Name
Papers
Collaborators
DAVID A. BASIN
244
298
Citations 
PageRank 
Referers 
4930
281.93
5898
Referees 
References 
3282
3426
Search Limit
1001000
Title
Citations
PageRank
Year
DPL: A Language for GDPR Enforcement00.342022
Formal Verification of Secure Forwarding Protocols10.352021
Internet backbones in space70.492020
A Formally Verified, Optimized Monitor for Metric First-Order Dynamic Logic.00.342020
Scalable online monitoring of distributed systems00.342020
Natural Projection as Partial Model Checking00.342020
Privacy-Preserving OpenID Connect.00.342020
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust00.342020
A Formally Verified, Optimized Monitor for Metric First-Order Dynamic Logic.00.342020
Runtime Verification over Out-of-order Streams00.342020
The Next 700 Policy Miners: A Universal Method for Building Policy Miners10.352019
Proxy Certificates: The Missing Link in the Web's Chain of Trust.00.342019
From Natural Projection to Partial Model Checking and Back.00.342018
Cardinality Estimators do not Preserve Privacy.00.342018
Tests and Refutation.00.342017
Runtime Verification Of Temporal Properties Over Out-Of-Order Data Streams00.342017
Symbolically analyzing security protocols using tamarin.00.342017
Security Testing Beyond Functional Tests.20.362016
Scalable offline monitoring of temporal specifications.80.432016
Greedily computing associative aggregations on sliding windows.30.542015
Optimal Security-Aware Query Processing.00.342014
Automated Verification of Group Key Agreement Protocols160.672014
On Secure Data Deletion20.402014
Decentralized Composite Access Control.00.342014
A Model-Driven Methodology for Developing Secure Data-Management Applications40.412014
Deciding safety and liveness in TPTL20.382014
Fail-Secure Access Control20.372014
Formal System Modelling Using Abstract Data Types in Event-B.40.462014
Monitoring of Temporal First-Order Properties with Aggregations.110.492013
The TAMARIN prover for the symbolic analysis of security protocols1002.512013
Symbolic Probabilistic Analysis of Off-Line Guessing.10.382013
SecFuzz: fuzz-testing security protocols120.722012
Monitoring Compliance Policies over Incomplete and Disagreeing Logs.140.552012
The research value of publishing attacks40.432012
Enforceable security policies revisited140.622012
Optimal workflow-aware authorizations120.642012
Constructing mid-points for two-party asynchronous protocols10.362011
Algorithms for monitoring real-time properties200.762011
Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives301.222011
Distributed temporal logic for the analysis of security protocol models100.662011
Monitoring Usage-Control Policies in Distributed Systems100.802011
FAST: An Efficient Decision Procedure for Deduction and Static Equivalence20.392011
Model-driven development of security-aware GUIs for data-centric applications40.412011
Formal Reasoning about Physical Properties of Security Protocols90.492011
Impossibility Results for Secret Establishment10.352010
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010334.032010
Efficient decision procedures for message deducibility and static equivalence30.432010
Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs100.762010
Keeping data secret under full compromise using porter devices70.662010
Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009262.332009
  • 1
  • 2