DPL: A Language for GDPR Enforcement | 0 | 0.34 | 2022 |
Formal Verification of Secure Forwarding Protocols | 1 | 0.35 | 2021 |
Internet backbones in space | 7 | 0.49 | 2020 |
A Formally Verified, Optimized Monitor for Metric First-Order Dynamic Logic. | 0 | 0.34 | 2020 |
Scalable online monitoring of distributed systems | 0 | 0.34 | 2020 |
Natural Projection as Partial Model Checking | 0 | 0.34 | 2020 |
Privacy-Preserving OpenID Connect. | 0 | 0.34 | 2020 |
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust | 0 | 0.34 | 2020 |
A Formally Verified, Optimized Monitor for Metric First-Order Dynamic Logic. | 0 | 0.34 | 2020 |
Runtime Verification over Out-of-order Streams | 0 | 0.34 | 2020 |
The Next 700 Policy Miners: A Universal Method for Building Policy Miners | 1 | 0.35 | 2019 |
Proxy Certificates: The Missing Link in the Web's Chain of Trust. | 0 | 0.34 | 2019 |
From Natural Projection to Partial Model Checking and Back. | 0 | 0.34 | 2018 |
Cardinality Estimators do not Preserve Privacy. | 0 | 0.34 | 2018 |
Tests and Refutation. | 0 | 0.34 | 2017 |
Runtime Verification Of Temporal Properties Over Out-Of-Order Data Streams | 0 | 0.34 | 2017 |
Symbolically analyzing security protocols using tamarin. | 0 | 0.34 | 2017 |
Security Testing Beyond Functional Tests. | 2 | 0.36 | 2016 |
Scalable offline monitoring of temporal specifications. | 8 | 0.43 | 2016 |
Greedily computing associative aggregations on sliding windows. | 3 | 0.54 | 2015 |
Optimal Security-Aware Query Processing. | 0 | 0.34 | 2014 |
Automated Verification of Group Key Agreement Protocols | 16 | 0.67 | 2014 |
On Secure Data Deletion | 2 | 0.40 | 2014 |
Decentralized Composite Access Control. | 0 | 0.34 | 2014 |
A Model-Driven Methodology for Developing Secure Data-Management Applications | 4 | 0.41 | 2014 |
Deciding safety and liveness in TPTL | 2 | 0.38 | 2014 |
Fail-Secure Access Control | 2 | 0.37 | 2014 |
Formal System Modelling Using Abstract Data Types in Event-B. | 4 | 0.46 | 2014 |
Monitoring of Temporal First-Order Properties with Aggregations. | 11 | 0.49 | 2013 |
The TAMARIN prover for the symbolic analysis of security protocols | 100 | 2.51 | 2013 |
Symbolic Probabilistic Analysis of Off-Line Guessing. | 1 | 0.38 | 2013 |
SecFuzz: fuzz-testing security protocols | 12 | 0.72 | 2012 |
Monitoring Compliance Policies over Incomplete and Disagreeing Logs. | 14 | 0.55 | 2012 |
The research value of publishing attacks | 4 | 0.43 | 2012 |
Enforceable security policies revisited | 14 | 0.62 | 2012 |
Optimal workflow-aware authorizations | 12 | 0.64 | 2012 |
Constructing mid-points for two-party asynchronous protocols | 1 | 0.36 | 2011 |
Algorithms for monitoring real-time properties | 20 | 0.76 | 2011 |
Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives | 30 | 1.22 | 2011 |
Distributed temporal logic for the analysis of security protocol models | 10 | 0.66 | 2011 |
Monitoring Usage-Control Policies in Distributed Systems | 10 | 0.80 | 2011 |
FAST: An Efficient Decision Procedure for Deduction and Static Equivalence | 2 | 0.39 | 2011 |
Model-driven development of security-aware GUIs for data-centric applications | 4 | 0.41 | 2011 |
Formal Reasoning about Physical Properties of Security Protocols | 9 | 0.49 | 2011 |
Impossibility Results for Secret Establishment | 1 | 0.35 | 2010 |
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010 | 33 | 4.03 | 2010 |
Efficient decision procedures for message deducibility and static equivalence | 3 | 0.43 | 2010 |
Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs | 10 | 0.76 | 2010 |
Keeping data secret under full compromise using porter devices | 7 | 0.66 | 2010 |
Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009 | 26 | 2.33 | 2009 |