default search action
Dieter Hutter
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i5]Mario Gleirscher, Rehab Massoud, Dieter Hutter, Christoph Lüth:
How Deduction Systems Can Help You To Verify Stability Properties. CoRR abs/2404.10747 (2024) - 2021
- [i4]Tobias Brandt, Dieter Hutter, Christian Maeder, Rainer Müller:
Towards a Secure and Reliable IT-Ecosystem in Seaports. CoRR abs/2111.13436 (2021) - 2020
- [c62]Rhea C. Rinaldo, Dieter Hutter:
Integrated Analysis of Safety and Security Hazards in Automotive Systems. CyberICPS/SECPRE/ADIoT@ESORICS 2020: 3-18
2010 – 2019
- 2017
- [j11]Victor Ferman, Dieter Hutter, Raúl Monroy:
A Model Checker for the Verification of Browser Based Protocols. Computación y Sistemas 21(1) (2017) - 2016
- [c61]Helmar Hutschenreuter, Dieter Hutter:
Beherrschbarkeit komplexer Firmeninfrastrukturen durch eigenschaftsbasierte Sicherheit. GI-Jahrestagung 2016: 497-507 - [c60]Tim Schwartz, Michael Feld, Christian Bürckert, Svilen Dimitrov, Joachim Folz, Dieter Hutter, Peter Hevesi, Bernd Kiefer, Hans-Ulrich Krieger, Christoph Lüth, Dennis Mronga, Gerald Pirkl, Thomas Röfer, Torsten Spieldenner, Malte Wirkus, Ingo Zinnikus, Sirko Straube:
Hybrid Teams of Humans, Robots, and Virtual Agents in a Production Setting. Intelligent Environments 2016: 234-237 - 2015
- [j10]Berthold Hoffmann, Dieter Hutter, Hui Shi:
Preface. Int. J. Softw. Informatics 9(2): 113-115 (2015) - [c59]Serge Autexier, Dieter Hutter:
SHIP - A Logic-Based Language and Tool to Program Smart Environments. LOPSTR 2015: 313-328 - [c58]Serge Autexier, Dieter Hutter:
Structure Formation in Large Theories. CICM 2015: 155-170 - [i3]Serge Autexier, Dieter Hutter:
Structure Formation in Large Theories. CoRR abs/1505.01620 (2015) - 2014
- [j9]Thomas Bauereiß, Dieter Hutter:
Information flow control for workflow management systems. it Inf. Technol. 56(6): 294-299 (2014) - [c57]Thomas Bauereiss, Dieter Hutter:
Security (Hyper-)properties in Workflow Systems: From Specification to Verification. ESSoS Doctoral Symposium 2014 - [c56]Thomas Bauereiss, Dieter Hutter:
Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS. SEC 2014: 250-263 - [c55]Thomas Bauereiß, Dieter Hutter:
Possibilistic Information Flow Control for Workflow Management Systems. GraMSec 2014: 47-62 - 2013
- [c54]Serge Autexier, Dieter Hutter, Christoph Stahl:
An Implementation, Execution and Simulation Platform for Processes in Heterogeneous Smart Environments. AmI 2013: 3-18 - [c53]Serge Autexier, Dieter Hutter, Christian Mandel, Christoph Stahl:
SHIP-Tool Live: Orchestrating the Activities in the Bremen Ambient Assisted Living Lab - (Demo). AmI 2013: 269-274 - [c52]Serge Autexier, Dieter Hutter:
Constructive DL Update and Reasoning for Modeling and Executing the Orchestration of Heterogeneous Processes. Description Logics 2013: 501-512 - [c51]Thomas Bauereiss, Stefan Gohmann, Dieter Hutter, Alexander Kläser:
Selective LDAP Multi-Master Replication. Open Identity Summit 2013: 94-105 - [i2]Dieter Hutter, Raúl Monroy:
Strand-Based Approach to Patch Security Protocols. CoRR abs/1308.1888 (2013) - 2012
- [c50]Serge Autexier, Dominik Dietrich, Dieter Hutter, Christoph Lüth, Christian Maeder:
SmartTies - Management of Safety-Critical Developments. ISoLA (1) 2012: 238-252 - [c49]Serge Autexier, Dieter Hutter:
Structure Formation to Modularize Ontologies. WoMO 2012 - [i1]Alan Bundy, Dieter Hutter, Cliff B. Jones, J Strother Moore:
AI meets Formal Software Development (Dagstuhl Seminar 12271). Dagstuhl Reports 2(7): 1-29 (2012) - 2010
- [c48]Achim D. Brucker, Dieter Hutter:
Information Flow in Disaster Management Systems. ARES 2010: 156-163 - [c47]Serge Autexier, Dieter Hutter, Till Mossakowski:
Change Management for Heterogeneous Development Graphs. Verification, Induction, Termination Analysis 2010: 54-80
2000 – 2009
- 2009
- [c46]Dieter Hutter, Raúl Monroy:
On the Automated Correction of Protocols with Improper Message Encoding. ARSPA-WITS 2009: 138-154 - [c45]Dieter Hutter:
Semantic Management of Heterogeneous Documents. MICAI 2009: 1-14 - 2007
- [j8]Dieter Hutter, Heiko Mantel, Ina Schaefer, Axel Schairer:
Security of multi-agent systems: A case study on comparison shopping. J. Appl. Log. 5(2): 303-332 (2007) - [c44]Juan Carlos López Pimentel, Raúl Monroy, Dieter Hutter:
On the Automated Correction of Security Protocols Susceptible to a Replay Attack. ESORICS 2007: 594-609 - 2006
- [j7]Till Mossakowski, Serge Autexier, Dieter Hutter:
Development graphs - Proof management for structured specifications. J. Log. Algebraic Methods Program. 67(1-2): 114-145 (2006) - [c43]Dieter Hutter, Matthias Klusch, Melanie Volkamer:
Information Flow Analysis Based Security Checking of Health Service Composition Plans. ECEH 2006: 59-70 - [c42]Dieter Hutter:
Possibilistic Information Flow Control in MAKS and Action Refinement. ETRICS 2006: 268-281 - [c41]Fernando Godínez, Dieter Hutter, Raúl Monroy:
On the Use of Word Networks to Mimicry Attack Detection. ETRICS 2006: 423-435 - [c40]Dieter Hutter, Melanie Volkamer:
Information Flow Control to Secure Dynamic Web Service Composition. SPC 2006: 196-210 - [c39]Juan Carlos López Pimentel, Raúl Monroy, Dieter Hutter:
A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols. V&D@FLoC 2006: 117-130 - 2005
- [b2]Alan Bundy, David A. Basin, Dieter Hutter, Andrew Ireland:
Rippling - meta-level guidance for mathematical reasoning. Cambridge tracts in theoretical computer science 56, Cambridge University Press 2005, ISBN 978-0-521-83449-0, pp. I-XIII, 1-202 - [c38]Dieter Hutter, Werner Stephan:
A Portrait of a Scientist: Logic, AI and Politics. Mechanizing Mathematical Reasoning 2005: 1-13 - [c37]Dieter Hutter, Serge Autexier:
Formal Software Development in MAYA. Mechanizing Mathematical Reasoning 2005: 407-432 - [c36]Fernando Godínez, Dieter Hutter, Raúl Monroy:
Audit File Reduction Using N-Gram Models. Financial Cryptography 2005: 336-340 - [c35]Fernando Godínez, Dieter Hutter, Raúl Monroy:
On the Role of Information Compaction to Intrusion Detection. ISSADS 2005: 83-97 - [c34]Ewen Denney, Bernd Fischer, Dieter Hutter, Mark Jones:
Software certificate management (SoftCeMent'05). ASE 2005: 463 - [e5]Dieter Hutter, Werner Stephan:
Mechanizing Mathematical Reasoning, Essays in Honor of Jörg H. Siekmann on the Occasion of His 60th Birthday. Lecture Notes in Computer Science 2605, Springer 2005, ISBN 3-540-25051-4 [contents] - [e4]Dieter Hutter, Markus Ullmann:
Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings. Lecture Notes in Computer Science 3450, Springer 2005, ISBN 3-540-25521-4 [contents] - 2004
- [c33]Fernando Godínez, Dieter Hutter, Raúl Monroy:
Attribute Reduction for Effective Intrusion Detection. AWIC 2004: 74-83 - [c32]Dieter Hutter, Axel Schairer:
Possibilistic Information Flow Control in the Presence of Encrypted Communication. ESORICS 2004: 209-224 - [c31]Melanie Volkamer, Dieter Hutter:
From Legal Principles to an Internet Voting System. Electronic Voting in Europe 2004: 111-120 - [c30]Fernando Godínez, Dieter Hutter, Raúl Monroy:
Service Discrimination and Audit File Reduction for Effective Intrusion Detection. WISA 2004: 99-113 - [e3]Dieter Hutter, Günter Müller, Werner Stephan, Markus Ullmann:
Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers. Lecture Notes in Computer Science 2802, Springer 2004, ISBN 3-540-20887-9 [contents] - 2003
- [j6]Dieter Hutter, Heiko Mantel, Axel Schairer:
Informationsflusskontrolle als Grundlage für die Sicherheit von Multi-Agenten-Systemen. Prax. Inf.verarb. Kommun. 26(1): 39-47 (2003) - [c29]Dieter Hutter, Werner Stephan, Markus Ullmann:
Security and Privacy in Pervasive Computing State of the Art and Future Directions. SPC 2003: 285-289 - [c28]Dieter Hutter:
Deduction as an Engineering Science. FTP 2003: 1-8 - 2002
- [c27]Axel Schairer, Dieter Hutter:
Proof Transformations for Evolutionary Formal Software Development. AMAST 2002: 441-456 - [c26]Serge Autexier, Dieter Hutter, Till Mossakowski, Axel Schairer:
The Development Graph Manager MAYA. AMAST 2002: 495-501 - [c25]Serge Autexier, Dieter Hutter:
Maintenance of Formal Software Developments by Stratified Verification. LPAR 2002: 36-52 - [c24]Bernd Krieg-Brückner, Dieter Hutter, Arne Lindow, Christoph Lüth, Achim Mahnke, Erica Melis, Philipp Meier, Arnd Poetzsch-Heffter, Markus Roggenbach, George Russell, Jan-Georg Smaus, Martin Wirsing:
MultiMedia Instruction in Safe and Secure Systems. WADT 2002: 82-117 - [e2]Klaus Fischer, Dieter Hutter:
First International Workshop on Security of Mobile Multiagent Systems, SEMAS 2001, Montreal, Canada, May 29, 2001. Electronic Notes in Theoretical Computer Science 63, Elsevier 2002 [contents] - 2001
- [c23]Till Mossakowski, Serge Autexier, Dieter Hutter:
Extending Development Graphs with Hiding. FASE 2001: 269-283 - [c22]Dieter Hutter, Axel Schairer:
Towards an Evolutionary Formal Software Development. ASE 2001: 417-420 - [c21]Klaus Fischer, Dieter Hutter, Matthias Klusch, Werner Stephan:
Towards Secure Mobile Multiagent Based Electronic Marketplace Systems. SEMAS 2001: 59-76 - [c20]Klaus Fischer, Dieter Hutter:
Preface. SEMAS 2001: 181-182 - [c19]Axel Schairer, Serge Autexier, Dieter Hutter:
A Pragmatic Approach to Reuse in Tactical Theorem Proving. STRATEGIES@IJCAR 2001: 203-216 - 2000
- [j5]Dieter Hutter:
Annotated reasoning. Ann. Math. Artif. Intell. 29(1-4): 183-222 (2000) - [j4]Dieter Hutter, Michael Kohlhase:
Managing Structural Information by Higher-Order Colored Unification. J. Autom. Reason. 25(2): 123-164 (2000) - [j3]Dieter Hutter, Bruno Langenstein, Georg Rock, Jörg H. Siekmann, Werner Stephan, Roland Vogt:
Formal software development in the Verification Support Environment (VSE). J. Exp. Theor. Artif. Intell. 12(4): 383-406 (2000) - [j2]Serge Autexier, Dieter Hutter, Bruno Langenstein, Heiko Mantel, Georg Rock, Axel Schairer, Werner Stephan, Roland Vogt, Andreas Wolpers:
VSE: formal methods meet industrial needs. Int. J. Softw. Tools Technol. Transf. 3(1): 66-77 (2000) - [c18]Dieter Hutter, Georg Rock, Jörg H. Siekmann, Werner Stephan, Roland Vogt:
Formal Software Development in the Verification Support Environment (VSE). FLAIRS 2000: 367-376 - [c17]Dieter Hutter:
Management of Change in Structured Verification. ASE 2000: 23-
1990 – 1999
- 1999
- [c16]Serge Autexier, Dieter Hutter, Heiko Mantel, Axel Schairer:
System Description: inka 5.0 - A Logic Voyager. CADE 1999: 207-211 - [c15]Dieter Hutter, Alan Bundy:
The Design of the CADE-16 Inductive Theorem Prover Contest. CADE 1999: 374-377 - [c14]Serge Autexier, Dieter Hutter, Heiko Mantel, Axel Schairer:
Towards an Evolutionary Formal Software-Development Using CASL. WADT 1999: 73-88 - [e1]Dieter Hutter, Werner Stephan, Paolo Traverso, Markus Ullmann:
Applied Formal Methods - FM-Trends 98, International Workshop on Current Trends in Applied Formal Method, Boppard, Germany, October 7-9, 1998, Proceedings. Lecture Notes in Computer Science 1641, Springer 1999, ISBN 3-540-66462-9 [contents] - 1998
- [c13]Dieter Hutter, Heiko Mantel, Georg Rock, Werner Stephan, Andreas Wolpers, Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel:
VSE: Controlling the Complexity in Formal Software Developments. FM-Trends 1998: 351-358 - [c12]Dieter Hutter:
Deductive Verification of Invariants of State-Transition Systems. KI 1998: 153-164 - 1997
- [j1]Dieter Hutter:
Coloring Terms to Control Equational Reasoning. J. Autom. Reason. 18(3): 399-442 (1997) - [c11]Dieter Hutter, Michael Kohlhase:
A Colored Version of the Lambda-Calculus. CADE 1997: 291-305 - 1996
- [c10]Dieter Hutter, Claus Sengler:
INKA: The Next Generation. CADE 1996: 288-292 - [c9]Dieter Hutter, Bruno Langenstein, Claus Sengler, Jörg H. Siekmann, Werner Stephan, Andreas Wolpers:
Deduction in the Verification Support Environment (VSE). FME 1996: 268-286 - [c8]Dieter Hutter:
Using Rippling for Equational Reasoning. KI 1996: 121-133 - 1994
- [c7]Dieter Hutter:
Synthesis of Induction Orderings for Existence Proofs. CADE 1994: 29-41 - [c6]Jürgen Cleve, Dieter Hutter:
A Methodology for Equational Reasoning. HICSS (3) 1994: 569-579 - 1993
- [c5]Markus Ullmann, H. Hauff, D. Loevenich, P. Kejwal, R. Förster, P. Baur, Wolfgang Reif, Werner Stephan, Andreas Wolpers, Jürgen Cleve, Dieter Hutter, Claus Sengler, E. Canver:
VSE Verification Support Environment: Ein Werkzeug zur Entwicklung vertrauenswürdiger und zuverlässiger Systeme in Anlehnung an gültige Sicherheitskriterien. VIS 1993: 175-190 - 1992
- [c4]Dieter Hutter:
Adapting a Resolution Calculus for Inductive Proofs. ECAI 1992: 65-69 - 1991
- [b1]Dieter Hutter:
Mustergesteuerte Strategien für das Beweisen von Gleichungen. Karlsruhe Institute of Technology, Germany, 1991, pp. 1-129 - 1990
- [c3]Dieter Hutter:
Guiding Induction Proofs. CADE 1990: 147-161
1980 – 1989
- 1986
- [c2]Susanne Biundo, Birgit Hummel, Dieter Hutter, Christoph Walther:
The Karlsruhe Induction Theorem Proving System. CADE 1986: 672-674 - [c1]Dieter Hutter:
Using Resolution and Paramodulation for Induction Proofs. GWAI 1986: 265-276
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint