Logic in Computer Science: Modelling and reasoning about systems M Huth, M Ryan Cambridge university press, 2004 | 2258 | 2004 |
Modal transition systems: A foundation for three-valued program analysis M Huth, R Jagadeesan, D Schmidt European Symposium on Programming, 155-169, 2001 | 271 | 2001 |
Abstraction-based model checking using modal transition systems P Godefroid, M Huth, R Jagadeesan International Conference on Concurrency Theory, 426-440, 2001 | 211 | 2001 |
Quantitative analysis and model checking M Huth, M Kwiatkowska Proceedings of Twelfth Annual IEEE Symposium on Logic in Computer Science …, 1997 | 154 | 1997 |
Assume-guarantee model checking of software: A comparative case study CS Păsăreanu, MB Dwyer, M Huth International SPIN Workshop on Model Checking of Software, 168-183, 1999 | 132 | 1999 |
Relationship-based access control: its expression and enforcement through hybrid logic G Bruns, PWL Fong, I Siahaan, M Huth Proceedings of the second ACM conference on Data and Application Security …, 2012 | 93 | 2012 |
A simple and expressive semantic framework for policy composition in access control G Bruns, DS Dantas, M Huth Proceedings of the 2007 ACM workshop on Formal methods in security …, 2007 | 76 | 2007 |
Access control via Belnap logic: Intuitive, expressive, and analyzable policy composition G Bruns, M Huth ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-27, 2011 | 68 | 2011 |
20 years of modal and mixed specifications A Antonik, M Huth, KG Larsen, U Nyman, A Wasowski Bulletin of the European Association for Theoretical Computer Science, 2008 | 59* | 2008 |
Access-control policies via Belnap logic: Effective and efficient composition and analysis G Bruns, M Huth 2008 21st IEEE Computer Security Foundations Symposium, 163-176, 2008 | 56 | 2008 |
Model checking vs. generalized model checking: Semantic minimizations for temporal logics P Godefroid, M Huth 20th Annual IEEE Symposium on Logic in Computer Science (LICS'05), 158-167, 2005 | 43 | 2005 |
Complexity of decision problems for mixed and modal specifications A Antonik, M Huth, KG Larsen, U Nyman, A Wąsowski International Conference on Foundations of Software Science and …, 2008 | 42 | 2008 |
Towards an access-control framework for countering insider threats J Crampton, M Huth Insider Threats in Cyber Security, 173-195, 2010 | 40 | 2010 |
On finite-state approximants for probabilistic computation tree logic M Huth Theoretical Computer Science 346 (1), 113-134, 2005 | 36 | 2005 |
A domain equation for refinement of partial systems MRA Huth, R Jagadeesan, DA Schmidt | 36 | 2004 |
An authorization framework resilient to policy evaluation failures J Crampton, M Huth European Symposium on Research in Computer Security, 472-487, 2010 | 31 | 2010 |
On model checking multiple hybrid views A Hussain, M Huth Proceedings of 1st international symposium on leveraging applications of …, 2004 | 30 | 2004 |
Secure communicating systems: design, analysis, and implementation M Huth, MRA Huth Cambridge University Press, 2001 | 29 | 2001 |
Model checking modal transition systems using Kripke structures M Huth International Workshop on Verification, Model Checking, and Abstract …, 2002 | 27 | 2002 |
Linear domains and linear maps M Huth International Conference on Mathematical Foundations of Programming …, 1993 | 27 | 1993 |