David Basin
David Basin
Professor of Computer Science, ETH Zurich
Verifierad e-postadress på inf.ethz.ch - Startsida
TitelCiteras avÅr
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
International conference on computer aided verification, 281-285, 2005
10102005
SecureUML: A UML-based modeling language for model-driven security
T Lodderstedt, D Basin, J Doser
International Conference on the Unified Modeling Language, 426-441, 2002
9562002
Model driven security: From UML models to access control infrastructures
D Basin, J Doser, T Lodderstedt
ACM Transactions on Software Engineering and Methodology (TOSEM) 15 (1), 39-91, 2006
6122006
OFMC: A symbolic model checker for security protocols
D Basin, S Mödersheim, L Vigano
International Journal of Information Security 4 (3), 181-208, 2005
5042005
An information-theoretic model for adaptive side-channel attacks
B Köpf, D Basin
Proceedings of the 14th ACM conference on Computer and communications …, 2007
3372007
Distributed usage control
A Pretschner, M Hilty, D Basin
Communications of the ACM, 39, 2006
2822006
The TAMARIN prover for the symbolic analysis of security protocols
S Meier, B Schmidt, C Cremers, D Basin
International Conference on Computer Aided Verification, 696-701, 2013
2662013
An on-the-fly model-checker for security protocol analysis
D Basin, S Mödersheim, L Vigano
European Symposium on Research in Computer Security, 253-270, 2003
2212003
Automated analysis of Diffie-Hellman protocols and advanced security properties
B Schmidt, S Meier, C Cremers, D Basin
2012 IEEE 25th Computer Security Foundations Symposium, 78-94, 2012
1922012
Rippling: meta-level guidance for mathematical reasoning
A Bundy, D Basin, D Hutter, A Ireland
Cambridge Univ Press, 2005
1822005
A policy language for distributed usage control
M Hilty, A Pretschner, D Basin, C Schaefer, T Walter
European Symposium on Research in Computer Security, 531-546, 2007
1802007
Model driven security for process-oriented systems
D Basin, J Doser, T Lodderstedt
Proceedings of the eighth ACM symposium on Access control models and …, 2003
1752003
On obligations
M Hilty, D Basin, A Pretschner
European Symposium on Research in Computer Security, 98-117, 2005
1572005
Secure neighborhood discovery: a fundamental element for mobile ad hoc networking
P Papadimitratos, M Poturalski, P Schaller, P Lafourcade, D Basin, ...
IEEE Communications Magazine 46 (2), 132-139, 2008
1432008
Automated analysis of security-design models
D Basin, M Clavel, J Doser, M Egea
Information and Software Technology 51 (5), 815-831, 2009
1342009
Search in Games with Incomplete Information
I Frank, D Basin
Search and Planning Under Incomplete Information, 89-123, 1998
125*1998
Sok: Secure data deletion
J Reardon, D Basin, S Capkun
2013 IEEE symposium on security and privacy, 301-315, 2013
1122013
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
992014
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
International Conference on Computer Aided Verification, 349-354, 2002
982002
A probabilistic approach to hybrid role mining
M Frank, AP Streich, D Basin, JM Buhmann
Proceedings of the 16th ACM conference on Computer and communications …, 2009
962009
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20