannSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BasinRS20, author = {David A. Basin and Sasa Radomirovic and Lara Schmid}, title = {Dispute Resolution in Voting}, booktitle = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston, MA, USA, June 22-26, 2020}, pages = {1--16}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CSF49147.2020.00009}, doi = {10.1109/CSF49147.2020.00009}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BasinRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ChuatAS0BP20, author = {Laurent Chuat and AbdelRahman Abdou and Ralf Sasse and Christoph Sprenger and David A. Basin and Adrian Perrig}, title = {SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {624--638}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00046}, doi = {10.1109/EUROSP48549.2020.00046}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/ChuatAS0BP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/BasinGKS20, author = {David A. Basin and Matthieu Gras and Srdan Krstic and Joshua Schneider}, editor = {Jyotirmoy Deshmukh and Dejan Nickovic}, title = {Scalable Online Monitoring of Distributed Systems}, booktitle = {Runtime Verification - 20th International Conference, {RV} 2020, Los Angeles, CA, USA, October 6-9, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12399}, pages = {197--220}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60508-7\_11}, doi = {10.1007/978-3-030-60508-7\_11}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rv/BasinGKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GirolHSJCB20, author = {Guillaume Girol and Lucca Hirschi and Ralf Sasse and Dennis Jackson and Cas Cremers and David A. Basin}, editor = {Srdjan Capkun and Franziska Roesner}, title = {A Spectral Analysis of Noise: {A} Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1857--1874}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/girol}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/GirolHSJCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-03749, author = {David A. Basin and Sasa Radomirovic and Lara Schmid}, title = {Dispute Resolution in Voting}, journal = {CoRR}, volume = {abs/2005.03749}, year = {2020}, url = {https://arxiv.org/abs/2005.03749}, eprinttype = {arXiv}, eprint = {2005.03749}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-03749.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-12273, author = {Carmela Troncoso and Mathias Payer and Jean{-}Pierre Hubaux and Marcel Salath{\'{e}} and James R. Larus and Edouard Bugnion and Wouter Lueks and Theresa Stadler and Apostolos Pyrgelis and Daniele Antonioli and Ludovic Barman and Sylvain Chatel and Kenneth G. Paterson and Srdjan Capkun and David A. Basin and Jan Beutel and Dennis Jackson and Marc Roeschlin and Patrick Leu and Bart Preneel and Nigel P. Smart and Aysajan Abidin and Seda F. G{\"{u}}rses and Michael Veale and Cas Cremers and Michael Backes and Nils Ole Tippenhauer and Reuben Binns and Ciro Cattuto and Alain Barrat and Dario Fiore and Manuel Barbosa and Rui Oliveira and Jos{\'{e}} Pereira}, title = {Decentralized Privacy-Preserving Proximity Tracing}, journal = {CoRR}, volume = {abs/2005.12273}, year = {2020}, url = {https://arxiv.org/abs/2005.12273}, eprinttype = {arXiv}, eprint = {2005.12273}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-12273.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-08249, author = {David A. Basin and Ralf Sasse and Jorge Toro{-}Pozo}, title = {The {EMV} Standard: Break, Fix, Verify}, journal = {CoRR}, volume = {abs/2006.08249}, year = {2020}, url = {https://arxiv.org/abs/2006.08249}, eprinttype = {arXiv}, eprint = {2006.08249}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-08249.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-10387, author = {Mohammad Torabi Dashti and David A. Basin}, title = {A Theory of Black-Box Tests}, journal = {CoRR}, volume = {abs/2006.10387}, year = {2020}, url = {https://arxiv.org/abs/2006.10387}, eprinttype = {arXiv}, eprint = {2006.10387}, timestamp = {Tue, 23 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-10387.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-04749, author = {Christoph Sprenger and Tobias Klenze and Marco Eilers and Felix A. Wolf and Peter M{\"{u}}ller and Martin Clochard and David A. Basin}, title = {Igloo: Soundly Linking Compositional Refinement and Separation Logic for Distributed System Verification}, journal = {CoRR}, volume = {abs/2010.04749}, year = {2020}, url = {https://arxiv.org/abs/2010.04749}, eprinttype = {arXiv}, eprint = {2010.04749}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-04749.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirschiSB20, author = {Lucca Hirschi and Lara Schmid and David A. Basin}, title = {Fixing the Achilles Heel of E-Voting: The Bulletin Board}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2020}, url = {https://eprint.iacr.org/2020/109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirschiSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/BasinBKT19, author = {David A. Basin and Bhargav Nagaraja Bhatt and Srdan Krstic and Dmitriy Traytel}, title = {Almost event-rate independent monitoring}, journal = {Formal Methods Syst. Des.}, volume = {54}, number = {3}, pages = {449--478}, year = {2019}, url = {https://doi.org/10.1007/s10703-018-00328-3}, doi = {10.1007/S10703-018-00328-3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fmsd/BasinBKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DesfontainesLB19, author = {Damien Desfontaines and Andreas Lochbihler and David A. Basin}, title = {Cardinality Estimators do not Preserve Privacy}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2019}, number = {2}, pages = {26--46}, year = {2019}, url = {https://doi.org/10.2478/popets-2019-0018}, doi = {10.2478/POPETS-2019-0018}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DesfontainesLB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atva/0001BBKT19, author = {Joshua Schneider and David A. Basin and Frederik Brix and Srdan Krstic and Dmitriy Traytel}, editor = {Yu{-}Fang Chen and Chih{-}Hong Cheng and Javier Esparza}, title = {Adaptive Online First-Order Monitoring}, booktitle = {Automated Technology for Verification and Analysis - 17th International Symposium, {ATVA} 2019, Taipei, Taiwan, October 28-31, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11781}, pages = {133--150}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31784-3\_8}, doi = {10.1007/978-3-030-31784-3\_8}, timestamp = {Mon, 03 Jan 2022 17:11:32 +0100}, biburl = {https://dblp.org/rec/conf/atva/0001BBKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atva/RaszykBKT19, author = {Martin Raszyk and David A. Basin and Srdan Krstic and Dmitriy Traytel}, editor = {Yu{-}Fang Chen and Chih{-}Hong Cheng and Javier Esparza}, title = {Multi-head Monitoring of Metric Temporal Logic}, booktitle = {Automated Technology for Verification and Analysis - 17th International Symposium, {ATVA} 2019, Taipei, Taiwan, October 28-31, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11781}, pages = {151--170}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31784-3\_9}, doi = {10.1007/978-3-030-31784-3\_9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atva/RaszykBKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/BasinHS19, author = {David A. Basin and Lucca Hirschi and Ralf Sasse}, editor = {Joshua D. Guttman and Carl E. Landwehr and Jos{\'{e}} Meseguer and Dusko Pavlovic}, title = {Symbolic Analysis of Identity-Based Protocols}, booktitle = {Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows}, series = {Lecture Notes in Computer Science}, volume = {11565}, pages = {112--134}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-19052-1\_9}, doi = {10.1007/978-3-030-19052-1\_9}, timestamp = {Thu, 21 Sep 2023 09:08:34 +0200}, biburl = {https://dblp.org/rec/conf/birthday/BasinHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CotriniCWB19, author = {Carlos Cotrini and Luca Corinzia and Thilo Weghorn and David A. Basin}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {The Next 700 Policy Miners: {A} Universal Method for Building Policy Miners}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {95--112}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354196}, doi = {10.1145/3319535.3354196}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CotriniCWB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HammannRSB19, author = {Sven Hammann and Sasa Radomirovic and Ralf Sasse and David A. Basin}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {User Account Access Graphs}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1405--1422}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354193}, doi = {10.1145/3319535.3354193}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HammannRSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/LochbihlerSBM19, author = {Andreas Lochbihler and S. Reza Sefidgar and David A. Basin and Ueli Maurer}, title = {Formalizing Constructive Cryptography using CryptHOL}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {152--166}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00018}, doi = {10.1109/CSF.2019.00018}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/LochbihlerSBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ArfeltBD19, author = {Emma Arfelt and David A. Basin and S{\o}ren Debois}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Monitoring the {GDPR}}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {681--699}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_33}, doi = {10.1007/978-3-030-29959-0\_33}, timestamp = {Fri, 07 Aug 2020 17:57:31 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ArfeltBD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/GuarnieriBSBS19, author = {Marco Guarnieri and Musard Balliu and Daniel Schoepe and David A. Basin and Andrei Sabelfeld}, title = {Information-Flow Control for Database-Backed Applications}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {79--94}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00016}, doi = {10.1109/EUROSP.2019.00016}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/GuarnieriBSBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/RaszykBT19, author = {Martin Raszyk and David A. Basin and Dmitriy Traytel}, editor = {Christel Baier and Ioannis Chatzigiannakis and Paola Flocchini and Stefano Leonardi}, title = {From Nondeterministic to Multi-Head Deterministic Finite-State Transducers}, booktitle = {46th International Colloquium on Automata, Languages, and Programming, {ICALP} 2019, July 9-12, 2019, Patras, Greece}, series = {LIPIcs}, volume = {132}, pages = {127:1--127:14}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2019}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2019.127}, doi = {10.4230/LIPICS.ICALP.2019.127}, timestamp = {Tue, 27 Dec 2022 09:06:31 +0100}, biburl = {https://dblp.org/rec/conf/icalp/RaszykBT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/0001BKT19, author = {Joshua Schneider and David A. Basin and Srdan Krstic and Dmitriy Traytel}, editor = {Bernd Finkbeiner and Leonardo Mariani}, title = {A Formally Verified Monitor for Metric First-Order Temporal Logic}, booktitle = {Runtime Verification - 19th International Conference, {RV} 2019, Porto, Portugal, October 8-11, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11757}, pages = {310--328}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32079-9\_18}, doi = {10.1007/978-3-030-32079-9\_18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rv/0001BKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-10775, author = {Laurent Chuat and AbdelRahman Abdou and Ralf Sasse and Christoph Sprenger and David A. Basin and Adrian Perrig}, title = {Proxy Certificates: The Missing Link in the Web's Chain of Trust}, journal = {CoRR}, volume = {abs/1906.10775}, year = {2019}, url = {http://arxiv.org/abs/1906.10775}, eprinttype = {arXiv}, eprint = {1906.10775}, timestamp = {Wed, 19 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-10775.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-05994, author = {Carlos Cotrini and Luca Corinzia and Thilo Weghorn and David A. Basin}, title = {The Next 700 Policy Miners: {A} Universal Method for Building Policy Miners}, journal = {CoRR}, volume = {abs/1908.05994}, year = {2019}, url = {http://arxiv.org/abs/1908.05994}, eprinttype = {arXiv}, eprint = {1908.05994}, timestamp = {Mon, 19 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-05994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-11593, author = {David A. Basin and Felix Klaedtke and Eugen Zalinescu}, title = {Runtime Verification over Out-of-order Streams}, journal = {CoRR}, volume = {abs/1909.11593}, year = {2019}, url = {http://arxiv.org/abs/1909.11593}, eprinttype = {arXiv}, eprint = {1909.11593}, timestamp = {Fri, 27 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-11593.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acta/BasinKZ18, author = {David A. Basin and Felix Klaedtke and Eugen Zalinescu}, title = {Algorithms for monitoring real-time properties}, journal = {Acta Informatica}, volume = {55}, number = {4}, pages = {309--338}, year = {2018}, url = {https://doi.org/10.1007/s00236-017-0295-4}, doi = {10.1007/S00236-017-0295-4}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acta/BasinKZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SprengerB18, author = {Christoph Sprenger and David A. Basin}, title = {Refining security protocols}, journal = {J. Comput. Secur.}, volume = {26}, number = {1}, pages = {71--120}, year = {2018}, url = {https://doi.org/10.3233/JCS-16814}, doi = {10.3233/JCS-16814}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SprengerB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BasinCKPSS18, author = {David A. Basin and Cas Cremers and Tiffany Hyun{-}Jin Kim and Adrian Perrig and Ralf Sasse and Pawel Szalachowski}, title = {Design, Analysis, and Implementation of {ARPKI:} An Attack-Resilient Public-Key Infrastructure}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {393--408}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2601610}, doi = {10.1109/TDSC.2016.2601610}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BasinCKPSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atva/BasinBT18, author = {David A. Basin and Bhargav Nagaraja Bhatt and Dmitriy Traytel}, editor = {Shuvendu K. Lahiri and Chao Wang}, title = {Optimal Proofs for Linear Temporal Logic on Lasso Words}, booktitle = {Automated Technology for Verification and Analysis - 16th International Symposium, {ATVA} 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11138}, pages = {37--55}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01090-4\_3}, doi = {10.1007/978-3-030-01090-4\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atva/BasinBT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinDHRSS18, author = {David A. Basin and Jannik Dreier and Lucca Hirschi and Sasa Radomirovic and Ralf Sasse and Vincent Stettler}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {A Formal Analysis of 5G Authentication}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1383--1396}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243846}, doi = {10.1145/3243734.3243846}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BasinDHRSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BasinRS18, author = {David A. Basin and Sasa Radomirovic and Lara Schmid}, title = {Alethea: {A} Provably Secure Random Sample Voting Protocol}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {283--297}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00028}, doi = {10.1109/CSF.2018.00028}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BasinRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/CotriniWB18, author = {Carlos Cotrini and Thilo Weghorn and David A. Basin}, title = {Mining {ABAC} Rules from Sparse Logs}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {31--46}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00011}, doi = {10.1109/EUROSP.2018.00011}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/CotriniWB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BasinDH18, author = {David A. Basin and S{\o}ren Debois and Thomas T. Hildebrandt}, editor = {Sarah Meiklejohn and Kazue Sako}, title = {On Purpose and by Necessity: Compliance Under the {GDPR}}, booktitle = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, pages = {20--37}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58387-6\_2}, doi = {10.1007/978-3-662-58387-6\_2}, timestamp = {Fri, 30 Aug 2019 11:17:01 +0200}, biburl = {https://dblp.org/rec/conf/fc/BasinDH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotnets/KlenzeGPPB18, author = {Tobias Klenze and Giacomo Giuliari and Christos Pappas and Adrian Perrig and David A. Basin}, title = {Networking in Heaven as on Earth}, booktitle = {Proceedings of the 17th {ACM} Workshop on Hot Topics in Networks, HotNets 2018, Redmond, WA, USA, November 15-16, 2018}, pages = {22--28}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3286062.3286066}, doi = {10.1145/3286062.3286066}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotnets/KlenzeGPPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/SchneiderBBKT18, author = {Joshua Schneider and David A. Basin and Frederik Brix and Srdan Krstic and Dmitriy Traytel}, editor = {Christian Colombo and Martin Leucker}, title = {Scalable Online First-Order Monitoring}, booktitle = {Runtime Verification - 18th International Conference, {RV} 2018, Limassol, Cyprus, November 10-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11237}, pages = {353--371}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03769-7\_20}, doi = {10.1007/978-3-030-03769-7\_20}, timestamp = {Sat, 12 Jun 2021 11:01:04 +0200}, biburl = {https://dblp.org/rec/conf/rv/SchneiderBBKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/CostaBBDG18, author = {Gabriele Costa and David A. Basin and Chiara Bodei and Pierpaolo Degano and Letterio Galletta}, editor = {Dirk Beyer and Marieke Huisman}, title = {From Natural Projection to Partial Model Checking and Back}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 24th International Conference, {TACAS} 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10805}, pages = {344--361}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89960-2\_19}, doi = {10.1007/978-3-319-89960-2\_19}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tacas/CostaBBDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/mc/BasinCM18, author = {David A. Basin and Cas Cremers and Catherine Meadows}, editor = {Edmund M. Clarke and Thomas A. Henzinger and Helmut Veith and Roderick Bloem}, title = {Model Checking Security Protocols}, booktitle = {Handbook of Model Checking}, pages = {727--762}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-10575-8\_22}, doi = {10.1007/978-3-319-10575-8\_22}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/mc/BasinCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-10360, author = {David A. Basin and Jannik Dreier and Lucca Hirschi and Sasa Radomirovic and Ralf Sasse and Vincent Stettler}, title = {Formal Analysis of 5G Authentication}, journal = {CoRR}, volume = {abs/1806.10360}, year = {2018}, url = {http://arxiv.org/abs/1806.10360}, eprinttype = {arXiv}, eprint = {1806.10360}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-10360.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-05879, author = {Damien Desfontaines and Andreas Lochbihler and David A. Basin}, title = {Cardinality Estimators do not Preserve Privacy}, journal = {CoRR}, volume = {abs/1808.05879}, year = {2018}, url = {http://arxiv.org/abs/1808.05879}, eprinttype = {arXiv}, eprint = {1808.05879}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-05879.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siglog/BasinCDS17, author = {David A. Basin and Cas Cremers and Jannik Dreier and Ralf Sasse}, title = {Symbolically analyzing security protocols using tamarin}, journal = {{ACM} {SIGLOG} News}, volume = {4}, number = {4}, pages = {19--30}, year = {2017}, url = {https://doi.org/10.1145/3157831.3157835}, doi = {10.1145/3157831.3157835}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siglog/BasinCDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atva/DashtiB17, author = {Mohammad Torabi Dashti and David A. Basin}, editor = {Deepak D'Souza and K. Narayan Kumar}, title = {Tests and Refutation}, booktitle = {Automated Technology for Verification and Analysis - 15th International Symposium, {ATVA} 2017, Pune, India, October 3-6, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10482}, pages = {119--138}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68167-2\_9}, doi = {10.1007/978-3-319-68167-2\_9}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/atva/DashtiB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/MaricSB17, author = {Ognjen Maric and Christoph Sprenger and David A. Basin}, editor = {Rupak Majumdar and Viktor Kuncak}, title = {Cutoff Bounds for Consensus Algorithms}, booktitle = {Computer Aided Verification - 29th International Conference, {CAV} 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10427}, pages = {217--237}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63390-9\_12}, doi = {10.1007/978-3-319-63390-9\_12}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/MaricSB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/BasinKZ17, author = {David A. Basin and Felix Klaedtke and Eugen Zalinescu}, editor = {Rupak Majumdar and Viktor Kuncak}, title = {Runtime Verification of Temporal Properties over Out-of-Order Data Streams}, booktitle = {Computer Aided Verification - 29th International Conference, {CAV} 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10426}, pages = {356--376}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63387-9\_18}, doi = {10.1007/978-3-319-63387-9\_18}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/BasinKZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GuarnieriMB17, author = {Marco Guarnieri and Srdjan Marinovic and David A. Basin}, title = {Securing Databases from Probabilistic Inference}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {343--359}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSF.2017.30}, doi = {10.1109/CSF.2017.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/GuarnieriMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/LallemandBS17, author = {Joseph Lallemand and David A. Basin and Christoph Sprenger}, title = {Refining Authenticated Key Agreement with Strong Adversaries}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {92--107}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.22}, doi = {10.1109/EUROSP.2017.22}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/LallemandBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/GuarnieriTBDB17, author = {Marco Guarnieri and Petar Tsankov and Tristan Buchs and Mohammad Torabi Dashti and David A. Basin}, editor = {Tevfik Bultan and Koushik Sen}, title = {Test execution checkpointing for web applications}, booktitle = {Proceedings of the 26th {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10 - 14, 2017}, pages = {203--214}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092703.3092710}, doi = {10.1145/3092703.3092710}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issta/GuarnieriTBDB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/BasinKZ17, author = {David A. Basin and Felix Klaedtke and Eugen Zalinescu}, editor = {Giles Reger and Klaus Havelund}, title = {The MonPoly Monitoring Tool}, booktitle = {RV-CuBES 2017. An International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools, September 15, 2017, Seattle, WA, {USA}}, series = {Kalpa Publications in Computing}, volume = {3}, pages = {19--28}, publisher = {EasyChair}, year = {2017}, url = {https://doi.org/10.29007/89hs}, doi = {10.29007/89HS}, timestamp = {Sun, 15 Aug 2021 10:46:48 +0200}, biburl = {https://dblp.org/rec/conf/rv/BasinKZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/BasinKT17a, author = {David A. Basin and Srdjan Krstic and Dmitriy Traytel}, editor = {Giles Reger and Klaus Havelund}, title = {{AERIAL:} Almost Event-Rate Independent Algorithms for Monitoring Metric Regular Properties}, booktitle = {RV-CuBES 2017. An International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools, September 15, 2017, Seattle, WA, {USA}}, series = {Kalpa Publications in Computing}, volume = {3}, pages = {29--36}, publisher = {EasyChair}, year = {2017}, url = {https://doi.org/10.29007/bm4c}, doi = {10.29007/BM4C}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rv/BasinKT17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/BasinKT17, author = {David A. Basin and Srdan Krstic and Dmitriy Traytel}, editor = {Shuvendu K. Lahiri and Giles Reger}, title = {Almost Event-Rate Independent Monitoring of Metric Dynamic Logic}, booktitle = {Runtime Verification - 17th International Conference, {RV} 2017, Seattle, WA, USA, September 13-16, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10548}, pages = {85--102}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67531-2\_6}, doi = {10.1007/978-3-319-67531-2\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rv/BasinKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/BasinBT17, author = {David A. Basin and Bhargav Nagaraja Bhatt and Dmitriy Traytel}, editor = {Axel Legay and Tiziana Margaria}, title = {Almost Event-Rate Independent Monitoring of Metric Temporal Logic}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 23rd International Conference, {TACAS} 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10206}, pages = {94--112}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54580-5\_6}, doi = {10.1007/978-3-662-54580-5\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/tacas/BasinBT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/BasinGMST17, author = {David A. Basin and Hans Gersbach and Akaki Mamageishvili and Lara Schmid and Oriol Tejada}, editor = {Robert Krimmer and Melanie Volkamer and Nadja Braun Binder and Norbert Kersting and Olivier Pereira and Carsten Sch{\"{u}}rmann}, title = {Election Security and Economics: It's All About Eve}, booktitle = {Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10615}, pages = {1--20}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68687-5\_1}, doi = {10.1007/978-3-319-68687-5\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/BasinGMST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GuarnieriMB17, author = {Marco Guarnieri and Srdjan Marinovic and David A. Basin}, title = {Securing Databases from Probabilistic Inference}, journal = {CoRR}, volume = {abs/1706.02473}, year = {2017}, url = {http://arxiv.org/abs/1706.02473}, eprinttype = {arXiv}, eprint = {1706.02473}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GuarnieriMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BasinKZ17, author = {David A. Basin and Felix Klaedtke and Eugen Zalinescu}, title = {Runtime Verification of Temporal Properties over Out-of-order Data Streams}, journal = {CoRR}, volume = {abs/1707.05555}, year = {2017}, url = {http://arxiv.org/abs/1707.05555}, eprinttype = {arXiv}, eprint = {1707.05555}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BasinKZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BasinLS17, author = {David A. Basin and Andreas Lochbihler and S. Reza Sefidgar}, title = {CryptHOL: Game-based Proofs in Higher-order Logic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {753}, year = {2017}, url = {http://eprint.iacr.org/2017/753}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BasinLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/BasinCEHKM16, author = {David A. Basin and Germano Caronni and Sarah Ereth and Mat{\'{u}}s Harvan and Felix Klaedtke and Heiko Mantel}, title = {Scalable offline monitoring of temporal specifications}, journal = {Formal Methods Syst. Des.}, volume = {49}, number = {1-2}, pages = {75--108}, year = {2016}, url = {https://doi.org/10.1007/s10703-016-0242-y}, doi = {10.1007/S10703-016-0242-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fmsd/BasinCEHKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/FurstHBSM16, author = {Andreas F{\"{u}}rst and Thai Son Hoang and David A. Basin and Naoto Sato and Kunihiko Miyazaki}, title = {Large-scale system development using Abstract Data Types and refinement}, journal = {Sci. Comput. Program.}, volume = {131}, pages = {59--75}, year = {2016}, url = {https://doi.org/10.1016/j.scico.2016.04.010}, doi = {10.1016/J.SCICO.2016.04.010}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/FurstHBSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BasinDH16, author = {David A. Basin and S{\o}ren Debois and Thomas T. Hildebrandt}, title = {In the Nick of Time: Proactive Prevention of Obligation Violations}, booktitle = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon, Portugal, June 27 - July 1, 2016}, pages = {120--134}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSF.2016.16}, doi = {10.1109/CSF.2016.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BasinDH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BasinRS16, author = {David A. Basin and Sasa Radomirovic and Lara Schmid}, title = {Modeling Human Errors in Security Protocols}, booktitle = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon, Portugal, June 27 - July 1, 2016}, pages = {325--340}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSF.2016.30}, doi = {10.1109/CSF.2016.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BasinRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/TsankovDB16, author = {Petar Tsankov and Mohammad Torabi Dashti and David A. Basin}, title = {Access Control Synthesis for Physical Spaces}, booktitle = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon, Portugal, June 27 - July 1, 2016}, pages = {443--457}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSF.2016.38}, doi = {10.1109/CSF.2016.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/TsankovDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/DashtiB16, author = {Mohammad Torabi Dashti and David A. Basin}, editor = {Juan Caballero and Eric Bodden and Elias Athanasopoulos}, title = {Security Testing Beyond Functional Tests}, booktitle = {Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9639}, pages = {1--19}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-30806-7\_1}, doi = {10.1007/978-3-319-30806-7\_1}, timestamp = {Tue, 01 Jun 2021 15:22:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/DashtiB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/GuarnieriMB16, author = {Marco Guarnieri and Srdjan Marinovic and David A. Basin}, title = {Strong and Provably Secure Database Access Control}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {163--178}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuroSP.2016.23}, doi = {10.1109/EUROSP.2016.23}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/GuarnieriMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TsankovDB16, author = {Petar Tsankov and Mohammad Torabi Dashti and David A. Basin}, title = {Access Control Synthesis for Physical Spaces}, journal = {CoRR}, volume = {abs/1605.01769}, year = {2016}, url = {http://arxiv.org/abs/1605.01769}, eprinttype = {arXiv}, eprint = {1605.01769}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/TsankovDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/YuSBC16, author = {Der{-}Yeuan Yu and Elizabeth Stobert and David A. Basin and Srdjan Capkun}, title = {Exploring Website Location as a Security Indicator}, journal = {CoRR}, volume = {abs/1610.03647}, year = {2016}, url = {http://arxiv.org/abs/1610.03647}, eprinttype = {arXiv}, eprint = {1610.03647}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/YuSBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/BasinKMZ15, author = {David A. Basin and Felix Klaedtke and Srdjan Marinovic and Eugen Zalinescu}, title = {Monitoring of temporal first-order properties with aggregations}, journal = {Formal Methods Syst. Des.}, volume = {46}, number = {3}, pages = {262--285}, year = {2015}, url = {https://doi.org/10.1007/s10703-015-0222-7}, doi = {10.1007/S10703-015-0222-7}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fmsd/BasinKMZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BasinCMRW15, author = {David A. Basin and Cas Cremers and Kunihiko Miyazaki and Sasa Radomirovic and Dai Watanabe}, title = {Improving the Security of Cryptographic Protocol Standards}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {3}, pages = {24--31}, year = {2015}, url = {https://doi.org/10.1109/MSP.2013.162}, doi = {10.1109/MSP.2013.162}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BasinCMRW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BasinKZ15, author = {David A. Basin and Felix Klaedtke and Eugen Zalinescu}, title = {Greedily computing associative aggregations on sliding windows}, journal = {Inf. Process. Lett.}, volume = {115}, number = {2}, pages = {186--192}, year = {2015}, url = {https://doi.org/10.1016/j.ipl.2014.09.009}, doi = {10.1016/J.IPL.2014.09.009}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BasinKZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/BasinKMZ15, author = {David A. Basin and Felix Klaedtke and Samuel M{\"{u}}ller and Eugen Zalinescu}, title = {Monitoring Metric First-Order Temporal Properties}, journal = {J. {ACM}}, volume = {62}, number = {2}, pages = {15:1--15:45}, year = {2015}, url = {https://doi.org/10.1145/2699444}, doi = {10.1145/2699444}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/BasinKMZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/BasinKRS15, author = {David A. Basin and Michel Keller and Sasa Radomirovic and Ralf Sasse}, editor = {Narciso Mart{\'{\i}}{-}Oliet and Peter Csaba {\"{O}}lveczky and Carolyn L. Talcott}, title = {Alice and Bob Meet Equational Theories}, booktitle = {Logic, Rewriting, and Concurrency - Essays dedicated to Jos{\'{e}} Meseguer on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9200}, pages = {160--180}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23165-5\_7}, doi = {10.1007/978-3-319-23165-5\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/BasinKRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinDS15, author = {David A. Basin and Jannik Dreier and Ralf Sasse}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Automated Symbolic Proofs of Observational Equivalence}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1144--1155}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813662}, doi = {10.1145/2810103.2813662}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BasinDS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JimenezWBC15, author = {Carlos Cotrini Jim{\'{e}}nez and Thilo Weghorn and David A. Basin and Manuel Clavel}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {Analyzing First-Order Role Based Access Control}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {3--17}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.8}, doi = {10.1109/CSF.2015.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/JimenezWBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BasinRS15, author = {David A. Basin and Sasa Radomirovic and Michael Schl{\"{a}}pfer}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {A Complete Characterization of Secure Human-Server Communication}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {199--213}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.21}, doi = {10.1109/CSF.2015.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BasinRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/MaricSB15, author = {Ognjen Maric and Christoph Sprenger and David A. Basin}, title = {Consensus Refined}, booktitle = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015}, pages = {391--402}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/DSN.2015.38}, doi = {10.1109/DSN.2015.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/MaricSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/BasinKZ15, author = {David A. Basin and Felix Klaedtke and Eugen Zalinescu}, editor = {Prahladh Harsha and G. Ramalingam}, title = {Failure-aware Runtime Verification of Distributed Systems}, booktitle = {35th {IARCS} Annual Conference on Foundation of Software Technology and Theoretical Computer Science, {FSTTCS} 2015, December 16-18, 2015, Bangalore, India}, series = {LIPIcs}, volume = {45}, pages = {590--603}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2015}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2015.590}, doi = {10.4230/LIPICS.FSTTCS.2015.590}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/fsttcs/BasinKZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/time/MareticDB15, author = {Grgur Petric Maretic and Muhammad Torabi Dashti and David A. Basin}, editor = {Fabio Grandi and Martin Lange and Alessio Lomuscio}, title = {Semantic Vacuity}, booktitle = {22nd International Symposium on Temporal Representation and Reasoning, {TIME} 2015, Kassel, Germany, September 23-25, 2015}, pages = {111--120}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/TIME.2015.14}, doi = {10.1109/TIME.2015.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/time/MareticDB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GuarnieriMB15, author = {Marco Guarnieri and Srdjan Marinovic and David A. Basin}, title = {Strong and Provably Secure Database Access Control}, journal = {CoRR}, volume = {abs/1512.01479}, year = {2015}, url = {http://arxiv.org/abs/1512.01479}, eprinttype = {arXiv}, eprint = {1512.01479}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GuarnieriMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ReardonBC14, author = {Joel Reardon and David A. Basin and Srdjan Capkun}, title = {On Secure Data Deletion}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {37--44}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.159}, doi = {10.1109/MSP.2013.159}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ReardonBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/MareticDB14, author = {Grgur Petric Maretic and Mohammad Torabi Dashti and David A. Basin}, title = {{LTL} is closed under topological closure}, journal = {Inf. Process. Lett.}, volume = {114}, number = {8}, pages = {408--413}, year = {2014}, url = {https://doi.org/10.1016/j.ipl.2014.03.001}, doi = {10.1016/J.IPL.2014.03.001}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/MareticDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BasinJKZ14, author = {David A. Basin and Carlos Cotrini Jim{\'{e}}nez and Felix Klaedtke and Eugen Zalinescu}, title = {Deciding safety and liveness in {TPTL}}, journal = {Inf. Process. Lett.}, volume = {114}, number = {12}, pages = {680--688}, year = {2014}, url = {https://doi.org/10.1016/j.ipl.2014.06.005}, doi = {10.1016/J.IPL.2014.06.005}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BasinJKZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BasinBK14, author = {David A. Basin and Samuel J. Burri and G{\"{u}}nter Karjoth}, title = {Obstruction-free authorization enforcement: Aligning security and business objectives}, journal = {J. Comput. Secur.}, volume = {22}, number = {5}, pages = {661--698}, year = {2014}, url = {https://doi.org/10.3233/JCS-140500}, doi = {10.3233/JCS-140500}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BasinBK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/GuarnieriB14, author = {Marco Guarnieri and David A. Basin}, title = {Optimal Security-Aware Query Processing}, journal = {Proc. {VLDB} Endow.}, volume = {7}, number = {12}, pages = {1307--1318}, year = {2014}, url = {http://www.vldb.org/pvldb/vol7/p1307-guarnieri.pdf}, doi = {10.14778/2732977.2733003}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/GuarnieriB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BasinC14, author = {David A. Basin and Cas Cremers}, title = {Know Your Enemy: Compromising Adversaries in Protocol Analysis}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {2}, pages = {7:1--7:31}, year = {2014}, url = {https://doi.org/10.1145/2658996}, doi = {10.1145/2658996}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BasinC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/BasinCEDD14, author = {David A. Basin and Manuel Clavel and Marina Egea and Miguel Angel Garc{\'{\i}}a de Dios and Carolina Dania}, title = {A Model-Driven Methodology for Developing Secure Data-Management Applications}, journal = {{IEEE} Trans. Software Eng.}, volume = {40}, number = {4}, pages = {324--337}, year = {2014}, url = {https://doi.org/10.1109/TSE.2013.2297116}, doi = {10.1109/TSE.2013.2297116}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/BasinCEDD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asm/FurstHBSM14, author = {Andreas F{\"{u}}rst and Thai Son Hoang and David A. Basin and Naoto Sato and Kunihiko Miyazaki}, editor = {Yamine A{\"{\i}}t Ameur and Klaus{-}Dieter Schewe}, title = {Formal System Modelling Using Abstract Data Types in Event-B}, booktitle = {Abstract State Machines, Alloy, B, TLA, VDM, and {Z} - 4th International Conference, {ABZ} 2014, Toulouse, France, June 2-6, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8477}, pages = {222--237}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43652-3\_20}, doi = {10.1007/978-3-662-43652-3\_20}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/asm/FurstHBSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinCKPSS14, author = {David A. Basin and Cas Cremers and Tiffany Hyun{-}Jin Kim and Adrian Perrig and Ralf Sasse and Pawel Szalachowski}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{ARPKI:} Attack Resilient Public-Key Infrastructure}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {382--393}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660298}, doi = {10.1145/2660267.2660298}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BasinCKPSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TsankovMDB14, author = {Petar Tsankov and Srdjan Marinovic and Mohammad Torabi Dashti and David A. Basin}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Fail-Secure Access Control}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1157--1168}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660307}, doi = {10.1145/2660267.2660307}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TsankovMDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BasinCH14, author = {David A. Basin and Cas Cremers and Marko Horvat}, title = {Actor Key Compromise: Consequences and Countermeasures}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {244--258}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.25}, doi = {10.1109/CSF.2014.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BasinCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/MareticDB14, author = {Grgur Petric Maretic and Mohammad Torabi Dashti and David A. Basin}, editor = {Thomas A. Henzinger and Dale Miller}, title = {Anchored {LTL} separation}, booktitle = {Joint Meeting of the Twenty-Third {EACSL} Annual Conference on Computer Science Logic {(CSL)} and the Twenty-Ninth Annual {ACM/IEEE} Symposium on Logic in Computer Science (LICS), {CSL-LICS} '14, Vienna, Austria, July 14 - 18, 2014}, pages = {74:1--74:9}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2603088.2603139}, doi = {10.1145/2603088.2603139}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csl/MareticDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/FurstHBDSM14, author = {Andreas F{\"{u}}rst and Thai Son Hoang and David A. Basin and Krishnaji Desai and Naoto Sato and Kunihiko Miyazaki}, editor = {Elvira Albert and Emil Sekerinski}, title = {Code Generation for Event-B}, booktitle = {Integrated Formal Methods - 11th International Conference, {IFM} 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8739}, pages = {323--338}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10181-1\_20}, doi = {10.1007/978-3-319-10181-1\_20}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifm/FurstHBDSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/TsankovMDB14, author = {Petar Tsankov and Srdjan Marinovic and Mohammad Torabi Dashti and David A. Basin}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Decentralized Composite Access Control}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {245--264}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_14}, doi = {10.1007/978-3-642-54792-8\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/TsankovMDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/BasinCEHKM14, author = {David A. Basin and Germano Caronni and Sarah Ereth and Mat{\'{u}}s Harvan and Felix Klaedtke and Heiko Mantel}, editor = {Borzoo Bonakdarpour and Scott A. Smolka}, title = {Scalable Offline Monitoring}, booktitle = {Runtime Verification - 5th International Conference, {RV} 2014, Toronto, ON, Canada, September 22-25, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8734}, pages = {31--47}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11164-3\_4}, doi = {10.1007/978-3-319-11164-3\_4}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/rv/BasinCEHKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/BasinKMZ14, author = {David A. Basin and Felix Klaedtke and Srdjan Marinovic and Eugen Zalinescu}, editor = {Borzoo Bonakdarpour and Scott A. Smolka}, title = {On Real-Time Monitoring with Imprecise Timestamps}, booktitle = {Runtime Verification - 5th International Conference, {RV} 2014, Toronto, ON, Canada, September 22-25, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8734}, pages = {193--198}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11164-3\_16}, doi = {10.1007/978-3-319-11164-3\_16}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rv/BasinKMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SchmidtSCB14, author = {Benedikt Schmidt and Ralf Sasse and Cas Cremers and David A. Basin}, title = {Automated Verification of Group Key Agreement Protocols}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {179--194}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.19}, doi = {10.1109/SP.2014.19}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/SchmidtSCB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/YuRLCB14, author = {Der{-}Yeuan Yu and Aanjhan Ranganathan and Thomas Locher and Srdjan Capkun and David A. Basin}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Short paper: detection of {GPS} spoofing attacks in power grids}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {99--104}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627398}, doi = {10.1145/2627393.2627398}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/YuRLCB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/DiosDBC14, author = {Miguel Angel Garc{\'{\i}}a de Dios and Carolina Dania and David A. Basin and Manuel Clavel}, editor = {Maritta Heisel and Wouter Joosen and Javier L{\'{o}}pez and Fabio Martinelli}, title = {Model-Driven Development of a Secure eHealth Application}, booktitle = {Engineering Secure Future Internet Services and Systems - Current Research}, series = {Lecture Notes in Computer Science}, volume = {8431}, pages = {97--118}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07452-8\_4}, doi = {10.1007/978-3-319-07452-8\_4}, timestamp = {Thu, 29 Aug 2019 08:09:56 +0200}, biburl = {https://dblp.org/rec/series/lncs/DiosDBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MeierCB13, author = {Simon Meier and Cas Cremers and David A. Basin}, title = {Efficient construction of machine-checked symbolic protocol security proofs}, journal = {J. Comput. Secur.}, volume = {21}, number = {1}, pages = {41--87}, year = {2013}, url = {https://doi.org/10.3233/JCS-2012-0455}, doi = {10.3233/JCS-2012-0455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MeierCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BasinCM13, author = {David A. Basin and Cas Cremers and Simon Meier}, title = {Provably repairing the {ISO/IEC} 9798 standard for entity authentication}, journal = {J. Comput. Secur.}, volume = {21}, number = {6}, pages = {817--846}, year = {2013}, url = {https://doi.org/10.3233/JCS-130472}, doi = {10.3233/JCS-130472}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BasinCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/FrankBB13, author = {Mario Frank and Joachim M. Buhmann and David A. Basin}, title = {Role Mining with Probabilistic Models}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {4}, pages = {15:1--15:28}, year = {2013}, url = {https://doi.org/10.1145/2445566.2445567}, doi = {10.1145/2445566.2445567}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/FrankBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BasinJKZ13, author = {David A. Basin and Vincent Jug{\'{e}} and Felix Klaedtke and Eugen Zalinescu}, title = {Enforceable Security Policies Revisited}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {1}, pages = {3}, year = {2013}, url = {https://doi.org/10.1145/2487222.2487225}, doi = {10.1145/2487222.2487225}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BasinJKZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/FischerBEE13, author = {Daniel Fischer and David A. Basin and Knut Eckstein and Thomas Engel}, title = {Predictable Mobile Routing for Spacecraft Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {12}, number = {6}, pages = {1174--1187}, year = {2013}, url = {https://doi.org/10.1109/TMC.2012.93}, doi = {10.1109/TMC.2012.93}, timestamp = {Sun, 26 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/FischerBEE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/BasinHKZ13, author = {David A. Basin and Mat{\'{u}}s Harvan and Felix Klaedtke and Eugen Zalinescu}, title = {Monitoring Data Usage in Distributed Systems}, journal = {{IEEE} Trans. Software Eng.}, volume = {39}, number = {10}, pages = {1403--1426}, year = {2013}, url = {https://doi.org/10.1109/TSE.2013.18}, doi = {10.1109/TSE.2013.18}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/BasinHKZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/MeierSCB13, author = {Simon Meier and Benedikt Schmidt and Cas Cremers and David A. Basin}, editor = {Natasha Sharygina and Helmut Veith}, title = {The {TAMARIN} Prover for the Symbolic Analysis of Security Protocols}, booktitle = {Computer Aided Verification - 25th International Conference, {CAV} 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8044}, pages = {696--701}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39799-8\_48}, doi = {10.1007/978-3-642-39799-8\_48}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/MeierSCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ReardonRBC13, author = {Joel Reardon and Hubert Ritzdorf and David A. Basin and Srdjan Capkun}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Secure data deletion from persistent media}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {271--284}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516699}, doi = {10.1145/2508859.2516699}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ReardonRBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ConchinhaBC13, author = {Bruno Conchinha and David A. Basin and Carlos Caleiro}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Symbolic Probabilistic Analysis of Off-Line Guessing}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {363--380}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_21}, doi = {10.1007/978-3-642-40203-6\_21}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ConchinhaBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/TsankovDB13, author = {Petar Tsankov and Mohammad Torabi Dashti and David A. Basin}, editor = {Mauro Pezz{\`{e}} and Mark Harman}, title = {Semi-valid input coverage for fuzz testing}, booktitle = {International Symposium on Software Testing and Analysis, {ISSTA} '13, Lugano, Switzerland, July 15-20, 2013}, pages = {56--66}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2483760.2483787}, doi = {10.1145/2483760.2483787}, timestamp = {Sun, 02 Oct 2022 16:10:12 +0200}, biburl = {https://dblp.org/rec/conf/issta/TsankovDB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/BasinKMZ13, author = {David A. Basin and Felix Klaedtke and Srdjan Marinovic and Eugen Zalinescu}, editor = {Axel Legay and Saddek Bensalem}, title = {Monitoring of Temporal First-Order Properties with Aggregations}, booktitle = {Runtime Verification - 4th International Conference, {RV} 2013, Rennes, France, September 24-27, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8174}, pages = {40--58}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40787-1\_3}, doi = {10.1007/978-3-642-40787-1\_3}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/rv/BasinKMZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ReardonBC13, author = {Joel Reardon and David A. Basin and Srdjan Capkun}, title = {SoK: Secure Data Deletion}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {301--315}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.28}, doi = {10.1109/SP.2013.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ReardonBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/BasinH13, author = {David A. Basin and Thai Son Hoang}, editor = {Alexander B. Romanovsky and Martyn Thomas}, title = {Technology Transfer}, booktitle = {Industrial Deployment of System Engineering Methods}, pages = {187--196}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-33170-1\_13}, doi = {10.1007/978-3-642-33170-1\_13}, timestamp = {Mon, 05 Feb 2024 20:35:54 +0100}, biburl = {https://dblp.org/rec/books/daglib/p/BasinH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/post/2013, editor = {David A. Basin and John C. Mitchell}, title = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1}, doi = {10.1007/978-3-642-36830-1}, isbn = {978-3-642-36829-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BasinC12, author = {David A. Basin and Srdjan Capkun}, title = {The research value of publishing attacks}, journal = {Commun. {ACM}}, volume = {55}, number = {11}, pages = {22--24}, year = {2012}, url = {https://doi.org/10.1145/2366316.2366324}, doi = {10.1145/2366316.2366324}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BasinC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmlr/FrankSBB12, author = {Mario Frank and Andreas P. Streich and David A. Basin and Joachim M. Buhmann}, title = {Multi-Assignment Clustering for Boolean Data}, journal = {J. Mach. Learn. Res.}, volume = {13}, pages = {459--489}, year = {2012}, url = {https://dl.acm.org/doi/10.5555/2503308.2188400}, doi = {10.5555/2503308.2188400}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmlr/FrankSBB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BasinBK12, author = {David A. Basin and Samuel J. Burri and G{\"{u}}nter Karjoth}, title = {Dynamic enforcement of abstract separation of duty constraints}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {3}, pages = {13:1--13:30}, year = {2012}, url = {https://doi.org/10.1145/2382448.2382451}, doi = {10.1145/2382448.2382451}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BasinBK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ReardonMCB12, author = {Joel Reardon and Claudio Marforio and Srdjan Capkun and David A. Basin}, editor = {Heung Youl Youm and Yoojae Won}, title = {User-level secure deletion on log-structured file systems}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {63--64}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414493}, doi = {10.1145/2414456.2414493}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ReardonMCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SchmidtMCB12, author = {Benedikt Schmidt and Simon Meier and Cas Cremers and David A. Basin}, editor = {Stephen Chong}, title = {Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties}, booktitle = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge, MA, USA, June 25-27, 2012}, pages = {78--94}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CSF.2012.25}, doi = {10.1109/CSF.2012.25}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/SchmidtMCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SprengerB12, author = {Christoph Sprenger and David A. Basin}, editor = {Stephen Chong}, title = {Refining Key Establishment}, booktitle = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge, MA, USA, June 25-27, 2012}, pages = {230--246}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CSF.2012.21}, doi = {10.1109/CSF.2012.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/SprengerB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/TsankovDB12, author = {Petar Tsankov and Mohammad Torabi Dashti and David A. Basin}, editor = {Daniel Hoffman and John Hughes and Dianxiang Xu}, title = {{SECFUZZ:} Fuzz-testing security protocols}, booktitle = {7th International Workshop on Automation of Software Test, {AST} 2012, Zurich, Switzerland, June 2-3, 2012}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IWAST.2012.6228985}, doi = {10.1109/IWAST.2012.6228985}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/TsankovDB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BasinCM12, author = {David A. Basin and Cas Cremers and Simon Meier}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Provably Repairing the {ISO/IEC} 9798 Standard for Entity Authentication}, booktitle = {Principles of Security and Trust - First International Conference, {POST} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7215}, pages = {129--148}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28641-4\_8}, doi = {10.1007/978-3-642-28641-4\_8}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/BasinCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BasinJKZ12, author = {David A. Basin and Vincent Jug{\'{e}} and Felix Klaedtke and Eugen Zalinescu}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Enforceable Security Policies Revisited}, booktitle = {Principles of Security and Trust - First International Conference, {POST} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7215}, pages = {309--328}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28641-4\_17}, doi = {10.1007/978-3-642-28641-4\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/BasinJKZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/BasinKMZ12, author = {David A. Basin and Felix Klaedtke and Srdjan Marinovic and Eugen Zalinescu}, editor = {Shaz Qadeer and Serdar Tasiran}, title = {Monitoring Compliance Policies over Incomplete and Disagreeing Logs}, booktitle = {Runtime Verification, Third International Conference, {RV} 2012, Istanbul, Turkey, September 25-28, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7687}, pages = {151--167}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35632-2\_17}, doi = {10.1007/978-3-642-35632-2\_17}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/rv/BasinKMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BasinBK12, author = {David A. Basin and Samuel J. Burri and G{\"{u}}nter Karjoth}, editor = {Vijay Atluri and Jaideep Vaidya and Axel Kern and Murat Kantarcioglu}, title = {Optimal workflow-aware authorizations}, booktitle = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '12, Newark, NJ, {USA} - June 20 - 22, 2012}, pages = {93--102}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2295136.2295154}, doi = {10.1145/2295136.2295154}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BasinBK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ReardonCB12, author = {Joel Reardon and Srdjan Capkun and David A. Basin}, editor = {Tadayoshi Kohno}, title = {Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {333--348}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/reardon}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ReardonCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-7283, author = {David A. Basin and Andreas F{\"{u}}rst and Thai Son Hoang and Kunihiko Miyazaki and Naoto Sato}, title = {Abstract Data Types in Event-B - An Application of Generic Instantiation}, journal = {CoRR}, volume = {abs/1210.7283}, year = {2012}, url = {http://arxiv.org/abs/1210.7283}, eprinttype = {arXiv}, eprint = {1210.7283}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-7283.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1212-4775, author = {Mario Frank and Joachim M. Buhmann and David A. Basin}, title = {Role Mining with Probabilistic Models}, journal = {CoRR}, volume = {abs/1212.4775}, year = {2012}, url = {http://arxiv.org/abs/1212.4775}, eprinttype = {arXiv}, eprint = {1212.4775}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1212-4775.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0028269, author = {David A. Basin and Patrick Schaller and Michael Schl{\"{a}}pfer}, title = {Applied Information Security - a Hands-on Approach}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24474-2}, doi = {10.1007/978-3-642-24474-2}, isbn = {978-3-642-24473-5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0028269.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KopfB11, author = {Boris K{\"{o}}pf and David A. Basin}, title = {Automatically deriving information-theoretic bounds for adaptive side-channel attacks}, journal = {J. Comput. Secur.}, volume = {19}, number = {1}, pages = {1--31}, year = {2011}, url = {https://doi.org/10.3233/JCS-2009-0397}, doi = {10.3233/JCS-2009-0397}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KopfB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BasinCRV11, author = {David A. Basin and Carlos Caleiro and Jaime Ramos and Luca Vigan{\`{o}}}, title = {Distributed temporal logic for the analysis of security protocol models}, journal = {Theor. Comput. Sci.}, volume = {412}, number = {31}, pages = {4007--4043}, year = {2011}, url = {https://doi.org/10.1016/j.tcs.2011.04.006}, doi = {10.1016/J.TCS.2011.04.006}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BasinCRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BasinCSS11, author = {David A. Basin and Srdjan Capkun and Patrick Schaller and Benedikt Schmidt}, title = {Formal Reasoning about Physical Properties of Security Protocols}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {2}, pages = {16:1--16:28}, year = {2011}, url = {https://doi.org/10.1145/2019599.2019601}, doi = {10.1145/2019599.2019601}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BasinCSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinBK11, author = {David A. Basin and Samuel J. Burri and G{\"{u}}nter Karjoth}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Separation of duties as a service}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {423--429}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966972}, doi = {10.1145/1966913.1966972}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BasinBK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BasinBK11, author = {David A. Basin and Samuel J. Burri and G{\"{u}}nter Karjoth}, title = {Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives}, booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, pages = {99--113}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSF.2011.14}, doi = {10.1109/CSF.2011.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BasinBK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/BasinCEDDOV10, author = {David A. Basin and Manuel Clavel and Marina Egea and Miguel Angel Garc{\'{\i}}a de Dios and Carolina Dania and Gonzalo Ortiz and Javier Valdazo}, editor = {Alessandro Aldini and Roberto Gorrieri}, title = {Model-Driven Development of Security-Aware GUIs for Data-Centric Applications}, booktitle = {Foundations of Security Analysis and Design {VI} - {FOSAD} Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {6858}, pages = {101--124}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23082-0\_4}, doi = {10.1007/978-3-642-23082-0\_4}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/fosad/BasinCEDDOV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/opodis/TsankovTB11, author = {Petar Tsankov and Mohammad Torabi Dashti and David A. Basin}, editor = {Antonio Fern{\'{a}}ndez Anta and Giuseppe Lipari and Matthieu Roy}, title = {Constructing Mid-Points for Two-Party Asynchronous Protocols}, booktitle = {Principles of Distributed Systems - 15th International Conference, {OPODIS} 2011, Toulouse, France, December 13-16, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7109}, pages = {481--496}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25873-2\_33}, doi = {10.1007/978-3-642-25873-2\_33}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/opodis/TsankovTB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/ConchinhaBC11, author = {Bruno Conchinha and David A. Basin and Carlos Caleiro}, editor = {Manfred Schmidt{-}Schau{\ss}}, title = {{FAST:} An Efficient Decision Procedure for Deduction and Static Equivalence}, booktitle = {Proceedings of the 22nd International Conference on Rewriting Techniques and Applications, {RTA} 2011, May 30 - June 1, 2011, Novi Sad, Serbia}, series = {LIPIcs}, volume = {10}, pages = {11--20}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2011}, url = {https://doi.org/10.4230/LIPIcs.RTA.2011.11}, doi = {10.4230/LIPICS.RTA.2011.11}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/rta/ConchinhaBC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/BasinKZ11, author = {David A. Basin and Felix Klaedtke and Eugen Zalinescu}, editor = {Sarfraz Khurshid and Koushik Sen}, title = {Algorithms for Monitoring Real-Time Properties}, booktitle = {Runtime Verification - Second International Conference, {RV} 2011, San Francisco, CA, USA, September 27-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7186}, pages = {260--275}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29860-8\_20}, doi = {10.1007/978-3-642-29860-8\_20}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/rv/BasinKZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/BasinHKZ11, author = {David A. Basin and Mat{\'{u}}s Harvan and Felix Klaedtke and Eugen Zalinescu}, editor = {Sarfraz Khurshid and Koushik Sen}, title = {{MONPOLY:} Monitoring Usage-Control Policies}, booktitle = {Runtime Verification - Second International Conference, {RV} 2011, San Francisco, CA, USA, September 27-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7186}, pages = {360--364}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29860-8\_27}, doi = {10.1007/978-3-642-29860-8\_27}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rv/BasinHKZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BasinCE11, author = {David A. Basin and Manuel Clavel and Marina Egea}, editor = {Ruth Breu and Jason Crampton and Jorge Lobo}, title = {A decade of model-driven security}, booktitle = {16th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings}, pages = {1--10}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998441.1998443}, doi = {10.1145/1998441.1998443}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BasinCE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/time/BasinHKZ11, author = {David A. Basin and Mat{\'{u}}s Harvan and Felix Klaedtke and Eugen Zalinescu}, editor = {Carlo Combi and Martin Leucker and Frank Wolter}, title = {Monitoring Usage-Control Policies in Distributed Systems}, booktitle = {Eighteenth International Symposium on Temporal Representation and Reasoning, {TIME} 2011, L{\"{u}}beck , Germany, September 12-14, 2011}, pages = {88--95}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/TIME.2011.14}, doi = {10.1109/TIME.2011.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/time/BasinHKZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1106-0917, author = {Joel Reardon and Claudio Marforio and Srdjan Capkun and David A. Basin}, title = {Secure Deletion on Log-structured File Systems}, journal = {CoRR}, volume = {abs/1106.0917}, year = {2011}, url = {http://arxiv.org/abs/1106.0917}, eprinttype = {arXiv}, eprint = {1106.0917}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1106-0917.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ModersheimVB10, author = {Sebastian M{\"{o}}dersheim and Luca Vigan{\`{o}} and David A. Basin}, title = {Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols}, journal = {J. Comput. Secur.}, volume = {18}, number = {4}, pages = {575--618}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-0351}, doi = {10.3233/JCS-2009-0351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ModersheimVB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/WahlerBBK10, author = {Michael Wahler and David A. Basin and Achim D. Brucker and Jana Koehler}, title = {Efficient analysis of pattern-based constraint specifications}, journal = {Softw. Syst. Model.}, volume = {9}, number = {2}, pages = {225--255}, year = {2010}, url = {https://doi.org/10.1007/s10270-009-0123-6}, doi = {10.1007/S10270-009-0123-6}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/WahlerBBK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PopperBCC10, author = {Christina P{\"{o}}pper and David A. Basin and Srdjan Capkun and Cas Cremers}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Keeping data secret under full compromise using porter devices}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {241--250}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920297}, doi = {10.1145/1920261.1920297}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PopperBCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/BasinKM10, author = {David A. Basin and Felix Klaedtke and Samuel M{\"{u}}ller}, editor = {Tayssir Touili and Byron Cook and Paul B. Jackson}, title = {Policy Monitoring in First-Order Temporal Logic}, booktitle = {Computer Aided Verification, 22nd International Conference, {CAV} 2010, Edinburgh, UK, July 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6174}, pages = {1--18}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14295-6\_1}, doi = {10.1007/978-3-642-14295-6\_1}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/BasinKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SprengerB10, author = {Christoph Sprenger and David A. Basin}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Developing security protocols by refinement}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {361--374}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866349}, doi = {10.1145/1866307.1866349}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SprengerB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/MeierCB10, author = {Simon Meier and Cas Cremers and David A. Basin}, title = {Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs}, booktitle = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium, {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010}, pages = {231--245}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CSF.2010.23}, doi = {10.1109/CSF.2010.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/MeierCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SchmidtSB10, author = {Benedikt Schmidt and Patrick Schaller and David A. Basin}, title = {Impossibility Results for Secret Establishment}, booktitle = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium, {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010}, pages = {261--273}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CSF.2010.25}, doi = {10.1109/CSF.2010.25}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/SchmidtSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/BasinC10, author = {David A. Basin and Cas Cremers}, editor = {Anuj Dawar and Helmut Veith}, title = {Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries}, booktitle = {Computer Science Logic, 24th International Workshop, {CSL} 2010, 19th Annual Conference of the EACSL, Brno, Czech Republic, August 23-27, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6247}, pages = {1--18}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15205-4\_1}, doi = {10.1007/978-3-642-15205-4\_1}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csl/BasinC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BasinC10, author = {David A. Basin and Cas Cremers}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Modeling and Analyzing Security in the Presence of Compromising Adversaries}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {340--356}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_21}, doi = {10.1007/978-3-642-15497-3\_21}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BasinC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/BasinCES10, author = {David A. Basin and Manuel Clavel and Marina Egea and Michael Schl{\"{a}}pfer}, editor = {Fabio Massacci and Dan S. Wallach and Nicola Zannone}, title = {Automatic Generation of Smart, Security-Aware {GUI} Models}, booktitle = {Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5965}, pages = {201--217}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11747-3\_16}, doi = {10.1007/978-3-642-11747-3\_16}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/BasinCES10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MatsuoMOB10, author = {Shin'ichiro Matsuo and Kunihiko Miyazaki and Akira Otsuka and David A. Basin}, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of {ISO/IEC} 29128 and {CRYPTREC}}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {182--194}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4\_16}, doi = {10.1007/978-3-642-14992-4\_16}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/MatsuoMOB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/DiosDSBCE10, author = {Miguel Angel Garc{\'{\i}}a de Dios and Carolina Dania and Michael Schl{\"{a}}pfer and David A. Basin and Manuel Clavel and Marina Egea}, editor = {Jeff Kramer and Judith Bishop and Premkumar T. Devanbu and Sebasti{\'{a}}n Uchitel}, title = {{SSG:} a model-based development environment for smart, security-aware GUIs}, booktitle = {Proceedings of the 32nd {ACM/IEEE} International Conference on Software Engineering - Volume 2, {ICSE} 2010, Cape Town, South Africa, 1-8 May 2010}, pages = {311--312}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1810295.1810366}, doi = {10.1145/1810295.1810366}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/DiosDSBCE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/ConchinhaBC10, author = {Bruno Conchinha and David A. Basin and Carlos Caleiro}, editor = {Pierpaolo Degano and Sandro Etalle and Joshua D. Guttman}, title = {Efficient Decision Procedures for Message Deducibility and Static Equivalence}, booktitle = {Formal Aspects of Security and Trust - 7th International Workshop, {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6561}, pages = {34--49}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19751-2\_3}, doi = {10.1007/978-3-642-19751-2\_3}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/ConchinhaBC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BasinKM10, author = {David A. Basin and Felix Klaedtke and Samuel M{\"{u}}ller}, editor = {James B. D. Joshi and Barbara Carminati}, title = {Monitoring security policies with metric first-order temporal logic}, booktitle = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings}, pages = {23--34}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1809842.1809849}, doi = {10.1145/1809842.1809849}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/BasinKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/FrankBB10, author = {Mario Frank and Joachim M. Buhmann and David A. Basin}, editor = {James B. D. Joshi and Barbara Carminati}, title = {On the definition of role mining}, booktitle = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings}, pages = {35--44}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1809842.1809851}, doi = {10.1145/1809842.1809851}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/FrankBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2010asia, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, publisher = {{ACM}}, year = {2010}, isbn = {978-1-60558-936-7}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2010asia.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/BasinCDE09, author = {David A. Basin and Manuel Clavel and J{\"{u}}rgen Doser and Marina Egea}, title = {Automated analysis of security-design models}, journal = {Inf. Softw. Technol.}, volume = {51}, number = {5}, pages = {815--831}, year = {2009}, url = {https://doi.org/10.1016/j.infsof.2008.05.011}, doi = {10.1016/J.INFSOF.2008.05.011}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/BasinCDE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/logcom/BasinCRV09, author = {David A. Basin and Carlos Caleiro and Jaime Ramos and Luca Vigan{\`{o}}}, title = {Labelled Tableaux for Distributed Temporal Logic}, journal = {J. Log. Comput.}, volume = {19}, number = {6}, pages = {1245--1279}, year = {2009}, url = {https://doi.org/10.1093/logcom/exp022}, doi = {10.1093/LOGCOM/EXP022}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/logcom/BasinCRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/HoangKBA09, author = {Thai Son Hoang and Hironobu Kuruma and David A. Basin and Jean{-}Raymond Abrial}, title = {Developing topology discovery in Event-B}, journal = {Sci. Comput. Program.}, volume = {74}, number = {11-12}, pages = {879--899}, year = {2009}, url = {https://doi.org/10.1016/j.scico.2009.07.006}, doi = {10.1016/J.SCICO.2009.07.006}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/HoangKBA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FrankSBB09, author = {Mario Frank and Andreas P. Streich and David A. Basin and Joachim M. Buhmann}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {A probabilistic approach to hybrid role mining}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {101--111}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653675}, doi = {10.1145/1653662.1653675}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FrankSBB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SchallerSBC09, author = {Patrick Schaller and Benedikt Schmidt and David A. Basin and Srdjan Capkun}, title = {Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks}, booktitle = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium, {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009}, pages = {109--123}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSF.2009.6}, doi = {10.1109/CSF.2009.6}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/SchallerSBC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BasinBK09, author = {David A. Basin and Samuel J. Burri and G{\"{u}}nter Karjoth}, editor = {Michael Backes and Peng Ning}, title = {Dynamic Enforcement of Abstract Separation of Duty Constraints}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {250--267}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_16}, doi = {10.1007/978-3-642-04444-1\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BasinBK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/StreichFBB09, author = {Andreas P. Streich and Mario Frank and David A. Basin and Joachim M. Buhmann}, editor = {Andrea Pohoreckyj Danyluk and L{\'{e}}on Bottou and Michael L. Littman}, title = {Multi-assignment clustering for Boolean data}, booktitle = {Proceedings of the 26th Annual International Conference on Machine Learning, {ICML} 2009, Montreal, Quebec, Canada, June 14-18, 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {382}, pages = {969--976}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1553374.1553498}, doi = {10.1145/1553374.1553498}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icml/StreichFBB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/HoangKBA09, author = {Thai Son Hoang and Hironobu Kuruma and David A. Basin and Jean{-}Raymond Abrial}, editor = {Michael Leuschel and Heike Wehrheim}, title = {Developing Topology Discovery in Event-B}, booktitle = {Integrated Formal Methods, 7th International Conference, {IFM} 2009, D{\"{u}}sseldorf, Germany, February 16-19, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5423}, pages = {1--19}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00255-7\_1}, doi = {10.1007/978-3-642-00255-7\_1}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifm/HoangKBA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tphol/BasinCSS09, author = {David A. Basin and Srdjan Capkun and Patrick Schaller and Benedikt Schmidt}, editor = {Stefan Berghofer and Tobias Nipkow and Christian Urban and Makarius Wenzel}, title = {Let's Get Physical: Models and Methods for Real-World Security Protocols}, booktitle = {Theorem Proving in Higher Order Logics, 22nd International Conference, TPHOLs 2009, Munich, Germany, August 17-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5674}, pages = {1--22}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03359-9\_1}, doi = {10.1007/978-3-642-03359-9\_1}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tphol/BasinCSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2009, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, publisher = {{ACM}}, year = {2009}, isbn = {978-1-60558-460-7}, timestamp = {Fri, 20 Mar 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BasinC09, author = {David A. Basin and Cas Cremers}, title = {From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2009}, url = {http://eprint.iacr.org/2009/079}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BasinC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/NafB08, author = {Michael N{\"{a}}f and David A. Basin}, title = {Two approaches to an information security laboratory}, journal = {Commun. {ACM}}, volume = {51}, number = {12}, pages = {138--142}, year = {2008}, url = {https://doi.org/10.1145/1409360.1409386}, doi = {10.1145/1409360.1409386}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/NafB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/PapadimitratosP08, author = {Panos Papadimitratos and Marcin Poturalski and Patrick Schaller and Pascal Lafourcade and David A. Basin and Srdjan Capkun and Jean{-}Pierre Hubaux}, title = {Secure neighborhood discovery: a fundamental element for mobile ad hoc networking}, journal = {{IEEE} Commun. Mag.}, volume = {46}, number = {2}, pages = {132--139}, year = {2008}, url = {https://doi.org/10.1109/MCOM.2008.4473095}, doi = {10.1109/MCOM.2008.4473095}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/PapadimitratosP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OppligerHB08, author = {Rolf Oppliger and Ralf Hauser and David A. Basin}, title = {{SSL/TLS} session-aware user authentication revisited}, journal = {Comput. Secur.}, volume = {27}, number = {3-4}, pages = {64--70}, year = {2008}, url = {https://doi.org/10.1016/j.cose.2008.04.005}, doi = {10.1016/J.COSE.2008.04.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OppligerHB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/OppligerHB08, author = {Rolf Oppliger and Ralf Hauser and David A. Basin}, title = {{SSL/TLS} Session-Aware User Authentication}, journal = {Computer}, volume = {41}, number = {3}, pages = {59--65}, year = {2008}, url = {https://doi.org/10.1109/MC.2008.98}, doi = {10.1109/MC.2008.98}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/OppligerHB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PretschnerHBSW08, author = {Alexander Pretschner and Manuel Hilty and David A. Basin and Christian Schaefer and Thomas Walter}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {Mechanisms for usage control}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {240--244}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368344}, doi = {10.1145/1368310.1368344}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PretschnerHBSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FrankBB08, author = {Mario Frank and David A. Basin and Joachim M. Buhmann}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {A class of probabilistic models for role engineering}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {299--310}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455809}, doi = {10.1145/1455770.1455809}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FrankBB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SprengerB08, author = {Christoph Sprenger and David A. Basin}, title = {Cryptographically-Sound Protocol-Model Abstractions}, booktitle = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium, {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008}, pages = {115--129}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSF.2008.19}, doi = {10.1109/CSF.2008.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/SprengerB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/BasinKMP08, author = {David A. Basin and Felix Klaedtke and Samuel M{\"{u}}ller and Birgit Pfitzmann}, editor = {Ramesh Hariharan and Madhavan Mukund and V. Vinay}, title = {Runtime Monitoring of Metric First-order Temporal Properties}, booktitle = {{IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2008, December 9-11, 2008, Bangalore, India}, series = {LIPIcs}, volume = {2}, pages = {49--60}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2008}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2008.1740}, doi = {10.4230/LIPICS.FSTTCS.2008.1740}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/fsttcs/BasinKMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/FischerBE08, author = {Daniel Fischer and David A. Basin and Thomas Engel}, title = {Topology dynamics and routing for predictable mobile networks}, booktitle = {Proceedings of the 16th annual {IEEE} International Conference on Network Protocols, 2008. {ICNP} 2008, Orlando, Florida, USA, 19-22 October 2008}, pages = {207--217}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICNP.2008.4697039}, doi = {10.1109/ICNP.2008.4697039}, timestamp = {Sun, 26 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/FischerBE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/time/BasinCRV08, author = {David A. Basin and Carlos Caleiro and Jaime Ramos and Luca Vigan{\`{o}}}, editor = {St{\'{e}}phane Demri and Christian S. Jensen}, title = {A Labeled Tableaux Systemfor the Distributed Temporal Logic {DTL}}, booktitle = {15th International Symposium on Temporal Representation and Reasoning, {TIME} 2008, Universit{\'{e}} du Qu{\'{e}}bec {\`{a}} Montr{\'{e}}al, Canada, 16-18 June 2008}, pages = {101--109}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/TIME.2008.21}, doi = {10.1109/TIME.2008.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/time/BasinCRV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/BasinKMTW07, author = {David A. Basin and Hironobu Kuruma and Kunihiko Miyazaki and Kazuo Takaragi and Burkhart Wolff}, title = {Verifying a signature architecture: a comparative case study}, journal = {Formal Aspects Comput.}, volume = {19}, number = {1}, pages = {63--91}, year = {2007}, url = {https://doi.org/10.1007/s00165-006-0012-5}, doi = {10.1007/S00165-006-0012-5}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/BasinKMTW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BackesBW07, author = {Michael Backes and David A. Basin and Michael Waidner}, title = {Preface}, journal = {J. Comput. Secur.}, volume = {15}, number = {6}, pages = {561}, year = {2007}, url = {https://doi.org/10.3233/jcs-2007-15601}, doi = {10.3233/JCS-2007-15601}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BackesBW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BidderBC07, author = {Diana von Bidder and David A. Basin and Germano Caronni}, editor = {Jonathan Katz and Moti Yung}, title = {Midpoints Versus Endpoints: From Protocols to Firewalls}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {46--64}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_4}, doi = {10.1007/978-3-540-72738-5\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BidderBC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SchallerCB07, author = {Patrick Schaller and Srdjan Capkun and David A. Basin}, editor = {Jonathan Katz and Moti Yung}, title = {{BAP:} Broadcast Authentication Using Cryptographic Puzzles}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {401--419}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_26}, doi = {10.1007/978-3-540-72738-5\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SchallerCB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinOS07, author = {David A. Basin and Ernst{-}R{\"{u}}diger Olderog and Paul E. Sevin{\c{c}}}, editor = {Feng Bao and Steven Miller}, title = {Specifying and analyzing security automata using {CSP-OZ}}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {70--81}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229299}, doi = {10.1145/1229285.1229299}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BasinOS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KopfB07, author = {Boris K{\"{o}}pf and David A. Basin}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {An information-theoretic model for adaptive side-channel attacks}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {286--296}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315282}, doi = {10.1145/1315245.1315282}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KopfB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HiltyPBSW07, author = {Manuel Hilty and Alexander Pretschner and David A. Basin and Christian Schaefer and Thomas Walter}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {A Policy Language for Distributed Usage Control}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {531--546}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_35}, doi = {10.1007/978-3-540-74835-9\_35}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HiltyPBSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/HiltyPBSW07, author = {Manuel Hilty and Alexander Pretschner and David A. Basin and Christian Schaefer and Thomas Walter}, editor = {Sandro Etalle and Stephen Marsh}, title = {Monitors for Usage Control}, booktitle = {Trust Management - Proceedings of {IFIPTM} 2007: Joint iTrust and {PST} Conferences on Privacy, Trust Management and Security, July 30- August 2, 2007, Moncton, New Brunswick, Canada}, series = {{IFIP}}, volume = {238}, pages = {411--414}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73655-6\_29}, doi = {10.1007/978-0-387-73655-6\_29}, timestamp = {Tue, 29 Dec 2020 11:03:37 +0100}, biburl = {https://dblp.org/rec/conf/ifiptm/HiltyPBSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kivs/OppligerHBRK07, author = {Rolf Oppliger and Ralf Hauser and David A. Basin and Aldo Rodenhaeuser and Bruno Kaiser}, editor = {Torsten Braun and Georg Carle and Burkhard Stiller}, title = {A Proof of Concept Implementation of {SSL/TLS} Session-Aware User Authentication {(TLS-SA)}}, booktitle = {Kommunikation in Verteilten Systemen (KiVS), 15. Fachtagung Kommunikation in Verteilten Systemen, KiVS 2007, Bern, Schweiz, 26. Februar - 2. M{\"{a}}rz 2007}, series = {Informatik Aktuell}, pages = {225--236}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-69962-0\_19}, doi = {10.1007/978-3-540-69962-0\_19}, timestamp = {Tue, 23 May 2017 01:06:28 +0200}, biburl = {https://dblp.org/rec/conf/kivs/OppligerHBRK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/BasinCDE07, author = {David A. Basin and Manuel Clavel and J{\"{u}}rgen Doser and Marina Egea}, editor = {Gregor Engels and Bill Opdyke and Douglas C. Schmidt and Frank Weil}, title = {A Metamodel-Based Approach for Analyzing Security-Design Models}, booktitle = {Model Driven Engineering Languages and Systems, 10th International Conference, MoDELS 2007, Nashville, USA, September 30 - October 5, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4735}, pages = {420--435}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75209-7\_29}, doi = {10.1007/978-3-540-75209-7\_29}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/models/BasinCDE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tphol/SprengerB07, author = {Christoph Sprenger and David A. Basin}, editor = {Klaus Schneider and Jens Brandt}, title = {A Monad-Based Modeling and Verification Toolbox with Application to Security Protocols}, booktitle = {Theorem Proving in Higher Order Logics, 20th International Conference, TPHOLs 2007, Kaiserslautern, Germany, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4732}, pages = {302--318}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74591-4\_23}, doi = {10.1007/978-3-540-74591-4\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/tphol/SprengerB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SevincSB07, author = {Paul E. Sevin{\c{c}} and Mario Strasser and David A. Basin}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Securing the Distribution and Storage of Secrets with Trusted Platform Modules}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {53--66}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_5}, doi = {10.1007/978-3-540-72354-7\_5}, timestamp = {Sun, 02 Oct 2022 16:17:41 +0200}, biburl = {https://dblp.org/rec/conf/wistp/SevincSB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/PretschnerHB06, author = {Alexander Pretschner and Manuel Hilty and David A. Basin}, title = {Distributed usage control}, journal = {Commun. {ACM}}, volume = {49}, number = {9}, pages = {39--44}, year = {2006}, url = {https://doi.org/10.1145/1151030.1151053}, doi = {10.1145/1151030.1151053}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/PretschnerHB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/OppligerHB06, author = {Rolf Oppliger and Ralf Hauser and David A. Basin}, title = {{SSL/TLS} session-aware user authentication - Or how to effectively thwart the man-in-the-middle}, journal = {Comput. Commun.}, volume = {29}, number = {12}, pages = {2238--2246}, year = {2006}, url = {https://doi.org/10.1016/j.comcom.2006.03.004}, doi = {10.1016/J.COMCOM.2006.03.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/OppligerHB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/ArmandoBCRV06, author = {Alessandro Armando and David A. Basin and Jorge Cu{\'{e}}llar and Micha{\"{e}}l Rusinowitch and Luca Vigan{\`{o}}}, title = {Automated Reasoning for Security Protocol Analysis}, journal = {J. Autom. Reason.}, volume = {36}, number = {1-2}, pages = {1--3}, year = {2006}, url = {https://doi.org/10.1007/s10817-005-9014-x}, doi = {10.1007/S10817-005-9014-X}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/ArmandoBCRV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/CaleiroVB06, author = {Carlos Caleiro and Luca Vigan{\`{o}} and David A. Basin}, title = {On the semantics of Alice{\&}Bob specifications of security protocols}, journal = {Theor. Comput. Sci.}, volume = {367}, number = {1-2}, pages = {88--122}, year = {2006}, url = {https://doi.org/10.1016/j.tcs.2006.08.041}, doi = {10.1016/J.TCS.2006.08.041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/CaleiroVB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/BasinDL06, author = {David A. Basin and J{\"{u}}rgen Doser and Torsten Lodderstedt}, title = {Model driven security: From {UML} models to access control infrastructures}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {15}, number = {1}, pages = {39--91}, year = {2006}, url = {https://doi.org/10.1145/1125808.1125810}, doi = {10.1145/1125808.1125810}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/BasinDL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Basin06, author = {David A. Basin}, title = {Model Driven Security}, booktitle = {Proceedings of the The First International Conference on Availability, Reliability and Security, {ARES} 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria}, pages = {4}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ARES.2006.82}, doi = {10.1109/ARES.2006.82}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Basin06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SprengerBBPW06, author = {Christoph Sprenger and Michael Backes and David A. Basin and Birgit Pfitzmann and Michael Waidner}, title = {Cryptographically Sound Theorem Proving}, booktitle = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006), 5-7 July 2006, Venice, Italy}, pages = {153--166}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CSFW.2006.10}, doi = {10.1109/CSFW.2006.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/SprengerBBPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KopfB06, author = {Boris K{\"{o}}pf and David A. Basin}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Timing-Sensitive Information Flow Analysis for Synchronous Systems}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {243--262}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_16}, doi = {10.1007/11863908\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KopfB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etrics/SevincBO06, author = {Paul E. Sevin{\c{c}} and David A. Basin and Ernst{-}R{\"{u}}diger Olderog}, editor = {G{\"{u}}nter M{\"{u}}ller}, title = {Controlling Access to Documents: {A} Formal Access Control Model}, booktitle = {Emerging Trends in Information and Communication Security, International Conference, {ETRICS} 2006, Freiburg, Germany, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3995}, pages = {352--367}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11766155\_25}, doi = {10.1007/11766155\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/etrics/SevincBO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/DrielsmaMVB06, author = {Paul Hankes Drielsma and Sebastian M{\"{o}}dersheim and Luca Vigan{\`{o}} and David A. Basin}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Formalizing and Analyzing Sender Invariance}, booktitle = {Formal Aspects in Security and Trust, Fourth International Workshop, {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4691}, pages = {80--95}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-75227-1\_6}, doi = {10.1007/978-3-540-75227-1\_6}, timestamp = {Sun, 02 Oct 2022 16:07:30 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/DrielsmaMVB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SprengerBBPW06, author = {Christoph Sprenger and Michael Backes and David A. Basin and Birgit Pfitzmann and Michael Waidner}, title = {Cryptographically Sound Theorem Proving}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2006}, url = {http://eprint.iacr.org/2006/047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SprengerBBPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0013358, author = {Alan Bundy and David A. Basin and Dieter Hutter and Andrew Ireland}, title = {Rippling - meta-level guidance for mathematical reasoning}, series = {Cambridge tracts in theoretical computer science}, volume = {56}, publisher = {Cambridge University Press}, year = {2005}, isbn = {978-0-521-83449-0}, timestamp = {Fri, 12 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0013358.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/igpl/CaleiroVB05, author = {Carlos Caleiro and Luca Vigan{\`{o}} and David A. Basin}, title = {Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis}, journal = {Log. J. {IGPL}}, volume = {13}, number = {6}, pages = {637--663}, year = {2005}, url = {https://doi.org/10.1093/jigpal/jzi048}, doi = {10.1093/JIGPAL/JZI048}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/igpl/CaleiroVB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BasinMV05, author = {David A. Basin and Sebastian M{\"{o}}dersheim and Luca Vigan{\`{o}}}, title = {{OFMC:} {A} symbolic model checker for security protocols}, journal = {Int. J. Inf. Sec.}, volume = {4}, number = {3}, pages = {181--208}, year = {2005}, url = {https://doi.org/10.1007/s10207-004-0055-7}, doi = {10.1007/S10207-004-0055-7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BasinMV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/insk/NafB05, author = {Michael N{\"{a}}f and David A. Basin}, title = {Konflikt oder Review zwei Ans{\"{a}}tze f{\"{u}}r Labors in angewandter Informationssicherheit}, journal = {Inform. Spektrum}, volume = {28}, number = {5}, pages = {407--412}, year = {2005}, url = {https://doi.org/10.1007/s00287-005-0020-5}, doi = {10.1007/S00287-005-0020-5}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/insk/NafB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ArmandoBBCCCDHKMMORSTVV05, author = {Alessandro Armando and David A. Basin and Yohan Boichut and Yannick Chevalier and Luca Compagna and Jorge Cu{\'{e}}llar and Paul Hankes Drielsma and Pierre{-}Cyrille H{\'{e}}am and Olga Kouchnarenko and Jacopo Mantovani and Sebastian M{\"{o}}dersheim and David von Oheimb and Micha{\"{e}}l Rusinowitch and Judson Santiago and Mathieu Turuani and Luca Vigan{\`{o}} and Laurent Vigneron}, editor = {Kousha Etessami and Sriram K. Rajamani}, title = {The {AVISPA} Tool for the Automated Validation of Internet Security Protocols and Applications}, booktitle = {Computer Aided Verification, 17th International Conference, {CAV} 2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3576}, pages = {281--285}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11513988\_27}, doi = {10.1007/11513988\_27}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/ArmandoBBCCCDHKMMORSTVV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HiltyBP05, author = {Manuel Hilty and David A. Basin and Alexander Pretschner}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {On Obligations}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {98--117}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_7}, doi = {10.1007/11555827\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HiltyBP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/BasinKTW05, author = {David A. Basin and Hironobu Kuruma and Kazuo Takaragi and Burkhart Wolff}, editor = {John S. Fitzgerald and Ian J. Hayes and Andrzej Tarlecki}, title = {Verification of a Signature Architecture with {HOL-Z}}, booktitle = {{FM} 2005: Formal Methods, International Symposium of Formal Methods Europe, Newcastle, UK, July 18-22, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3582}, pages = {269--285}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11526841\_19}, doi = {10.1007/11526841\_19}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/BasinKTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/BasinMV05, author = {David A. Basin and Sebastian M{\"{o}}dersheim and Luca Vigan{\`{o}}}, editor = {Geoff Sutcliffe and Andrei Voronkov}, title = {Algebraic Intruder Deductions}, booktitle = {Logic for Programming, Artificial Intelligence, and Reasoning, 12th International Conference, {LPAR} 2005, Montego Bay, Jamaica, December 2-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3835}, pages = {549--564}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11591191\_38}, doi = {10.1007/11591191\_38}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/lpar/BasinMV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pts/SennBC05, author = {Diana Senn and David A. Basin and Germano Caronni}, editor = {Ferhat Khendek and Rachida Dssouli}, title = {Firewall Conformance Testing}, booktitle = {Testing of Communicating Systems, 17th {IFIP} {TC6/WG} 6.1 International Conference, TestCom 2005, Montreal, Canada, May 31 - June 2, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3502}, pages = {226--241}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11430230\_16}, doi = {10.1007/11430230\_16}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/pts/SennBC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CaleiroVB05a, author = {Carlos Caleiro and Luca Vigan{\`{o}} and David A. Basin}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Deconstructing Alice and Bob}, booktitle = {Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {135}, number = {1}, pages = {3--22}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.06.007}, doi = {10.1016/J.ENTCS.2005.06.007}, timestamp = {Thu, 15 Dec 2022 13:58:28 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CaleiroVB05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lisp/BasinDH04, author = {David A. Basin and Olivier Danvy and Robert Harper}, title = {Editorial}, journal = {High. Order Symb. Comput.}, volume = {17}, number = {3}, pages = {171}, year = {2004}, url = {https://doi.org/10.1023/B:LISP.0000029480.20108.7d}, doi = {10.1023/B:LISP.0000029480.20108.7D}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lisp/BasinDH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/BasinCM04, author = {David A. Basin and Manuel Clavel and Jos{\'{e}} Meseguer}, title = {Reflective metalogical frameworks}, journal = {{ACM} Trans. Comput. Log.}, volume = {5}, number = {3}, pages = {528--576}, year = {2004}, url = {https://doi.org/10.1145/1013560.1013566}, doi = {10.1145/1013560.1013566}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tocl/BasinCM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CaleiroVB05, author = {Carlos Caleiro and Luca Vigan{\`{o}} and David A. Basin}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Metareasoning about Security Protocols using Distributed Temporal Logic}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {67--89}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.020}, doi = {10.1016/J.ENTCS.2004.05.020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/CaleiroVB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/lopstr/BasinDFHN04, author = {David A. Basin and Yves Deville and Pierre Flener and Andreas Hamfelt and J{\o}rgen Fischer Nilsson}, editor = {Maurice Bruynooghe and Kung{-}Kiu Lau}, title = {Synthesis of Programs in Computational Logic}, booktitle = {Program Development in Computational Logic: {A} Decade of Research Advances in Logic-Based Program Development}, series = {Lecture Notes in Computer Science}, volume = {3049}, pages = {30--65}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25951-0\_2}, doi = {10.1007/978-3-540-25951-0\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lopstr/BasinDFHN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cade/2004, editor = {David A. Basin and Micha{\"{e}}l Rusinowitch}, title = {Automated Reasoning - Second International Joint Conference, {IJCAR} 2004, Cork, Ireland, July 4-8, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3097}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b98691}, doi = {10.1007/B98691}, isbn = {3-540-22345-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cade/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2004, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, publisher = {{ACM}}, year = {2004}, url = {http://dl.acm.org/citation.cfm?id=1030083}, isbn = {1-58113-971-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/BasinFG03, author = {David A. Basin and Stefan Friedrich and Marek Gawkowski}, title = {Bytecode Verification by Model Checking}, journal = {J. Autom. Reason.}, volume = {30}, number = {3-4}, pages = {399--444}, year = {2003}, url = {https://doi.org/10.1023/A:1025059508087}, doi = {10.1023/A:1025059508087}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jar/BasinFG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AyariBK03, author = {Abdelwaheb Ayari and David A. Basin and Felix Klaedtke}, title = {Decision procedures for inductive Boolean functions based on alternating automata}, journal = {Theor. Comput. Sci.}, volume = {300}, number = {1-3}, pages = {301--329}, year = {2003}, url = {https://doi.org/10.1016/S0304-3975(02)00089-0}, doi = {10.1016/S0304-3975(02)00089-0}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/AyariBK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinMV03, author = {David A. Basin and Sebastian M{\"{o}}dersheim and Luca Vigan{\`{o}}}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {CDiff: a new reduction technique for constraint-based analysis of security protocols}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {335--344}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948154}, doi = {10.1145/948109.948154}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BasinMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BasinMV03, author = {David A. Basin and Sebastian M{\"{o}}dersheim and Luca Vigan{\`{o}}}, editor = {Einar Snekkenes and Dieter Gollmann}, title = {An On-the-Fly Model-Checker for Security Protocol Analysis}, booktitle = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2808}, pages = {253--270}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39650-5\_15}, doi = {10.1007/978-3-540-39650-5\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BasinMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BasinDL03, author = {David A. Basin and J{\"{u}}rgen Doser and Torsten Lodderstedt}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {Model driven security for process-oriented systems}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {100--109}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775425}, doi = {10.1145/775412.775425}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BasinDL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/BasinMT03, author = {David A. Basin and Kunihiko Miyazaki and Kazuo Takaragi}, editor = {Sushil Jajodia and Leon Strous}, title = {A Formal Analysis of a Digital Signature Architecture}, booktitle = {Integrity and Internal Control in Information Systems {VI} - {IFIP} {TC11/WG11.5} Sixth Working Conference on Integrity and Internal Control in Information Systems {(IICIS)} 13-14 November 2003, Lausanne, Switzerland}, series = {{IFIP}}, volume = {140}, pages = {31--47}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/1-4020-7901-X\_3}, doi = {10.1007/1-4020-7901-X\_3}, timestamp = {Tue, 23 May 2017 01:07:20 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/BasinMT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2003fmse, editor = {Michael Backes and David A. Basin}, title = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, publisher = {{ACM}}, year = {2003}, isbn = {1-58113-781-8}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2003fmse.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tphol/2003, editor = {David A. Basin and Burkhart Wolff}, title = {Theorem Proving in Higher Order Logics, 16th International Conference, TPHOLs 2003, Rom, Italy, September 8-12, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2758}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b11935}, doi = {10.1007/B11935}, isbn = {3-540-40664-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tphol/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ArmandoBBCCMRTVV02, author = {Alessandro Armando and David A. Basin and Mehdi Bouallagui and Yannick Chevalier and Luca Compagna and Sebastian M{\"{o}}dersheim and Micha{\"{e}}l Rusinowitch and Mathieu Turuani and Luca Vigan{\`{o}} and Laurent Vigneron}, editor = {Ed Brinksma and Kim Guldstrand Larsen}, title = {The {AVISS} Security Protocol Analysis Tool}, booktitle = {Computer Aided Verification, 14th International Conference, {CAV} 2002,Copenhagen, Denmark, July 27-31, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2404}, pages = {349--353}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45657-0\_27}, doi = {10.1007/3-540-45657-0\_27}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/ArmandoBBCCMRTVV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/Basin02, author = {David A. Basin}, editor = {Lars{-}Henrik Eriksson and Peter A. Lindsay}, title = {The Next 700 Synthesis Calculi}, booktitle = {{FME} 2002: Formal Methods - Getting {IT} Right, International Symposium of Formal Methods Europe, Copenhagen, Denmark, July 22-24, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2391}, pages = {430}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45614-7\_24}, doi = {10.1007/3-540-45614-7\_24}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/Basin02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmcad/AyariB02, author = {Abdelwaheb Ayari and David A. Basin}, editor = {Mark D. Aagaard and John W. O'Leary}, title = {{QUBOS:} Deciding Quantified Boolean Logic Using Propositional Satisfiability Solvers}, booktitle = {Formal Methods in Computer-Aided Design, 4th International Conference, {FMCAD} 2002, Portland, OR, USA, November 6-8, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2517}, pages = {187--201}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36126-X\_12}, doi = {10.1007/3-540-36126-X\_12}, timestamp = {Fri, 10 Jan 2020 14:50:18 +0100}, biburl = {https://dblp.org/rec/conf/fmcad/AyariB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spin/BasinFGP02, author = {David A. Basin and Stefan Friedrich and Marek Gawkowski and Joachim Posegga}, editor = {Dragan Bosnacki and Stefan Leue}, title = {Bytecode Model Checking: An Experimental Analysis}, booktitle = {Model Checking of Software, 9th International {SPIN} Workshop, Grenoble, France, April 11-13, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2318}, pages = {42--59}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46017-9\_6}, doi = {10.1007/3-540-46017-9\_6}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spin/BasinFGP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tphol/BasinFG02, author = {David A. Basin and Stefan Friedrich and Marek Gawkowski}, editor = {Victor Carre{\~{n}}o and C{\'{e}}sar A. Mu{\~{n}}oz and Sofi{\`{e}}ne Tahar}, title = {Verified Bytecode Model Checkers}, booktitle = {Theorem Proving in Higher Order Logics, 15th International Conference, TPHOLs 2002, Hampton, VA, USA, August 20-23, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2410}, pages = {47--66}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45685-6\_5}, doi = {10.1007/3-540-45685-6\_5}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tphol/BasinFG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uml/LodderstedtBD02, author = {Torsten Lodderstedt and David A. Basin and J{\"{u}}rgen Doser}, editor = {Jean{-}Marc J{\'{e}}z{\'{e}}quel and Heinrich Hu{\ss}mann and Stephen Cook}, title = {SecureUML: {A} UML-Based Modeling Language for Model-Driven Security}, booktitle = {{UML} 2002 - The Unified Modeling Language, 5th International Conference, Dresden, Germany, September 30 - October 4, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2460}, pages = {426--441}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45800-X\_33}, doi = {10.1007/3-540-45800-X\_33}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uml/LodderstedtBD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/zum/BasinRV02, author = {David A. Basin and Frank Rittinger and Luca Vigan{\`{o}}}, editor = {Didier Bert and Jonathan P. Bowen and Martin C. Henson and Ken Robinson}, title = {A Formal Analysis of the {CORBA} Security Service}, booktitle = {{ZB} 2002: Formal Specification and Development in {Z} and B, 2nd International Conference of {B} and {Z} Users, Grenoble, France, January 23-25, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2272}, pages = {330--349}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45648-1\_17}, doi = {10.1007/3-540-45648-1\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/zum/BasinRV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/BasinG01, author = {David A. Basin and Harald Ganzinger}, title = {Automated complexity analysis based on ordered resolution}, journal = {J. {ACM}}, volume = {48}, number = {1}, pages = {70--109}, year = {2001}, url = {https://doi.org/10.1145/363647.363681}, doi = {10.1145/363647.363681}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/BasinG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/BasinF01, author = {David A. Basin and Amy P. Felty}, title = {Current Trends in Logical Frameworks and Metalanguages}, journal = {J. Autom. Reason.}, volume = {27}, number = {1}, pages = {1--2}, year = {2001}, url = {https://doi.org/10.1023/A:1010624702918}, doi = {10.1023/A:1010624702918}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/BasinF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/AyariB01, author = {Abdelwaheb Ayari and David A. Basin}, title = {A Higher-order Interpretation of Deductive Tableau}, journal = {J. Symb. Comput.}, volume = {31}, number = {5}, pages = {487--520}, year = {2001}, url = {https://doi.org/10.1006/jsco.2001.0444}, doi = {10.1006/JSCO.2001.0444}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/AyariB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/FrankB01, author = {Ian Frank and David A. Basin}, title = {A theoretical and empirical investigation of search in imperfect information games}, journal = {Theor. Comput. Sci.}, volume = {252}, number = {1-2}, pages = {217--256}, year = {2001}, url = {https://doi.org/10.1016/S0304-3975(00)00083-9}, doi = {10.1016/S0304-3975(00)00083-9}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/FrankB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/BasinRV01, author = {David A. Basin and Frank Rittinger and Luca Vigan{\`{o}}}, editor = {A Min Tjoa and Volker Gruhn}, title = {A formal data-model of the {CORBA} security service}, booktitle = {Proceedings of the 8th European Software Engineering Conference held jointly with 9th {ACM} {SIGSOFT} International Symposium on Foundations of Software Engineering 2001, Vienna, Austria, September 10-14, 2001}, pages = {303--304}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/503209.503253}, doi = {10.1145/503209.503253}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/BasinRV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AccorsiBV01, author = {Rafael Accorsi and David A. Basin and Luca Vigan{\`{o}}}, editor = {Jean Goubault{-}Larrecq}, title = {Towards an awareness-based semantics for security protocol analysis}, booktitle = {Logical Aspects of Cryptographic Protocol Verification, {LACPV} 2001, in connection with {CAV} 2001, Paris, France, July 23, 2001}, series = {Electronic Notes in Theoretical Computer Science}, volume = {55}, number = {1}, pages = {5--24}, publisher = {Elsevier}, year = {2001}, url = {https://doi.org/10.1016/S1571-0661(04)00242-7}, doi = {10.1016/S1571-0661(04)00242-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/AccorsiBV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BasinM00, author = {David A. Basin and Se{\'{a}}n Matthews}, title = {Structuring Metatheory on Inductive Definitions}, journal = {Inf. Comput.}, volume = {162}, number = {1-2}, pages = {80--95}, year = {2000}, url = {https://doi.org/10.1006/inco.2000.2858}, doi = {10.1006/INCO.2000.2858}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/BasinM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/AndersonB00, author = {Penny Anderson and David A. Basin}, title = {Program Development Schemata as Derived Rules}, journal = {J. Symb. Comput.}, volume = {30}, number = {1}, pages = {5--36}, year = {2000}, url = {https://doi.org/10.1006/jsco.1999.0346}, doi = {10.1006/JSCO.1999.0346}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/AndersonB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/FrankBB00, author = {Ian Frank and David A. Basin and Alan Bundy}, editor = {Henry A. Kautz and Bruce W. Porter}, title = {Combining Knowledge and Search to Solve Single-Suit Bridge}, booktitle = {Proceedings of the Seventeenth National Conference on Artificial Intelligence and Twelfth Conference on on Innovative Applications of Artificial Intelligence, July 30 - August 3, 2000, Austin, Texas, {USA}}, pages = {195--200}, publisher = {{AAAI} Press / The {MIT} Press}, year = {2000}, url = {http://www.aaai.org/Library/AAAI/2000/aaai00-030.php}, timestamp = {Tue, 05 Sep 2023 09:10:47 +0200}, biburl = {https://dblp.org/rec/conf/aaai/FrankBB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/AyariB00, author = {Abdelwaheb Ayari and David A. Basin}, editor = {E. Allen Emerson and A. Prasad Sistla}, title = {Bounded Model Construction for Monadic Second-Order Logics}, booktitle = {Computer Aided Verification, 12th International Conference, {CAV} 2000, Chicago, IL, USA, July 15-19, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1855}, pages = {99--112}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10722167\_11}, doi = {10.1007/10722167\_11}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/AyariB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/AyariBK00, author = {Abdelwaheb Ayari and David A. Basin and Felix Klaedtke}, editor = {E. Allen Emerson and A. Prasad Sistla}, title = {Decision Procedures for Inductive Boolean Functions Based on Alternating Automata}, booktitle = {Computer Aided Verification, 12th International Conference, {CAV} 2000, Chicago, IL, USA, July 15-19, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1855}, pages = {170--185}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10722167\_16}, doi = {10.1007/10722167\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/AyariBK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmcad/BasinFM00, author = {David A. Basin and Stefan Friedrich and Sebastian M{\"{o}}dersheim}, editor = {Warren A. Hunt Jr. and Steven D. Johnson}, title = {{B2M:} {A} Semantic Based Tool for {BLIF} Hardware Descriptions}, booktitle = {Formal Methods in Computer-Aided Design, Third International Conference, {FMCAD} 2000, Austin, Texas, USA, November 1-3, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1954}, pages = {91--107}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-40922-X\_7}, doi = {10.1007/3-540-40922-X\_7}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fmcad/BasinFM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/BasinCM00, author = {David A. Basin and Manuel Clavel and Jos{\'{e}} Meseguer}, editor = {Sanjiv Kapoor and Sanjiva Prasad}, title = {Rewriting Logic as a Metalogical Framework}, booktitle = {Foundations of Software Technology and Theoretical Computer Science, 20th Conference, {FST} {TCS} 2000 New Delhi, India, December 13-15, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1974}, pages = {55--80}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44450-5\_4}, doi = {10.1007/3-540-44450-5\_4}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/BasinCM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BasinD00, author = {David A. Basin and Grit Denker}, editor = {Kokichi Futatsugi}, title = {Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis}, booktitle = {The 3rd International Workshop on Rewriting Logic and its Applications, {WRLA} 2000, Kanzawa, Japan, September 18-20, 2000}, series = {Electronic Notes in Theoretical Computer Science}, volume = {36}, pages = {235--256}, publisher = {Elsevier}, year = {2000}, url = {https://doi.org/10.1016/S1571-0661(05)80141-0}, doi = {10.1016/S1571-0661(05)80141-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/BasinD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/BasinF99, author = {David A. Basin and Stefan Friedrich}, title = {Modeling a Hardware Synthesis Methodology in Isabelle}, journal = {Formal Methods Syst. Des.}, volume = {15}, number = {2}, pages = {99--122}, year = {1999}, url = {https://doi.org/10.1023/A:1008758500273}, doi = {10.1023/A:1008758500273}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fmsd/BasinF99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/BasinFPV99, author = {David A. Basin and Stefan Friedrich and Joachim Posegga and Harald Vogt}, editor = {Nicolas Halbwachs and Doron A. Peled}, title = {Java Bytecode Verification by Model Checking}, booktitle = {Computer Aided Verification, 11th International Conference, {CAV} '99, Trento, Italy, July 6-10, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1633}, pages = {491--494}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48683-6\_43}, doi = {10.1007/3-540-48683-6\_43}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cav/BasinFPV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cqre/Basin99, author = {David A. Basin}, editor = {Rainer Baumgart}, title = {Lazy Infinite-State Analysis of Security Protocols}, booktitle = {Secure Networking - {CQRE} (Secure) '99, International Exhibition and Congress D{\"{u}}sseldorf, Germany, November 30 - December 2, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1740}, pages = {30--42}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46701-7\_3}, doi = {10.1007/3-540-46701-7\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cqre/Basin99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ismvl/AyariBF99, author = {Abdelwaheb Ayari and David A. Basin and Stefan Friedrich}, title = {Structural and Behavioral Modeling with Monadic Logics}, booktitle = {29th {IEEE} International Symposium on Multiple-Valued Logic, {ISMVL} 1999, Freiburg im Breisgau, Germany, May 20-22, 1999, Proceedings}, pages = {142--151}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/ISMVL.1999.779709}, doi = {10.1109/ISMVL.1999.779709}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ismvl/AyariBF99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ifip/BasinK99, author = {David A. Basin and Bernd Krieg{-}Br{\"{u}}ckner}, editor = {Egidio Astesiano and Hans{-}J{\"{o}}rg Kreowski and Bernd Krieg{-}Br{\"{u}}ckner}, title = {Formalization of the Development Process}, booktitle = {Algebraic Foundations of Systems Specification}, series = {{IFIP} State-of-the-Art Reports}, pages = {521--562}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-642-59851-7\_14}, doi = {10.1007/978-3-642-59851-7\_14}, timestamp = {Tue, 16 May 2017 14:24:23 +0200}, biburl = {https://dblp.org/rec/series/ifip/BasinK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ai/FrankB98, author = {Ian Frank and David A. Basin}, title = {Search in Games with Incomplete Information: {A} Case Study Using Bridge Card Play}, journal = {Artif. Intell.}, volume = {100}, number = {1-2}, pages = {87--123}, year = {1998}, url = {https://doi.org/10.1016/S0004-3702(97)00082-9}, doi = {10.1016/S0004-3702(97)00082-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ai/FrankB98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Basin98, author = {David A. Basin}, title = {Logical-Framework-Based Program Development}, journal = {{ACM} Comput. Surv.}, volume = {30}, number = {3es}, pages = {1}, year = {1998}, url = {https://doi.org/10.1145/289121.289122}, doi = {10.1145/289121.289122}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/Basin98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icga/FrankB98, author = {Ian Frank and David A. Basin}, title = {Search in Games with Incomplete Information: {A} Case Study Using Bridge Card Play}, journal = {J. Int. Comput. Games Assoc.}, volume = {21}, number = {3}, pages = {194}, year = {1998}, url = {https://doi.org/10.3233/ICG-1998-21308}, doi = {10.3233/ICG-1998-21308}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icga/FrankB98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jolli/BasinMV98, author = {David A. Basin and Se{\'{a}}n Matthews and Luca Vigan{\`{o}}}, title = {Labelled Modal Logics: Quantifiers}, journal = {J. Log. Lang. Inf.}, volume = {7}, number = {3}, pages = {237--263}, year = {1998}, url = {https://doi.org/10.1023/A:1008278803780}, doi = {10.1023/A:1008278803780}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jolli/BasinMV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sLogica/BasinMV98, author = {David A. Basin and Se{\'{a}}n Matthews and Luca Vigan{\`{o}}}, title = {Natural Deduction for Non-Classical Logics}, journal = {Stud Logica}, volume = {60}, number = {1}, pages = {119--160}, year = {1998}, url = {https://doi.org/10.1023/A:1005003904639}, doi = {10.1023/A:1005003904639}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sLogica/BasinMV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/FrankBM98, author = {Ian Frank and David A. Basin and Hitoshi Matsubara}, editor = {Jack Mostow and Chuck Rich}, title = {Finding Optimal Strategies for Imperfect Information Games}, booktitle = {Proceedings of the Fifteenth National Conference on Artificial Intelligence and Tenth Innovative Applications of Artificial Intelligence Conference, {AAAI} 98, {IAAI} 98, July 26-30, 1998, Madison, Wisconsin, {USA}}, pages = {500--507}, publisher = {{AAAI} Press / The {MIT} Press}, year = {1998}, url = {http://www.aaai.org/Library/AAAI/1998/aaai98-071.php}, timestamp = {Tue, 05 Sep 2023 09:10:47 +0200}, biburl = {https://dblp.org/rec/conf/aaai/FrankBM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cg/FrankB98, author = {Ian Frank and David A. Basin}, editor = {H. Jaap van den Herik and Hiroyuki Iida}, title = {Optimal Play against Best Defence: Complexity and Heuristics}, booktitle = {Computers and Games, First International Conference, CG'98, Tsukuba, Japan, November 11-12, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1558}, pages = {50--73}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48957-6\_4}, doi = {10.1007/3-540-48957-6\_4}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/cg/FrankB98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/frocos/BasinF98, author = {David A. Basin and Stefan Friedrich}, editor = {Dov M. Gabbay and Maarten de Rijke}, title = {Combining {WS1S} and {HOL}}, booktitle = {Frontiers of Combining Systems, Second International Workshop, FroCoS 1998, Amsterdam, The Netherlands, October 2-4, 1998, Proceedings}, pages = {39--56}, publisher = {Research Studies Press/Wiley}, year = {1998}, timestamp = {Mon, 22 Nov 2021 11:39:04 +0100}, biburl = {https://dblp.org/rec/conf/frocos/BasinF98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/frocos/BasinV98, author = {David A. Basin and Luca Vigan{\`{o}}}, editor = {Dov M. Gabbay and Maarten de Rijke}, title = {A Recipe for the Complexity Analysis of Non-Classical Logics}, booktitle = {Frontiers of Combining Systems, Second International Workshop, FroCoS 1998, Amsterdam, The Netherlands, October 2-4, 1998, Proceedings}, pages = {57--76}, publisher = {Research Studies Press/Wiley}, year = {1998}, timestamp = {Wed, 24 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/frocos/BasinV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BasinM98, author = {David A. Basin and Se{\'{a}}n Matthews}, editor = {Claude Kirchner and H{\'{e}}l{\`{e}}ne Kirchner}, title = {Scoped metatheorems}, booktitle = {1998 International Workshop on Rewriting Logic and its Applications, {WRLA} 1998, Abbaye des Pr{\'{e}}montr{\'{e}}s at Pont-{\`{a}}-Mousson, France, September 1998}, series = {Electronic Notes in Theoretical Computer Science}, volume = {15}, pages = {353--366}, publisher = {Elsevier}, year = {1998}, url = {https://doi.org/10.1016/S1571-0661(05)80021-0}, doi = {10.1016/S1571-0661(05)80021-0}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BasinM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/logcom/BasinMV97, author = {David A. Basin and Se{\'{a}}n Matthews and Luca Vigan{\`{o}}}, title = {Labelled Propositional Modal Logics: Theory and Practice}, journal = {J. Log. Comput.}, volume = {7}, number = {6}, pages = {685--717}, year = {1997}, url = {https://doi.org/10.1093/logcom/7.6.685}, doi = {10.1093/LOGCOM/7.6.685}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/logcom/BasinMV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/AyariBP97, author = {Abdelwaheb Ayari and David A. Basin and Andreas Podelski}, editor = {Mogens Nielsen and Wolfgang Thomas}, title = {{LISA:} {A} Specification Language Based on {WS2S}}, booktitle = {Computer Science Logic, 11th International Workshop, {CSL} '97, Annual Conference of the EACSL, Aarhus, Denmark, August 23-29, 1997, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {1414}, pages = {18--34}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028005}, doi = {10.1007/BFB0028005}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/csl/AyariBP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kgc/BasinMV97, author = {David A. Basin and Se{\'{a}}n Matthews and Luca Vigan{\`{o}}}, editor = {Georg Gottlob and Alexander Leitsch and Daniele Mundici}, title = {A New Method for Bounding the Complexity of Modal Logics}, booktitle = {Computational Logic and Proof Theory, 5th Kurt G{\"{o}}del Colloquium, KGC'97, Vienna, Austria, August 25-29, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1289}, pages = {89--102}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63385-5\_35}, doi = {10.1007/3-540-63385-5\_35}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/kgc/BasinMV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ki/BasinMV97, author = {David A. Basin and Se{\'{a}}n Matthews and Luca Vigan{\`{o}}}, editor = {Gerhard Brewka and Christopher Habel and Bernhard Nebel}, title = {Labelled Quantified Modal Logics}, booktitle = {{KI-97:} Advances in Artificial Intelligence, 21st Annual German Conference on Artificial Intelligence, Freiburg, Germany, September 9-12, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1303}, pages = {171--182}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3540634932\_13}, doi = {10.1007/3540634932\_13}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ki/BasinMV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/KraanBB96, author = {Ina Kraan and David A. Basin and Alan Bundy}, title = {Middle-Out Reasoning for Synthesis and Induction}, journal = {J. Autom. Reason.}, volume = {16}, number = {1-2}, pages = {113--145}, year = {1996}, url = {https://doi.org/10.1007/BF00244461}, doi = {10.1007/BF00244461}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/KraanBB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/BasinW96, author = {David A. Basin and Toby Walsh}, title = {A Calculus for and Termination of Rippling}, journal = {J. Autom. Reason.}, volume = {16}, number = {1-2}, pages = {147--180}, year = {1996}, url = {https://doi.org/10.1007/BF00244462}, doi = {10.1007/BF00244462}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/BasinW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/logcom/BasinM96, author = {David A. Basin and Se{\'{a}}n Matthews}, title = {Adding Metatheoretic Facilities to First-Order Theories}, journal = {J. Log. Comput.}, volume = {6}, number = {6}, pages = {835--849}, year = {1996}, url = {https://doi.org/10.1093/logcom/6.6.835}, doi = {10.1093/LOGCOM/6.6.835}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/logcom/BasinM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/BasinM96, author = {David A. Basin and Se{\'{a}}n Matthews}, editor = {Michael A. McRobbie and John K. Slaney}, title = {Structuring Metatheory on Inductive Definitions}, booktitle = {Automated Deduction - CADE-13, 13th International Conference on Automated Deduction, New Brunswick, NJ, USA, July 30 - August 3, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1104}, pages = {171--185}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61511-3\_79}, doi = {10.1007/3-540-61511-3\_79}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/BasinM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmcad/CantuBSB96, author = {Francisco J. Cantu and Alan Bundy and Alan Smaill and David A. Basin}, editor = {Mandayam K. Srivas and Albert John Camilleri}, title = {Experiments in Automating Hardware Verification Using Inductive Proof Planning}, booktitle = {Formal Methods in Computer-Aided Design, First International Conference, {FMCAD} '96, Palo Alto, California, USA, November 6-8, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1166}, pages = {94--108}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0031802}, doi = {10.1007/BFB0031802}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fmcad/CantuBSB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/frocos/BasinMV96, author = {David A. Basin and Se{\'{a}}n Matthews and Luca Vigan{\`{o}}}, editor = {Franz Baader and Klaus U. Schulz}, title = {A Topography of Labelled Modal Logics}, booktitle = {Frontiers of Combining Systems, First International Workshop FroCoS 1996, Munich, Germany, March 26-29, 1996, Proceedings}, series = {Applied Logic Series}, volume = {3}, pages = {75--92}, publisher = {Kluwer Academic Publishers}, year = {1996}, timestamp = {Mon, 20 Mar 2017 13:54:49 +0100}, biburl = {https://dblp.org/rec/conf/frocos/BasinMV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kr/BasinMV96, author = {David A. Basin and Se{\'{a}}n Matthews and Luca Vigan{\`{o}}}, editor = {Luigia Carlucci Aiello and Jon Doyle and Stuart C. Shapiro}, title = {Implementing Modal and Relevance Logics in a Logical Framework}, booktitle = {Proceedings of the Fifth International Conference on Principles of Knowledge Representation and Reasoning (KR'96), Cambridge, Massachusetts, USA, November 5-8, 1996}, pages = {386--397}, publisher = {Morgan Kaufmann}, year = {1996}, timestamp = {Mon, 22 Aug 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kr/BasinMV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/BasinG96, author = {David A. Basin and Harald Ganzinger}, title = {Complexity Analysis Based on Ordered Resolution}, booktitle = {Proceedings, 11th Annual {IEEE} Symposium on Logic in Computer Science, New Brunswick, New Jersey, USA, July 27-30, 1996}, pages = {456--465}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/LICS.1996.561462}, doi = {10.1109/LICS.1996.561462}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/BasinG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/AyariB96, author = {Abdelwaheb Ayari and David A. Basin}, editor = {Tiziana Margaria and Bernhard Steffen}, title = {Generic System Support for Deductive Program Development}, booktitle = {Tools and Algorithms for Construction and Analysis of Systems, Second International Workshop, {TACAS} '96, Passau, Germany, March 27-29, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1055}, pages = {313--328}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61042-1\_52}, doi = {10.1007/3-540-61042-1\_52}, timestamp = {Sun, 02 Jun 2019 21:19:27 +0200}, biburl = {https://dblp.org/rec/conf/tacas/AyariB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tphol/BasinF96, author = {David A. Basin and Stefan Friedrich}, editor = {Joakim von Wright and Jim Grundy and John Harrison}, title = {Modeling a Hardware Synthesis Methodology in Isabelle}, booktitle = {Theorem Proving in Higher Order Logics, 9th International Conference, TPHOLs'96, Turku, Finland, August 26-30, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1125}, pages = {33--50}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0105395}, doi = {10.1007/BFB0105395}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tphol/BasinF96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/AndersonB95, author = {Penny Anderson and David A. Basin}, editor = {Kanchana Kanchanasut and Jean{-}Jacques L{\'{e}}vy}, title = {Deriving and Applying Logic Program Transformers}, booktitle = {Algorithms, Concurrency and Knowledge: 1995 Asian Computing Science Conference, {ACSC} '95, Pathumthani, Thailand, December 11-13, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1023}, pages = {301--318}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60688-2\_52}, doi = {10.1007/3-540-60688-2\_52}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/AndersonB95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/BasinK95, author = {David A. Basin and Nils Klarlund}, editor = {Pierre Wolper}, title = {Hardware Verification using Monadic Second-Order Logic}, booktitle = {Computer Aided Verification, 7th International Conference, Li{\`{e}}ge, Belgium, July, 3-5, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {939}, pages = {31--41}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60045-0\_38}, doi = {10.1007/3-540-60045-0\_38}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/BasinK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eik/Basin94, author = {David A. Basin}, title = {Generalized Rewriting in Type Theory}, journal = {J. Inf. Process. Cybern.}, volume = {30}, number = {5/6}, pages = {249--259}, year = {1994}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eik/Basin94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Basin94, author = {David A. Basin}, title = {A Term Equality Problem Equivalent to Graph Isomorphism}, journal = {Inf. Process. Lett.}, volume = {51}, number = {2}, pages = {61--66}, year = {1994}, url = {https://doi.org/10.1016/0020-0190(94)00084-0}, doi = {10.1016/0020-0190(94)00084-0}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Basin94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/BasinW94, author = {David A. Basin and Toby Walsh}, editor = {Alan Bundy}, title = {Termination Orderings for Rippling}, booktitle = {Automated Deduction - CADE-12, 12th International Conference on Automated Deduction, Nancy, France, June 26 - July 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {814}, pages = {466--483}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58156-1\_34}, doi = {10.1007/3-540-58156-1\_34}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/BasinW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrs/BasinW94, author = {David A. Basin and Toby Walsh}, editor = {Nachum Dershowitz and Naomi Lindenstrauss}, title = {A Calculus for Rippling}, booktitle = {Conditional and Typed Rewriting Systems, 4th International Workshop, CTRS-94, Jerusalem, Israel, July 13-15, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {968}, pages = {15--30}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60381-6\_2}, doi = {10.1007/3-540-60381-6\_2}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ctrs/BasinW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/YoshidaBGWB94, author = {Tetsuya Yoshida and Alan Bundy and Ian Green and Toby Walsh and David A. Basin}, editor = {Anthony G. Cohn}, title = {Coloured Rippling: An Extension of a Theorem Proving Heuristic}, booktitle = {Proceedings of the Eleventh European Conference on Artificial Intelligence, Amsterdam, The Netherlands, August 8-12, 1994}, pages = {85--89}, publisher = {John Wiley and Sons, Chichester}, year = {1994}, timestamp = {Tue, 20 Jun 2023 09:03:42 +0200}, biburl = {https://dblp.org/rec/conf/ecai/YoshidaBGWB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclp/Basin94, author = {David A. Basin}, editor = {Pascal Van Hentenryck}, title = {IsaWhelk Interpreted in Isabelle}, booktitle = {Logic Programming, Proceedings of the Eleventh International Conference on Logic Programming, Santa Marherita Ligure, Italy, June 13-18, 1994}, pages = {741}, publisher = {{MIT} Press}, year = {1994}, timestamp = {Fri, 29 Nov 2013 14:57:24 +0100}, biburl = {https://dblp.org/rec/conf/iclp/Basin94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lopstr/Basin94, author = {David A. Basin}, editor = {Laurent Fribourg and Franco Turini}, title = {Logic Frameworks for Logic Programs}, booktitle = {Logic Programming Synthesis and Transformation - Meta-Programming in Logic. 4th Internation Workshops, LOPSTR'94 and META'94, Pisa, Italy, June 20-21, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {883}, pages = {1--16}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58792-6\_1}, doi = {10.1007/3-540-58792-6\_1}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/lopstr/Basin94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amai/BarnettBH93, author = {Richard Barnett and David A. Basin and Jane Hesketh}, title = {A Recursion Planning Analysis of Inductive Completion}, journal = {Ann. Math. Artif. Intell.}, volume = {8}, number = {3-4}, pages = {363--381}, year = {1993}, url = {https://doi.org/10.1007/BF01530798}, doi = {10.1007/BF01530798}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amai/BarnettBH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/BasinM93, author = {David A. Basin and Se{\'{a}}n Matthews}, editor = {R. K. Shyamasundar}, title = {A Conservative Extension of First-order Logic and Its Application to Theorem Proving}, booktitle = {Foundations of Software Technology and Theoretical Computer Science, 13th Conference, Bombay, India, December 15-17, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {761}, pages = {151--160}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-57529-4\_50}, doi = {10.1007/3-540-57529-4\_50}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/BasinM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclp/KraanBB93, author = {Ina Kraan and David A. Basin and Alan Bundy}, editor = {David Scott Warren}, title = {Middle-Out Reasoning for Logic Program Synthesis}, booktitle = {Logic Programming, Proceedings of the Tenth International Conference on Logic Programming, Budapest, Hungary, June 21-25, 1993}, pages = {441--455}, publisher = {{MIT} Press}, year = {1993}, timestamp = {Fri, 29 Nov 2013 14:57:24 +0100}, biburl = {https://dblp.org/rec/conf/iclp/KraanBB93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/BasinW93, author = {David A. Basin and Toby Walsh}, editor = {Ruzena Bajcsy}, title = {Difference Unification}, booktitle = {Proceedings of the 13th International Joint Conference on Artificial Intelligence. Chamb{\'{e}}ry, France, August 28 - September 3, 1993}, pages = {116--122}, publisher = {Morgan Kaufmann}, year = {1993}, url = {http://ijcai.org/Proceedings/93-1/Papers/017.pdf}, timestamp = {Tue, 20 Aug 2019 16:18:33 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/BasinW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwssd/BasinBKM93, author = {David A. Basin and Alan Bundy and Ina Kraan and Se{\'{a}}n Matthews}, editor = {Jack C. Wileden and Martin S. Feather and Axel van Lamsweerde}, title = {A Framework for Program Development Based on Schematic Proof}, booktitle = {Proceedings of the 7th International Workshop on Software Specification and Design, Redondo Beach, CA, USA, December 6-7, 1993}, pages = {162--171}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://dl.acm.org/doi/10.5555/951807.951833}, doi = {10.5555/951807.951833}, timestamp = {Fri, 13 May 2022 15:10:38 +0200}, biburl = {https://dblp.org/rec/conf/iwssd/BasinBKM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/BasinW92, author = {David A. Basin and Toby Walsh}, editor = {Deepak Kapur}, title = {Difference Matching}, booktitle = {Automated Deduction - CADE-11, 11th International Conference on Automated Deduction, Saratoga Springs, NY, USA, June 15-18, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {607}, pages = {295--309}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-55602-8\_173}, doi = {10.1007/3-540-55602-8\_173}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/BasinW92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/FrankBB92, author = {Ian Frank and David A. Basin and Alan Bundy}, editor = {Bernd Neumann}, title = {An Adaptation of Proof-Planning to Declarer Play in Bridge}, booktitle = {10th European Conference on Artificial Intelligence, {ECAI} 92, Vienna, Austria, August 3-7, 1992. Proceedings}, pages = {72--76}, publisher = {John Wiley and Sons}, year = {1992}, timestamp = {Wed, 31 Jul 2019 08:44:58 +0200}, biburl = {https://dblp.org/rec/conf/ecai/FrankBB92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lopstr/KraanBB92, author = {Ina Kraan and David A. Basin and Alan Bundy}, editor = {Kung{-}Kiu Lau and Tim Clement}, title = {Logic Program Synthesis via Proof Planning}, booktitle = {Logic Program Synthesis and Transformation, Proceedings of {LOPSTR} 92, International Workshop on Logic Program Synthesis and Transformation, University of Manchester, UK, 2-3 July 1992}, series = {Workshops in Computing}, pages = {1--14}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/978-1-4471-3560-9\_1}, doi = {10.1007/978-1-4471-3560-9\_1}, timestamp = {Fri, 21 Jun 2019 13:08:59 +0200}, biburl = {https://dblp.org/rec/conf/lopstr/KraanBB92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/BasinBL91, author = {David A. Basin and Geoffrey M. Brown and Miriam Leeser}, title = {Formally verified synthesis of combinational {CMOS} circuits}, journal = {Integr.}, volume = {11}, number = {3}, pages = {235--250}, year = {1991}, url = {https://doi.org/10.1016/0167-9260(91)90048-P}, doi = {10.1016/0167-9260(91)90048-P}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/BasinBL91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiia/BasinGT91, author = {David A. Basin and Fausto Giunchiglia and Paolo Traverso}, editor = {Edoardo Ardizzone and Salvatore Gaglio and Filippo Sorbello}, title = {Automating Meta-Theory Creation and System Extension}, booktitle = {Trends in Artificial Intelligence, 2nd Congress of the Italian Association for Artificial Intelligence, AI*IA, Palermo, Italy, October, 29-31, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {549}, pages = {48--57}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54712-6\_217}, doi = {10.1007/3-540-54712-6\_217}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/aiia/BasinGT91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacs/BasinH91, author = {David A. Basin and Douglas J. Howe}, editor = {Takayasu Ito and Albert R. Meyer}, title = {Some Normalization Properties of Martin-L{\"{o}}f's Type Theory, and Applications}, booktitle = {Theoretical Aspects of Computer Software, International Conference {TACS} '91, Sendai, Japan, September 24-27, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {526}, pages = {475--494}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54415-1\_60}, doi = {10.1007/3-540-54415-1\_60}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/tacs/BasinH91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Basin90, author = {David A. Basin}, title = {Building Problem Solving Environments in Constructive Type Theory}, school = {Cornell University, {USA}}, year = {1990}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Basin90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/Basin90, author = {David A. Basin}, editor = {Mark E. Stickel}, title = {Equality of Terms Containing Associative-Commutative Functions and Commutative Binding Operators in Isomorphism Complete}, booktitle = {10th International Conference on Automated Deduction, Kaiserslautern, FRG, July 24-27, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {449}, pages = {251--260}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-52885-7\_92}, doi = {10.1007/3-540-52885-7\_92}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/Basin90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ershov/Basin89, author = {David A. Basin}, editor = {Albert R. Meyer and Michael A. Taitslin}, title = {Building Theories in Nuprl}, booktitle = {Logic at Botik '89, Symposium on Logical Foundations of Computer Science, Pereslav-Zalessky, USSR, July 3-8, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {363}, pages = {12--25}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-51237-3\_3}, doi = {10.1007/3-540-51237-3\_3}, timestamp = {Fri, 17 Jul 2020 16:12:47 +0200}, biburl = {https://dblp.org/rec/conf/ershov/Basin89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msiw/BasinV89, author = {David A. Basin and Peter Del Vecchio}, editor = {Miriam Leeser and Geoffrey Brown}, title = {Verification Of Combinational Logic in Nuprl}, booktitle = {Hardware Specification, Verification and Synthesis: Mathematical Aspects, Mathematical Science Institute Workshop, Cornall University, Ithaca, New York, USA, July 5-7, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {408}, pages = {333--357}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-97226-9\_36}, doi = {10.1007/0-387-97226-9\_36}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/msiw/BasinV89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/Basin88, author = {David A. Basin}, editor = {Ewing L. Lusk and Ross A. Overbeek}, title = {An Environment For Automated Reasoning About Partial Functions}, booktitle = {9th International Conference on Automated Deduction, Argonne, Illinois, USA, May 23-26, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {310}, pages = {101--110}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/BFb0012825}, doi = {10.1007/BFB0012825}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/Basin88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.