Seguir
David Basin
David Basin
Professor of Computer Science, ETH Zurich
Dirección de correo verificada de inf.ethz.ch - Página principal
Título
Citado por
Citado por
Año
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
15712005
SecureUML: A UML-based modeling language for model-driven security
T Lodderstedt, D Basin, J Doser
International Conference on the Unified Modeling Language, 426-441, 2002
11762002
The TAMARIN prover for the symbolic analysis of security protocols
S Meier, B Schmidt, C Cremers, D Basin
Computer Aided Verification: 25th International Conference, CAV 2013, Saint …, 2013
8062013
Model driven security: From UML models to access control infrastructures
D Basin, J Doser, T Lodderstedt
ACM Transactions on Software Engineering and Methodology (TOSEM) 15 (1), 39-91, 2006
7192006
Handbook of model checking
EM Clarke, TA Henzinger, H Veith, R Bloem
Springer 10, 978-3, 2018
7032018
OFMC: A symbolic model checker for security protocols
D Basin, S Mödersheim, L Vigano
International Journal of Information Security 4, 181-208, 2005
6602005
An information-theoretic model for adaptive side-channel attacks
B Köpf, D Basin
Proceedings of the 14th ACM conference on Computer and communications …, 2007
4582007
A formal analysis of 5G authentication
D Basin, J Dreier, L Hirschi, S Radomirovic, R Sasse, V Stettler
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
4242018
Distributed usage control
A Pretschner, M Hilty, D Basin
Communications of the ACM 49 (9), 39-44, 2006
3432006
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
3412020
Automated analysis of Diffie-Hellman protocols and advanced security properties
B Schmidt, S Meier, C Cremers, D Basin
2012 IEEE 25th Computer Security Foundations Symposium, 78-94, 2012
3202012
An on-the-fly model-checker for security protocol analysis
D Basin, S Mödersheim, L Vigano
Computer Security–ESORICS 2003: 8th European Symposium on Research in …, 2003
2582003
A policy language for distributed usage control
M Hilty, A Pretschner, D Basin, C Schaefer, T Walter
Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007
2352007
Rippling: meta-level guidance for mathematical reasoning
A Bundy, D Basin, D Hutter, A Ireland
Cambridge Univ Press, 2005
2172005
Monitoring metric first-order temporal properties
D Basin, F Klaedtke, S Müller, E Zălinescu
Journal of the ACM (JACM) 62 (2), 1-45, 2015
2092015
Sok: Secure data deletion
J Reardon, D Basin, S Capkun
2013 IEEE symposium on security and privacy, 301-315, 2013
2022013
Model driven security for process-oriented systems
D Basin, J Doser, T Lodderstedt
Proceedings of the eighth ACM symposium on Access control models and …, 2003
2022003
On obligations
M Hilty, D Basin, A Pretschner
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
1812005
Automated analysis of security-design models
D Basin, M Clavel, J Doser, M Egea
Information and Software Technology 51 (5), 815-831, 2009
1722009
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1702014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20