Journals

  1. Algorithms for Monitoring Real-time Properties.
    To appear in Acta Informatica, 2017.

  2. Large-scale System Development using Abstract Data Types and Refinement.
    Science of Computer Programming, 2016.

  3. Scalable Offline Monitoring of Temporal Specifications.
    Formal Methods in System Design, 2016.

  4. Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public Key Infrastructure.
    IEEE Transactions on Dependable and Secure Computing, 2016.

  5. Monitoring of Temporal First-order Properties with Aggregations.
    Formal Methods in System Design, 2015.

  6. Monitoring Metric First-order Temporal Properties.
    Journal of the ACM, 2015.

  7. Greedily Computing Associative Aggregations on Sliding Windows.
    Information Processing Letters, 2015.

  8. Know your Enemy: Compromising Adversaries in Protocol Analysis.
    ACM Transactions on Information and System Security, 2014.

  9. Deciding Safety and Liveness in TPTL.
    Information Processing Letters, 2014.

  10. A Model-Driven Methodology for Developing Secure Data-Management Applications.
    IEEE Transactions on Software Engineering, 2014.

  11. LTL is Closed Under Topological Closure.
    Information Processing Letters, 2014.

  12. Obstruction-free Authorization Enforcement: Aligning Security and Business Objectives.
    Journal of Computer Security, 2014.

  13. Monitoring Data Usage in Distributed Systems.
    IEEE Transactions on Software Engineering, 2013.

  14. Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication.
    Journal of Computer Security, 2013.

  15. Predictable Mobile Routing for Spacecraft Networks.
    IEEE Transactions on Mobile Computing, 2013.

  16. Role Mining with Probabilistic Models.
    ACM Transactions on Information and System Security, 2013.

  17. Efficient Construction of Machine-Checked Symbolic Protocol Security Proofs.
    Journal of Computer Security, 2013.

  18. Enforceable Security Policies Revisited.
    ACM Transactions on Information and System Security. 2013.

  19. Dyanmic Enforcement of Abstract Separation of Duty Constraints.
    ACM Transactions on Information and System Security, 2012.

  20. Multi-Assignment Clustering for Boolean Data.
    Journal of Machine Learning Research, 2012.

  21. Formal Reasoning about Physical Properties of Security Protocols.
    ACM Transactions on Information and System Security, 2011.

  22. Distributed Temporal Logic for the Analysis of Security Protocol Models.
    Theoretical Computer Science, 2011.

  23. Automatically Deriving Information-theoretic Bounds for Adaptive Side-channel Attacks.
    Journal of Computer Security, 2011.

  24. Constraint Differentiation: Search-Space Reduction for the Constraint-Based Analysis of Security Protocols.
    Journal of Computer Security, 2010.

  25. Efficient Analysis of Pattern-Based Constraint Specifications.
    Software and Systems Modeling, 2010.

  26. Labelled Tableaux for Distributed Temporal Logic.
    Journal of Logic and Computation, 2009.

  27. Developing Topology Discovery in Event-B.
    Science of Computer Programming, 2009.

  28. Automated Analysis of Security Design Models.
    Information and Software Technology, 2009.

  29. SSL/TLS Session-aware User Authentication Revisited.
    Computers & Security, 2008.

  30. Verifying a Signature Architecture --- A Comparative Case Study.
    Formal Aspects of Computing, 2007.

  31. On the Semantics of Alice&Bob Specifications of Security Protocols.
    Theoretical Computer Science, 2006.

  32. SSL/TLS Session-Aware User Authentication --- Or How to Effectively Thwart the Man-in-the-Middle.
    Computer Communications, 2006.

  33. Model Driven Security: from UML Models to Access Control Infrastructures.
    ACM Transactions on Software Engineering and Methodology, 2006.

  34. Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis.
    Logic Journal of the IGPL, 2005.

  35. OFMC: A Symbolic Model-Checker for Security Protocols.
    International Journal of Information Security, 2005.

  36. Reflective Metalogical Frameworks.
    ACM Transactions on Computational Logic, 2004.

  37. Bytecode Verification by Model Checking.
    Journal of Automated Reasoning, 2003.

  38. Decision Procedures for Inductive Boolean Functions based on Alternating Automata.
    Theoretical Computer Science, 2003.

  39. A Higher-Order Interpretation of Deductive Tableau.
    Journal of Symbolic Computation, 2001.

  40. Automated Complexity Analysis Based on Ordered Resolution.
    Journal of the ACM, 2001.

  41. A Theoretical and Empirical Investigation of Search in Imperfect Information Games.
    Theoretical Computer Science, 2001.

  42. Structuring Metatheory on Inductive Definitions.
    Information and Computation, 2000.

  43. Program Development Schemata as Derived Rules.
    Journal of Symbolic Computation, 2000.

  44. Modeling a Hardware Synthesis Methodology in Isabelle.
    Formal Methods in Systems Design, 1999.

  45. Logical Framework Based Program Development.
    ACM Computing Surveys, 1998.

  46. Automata Based Symbolic Reasoning in Hardware Verification.
    Formal Methods in Systems Design, 1998.

  47. Search in Games with Incomplete Information: A Case Study using Bridge Card Play.
    Artificial Intelligence, 1998.

  48. Labelled Modal Logics: Quantifiers.
    The Journal of Logic, Language, and Information, 1998.

  49. Natural Deduction for Non-Classical Logics.
    Studia Logica, 1998.

  50. Labelled Propositional Modal Logics: Theory and Practice.
    Journal of Logic and Computation, 1997.

  51. Adding Metatheoretic Facilities to First-order Theories.
    Journal of Logic and Computation, 1996.

  52. A Calculus for and Termination of Rippling.
    Journal of Automated Reasoning, 1996.

  53. Middle-Out Reasoning for Logic Program Synthesis.
    Journal of Automated Reasoning, 1996.

  54. Generalized Rewriting in Type Theory.
    Journal of Information Processing and Cybernetics, 1995.

  55. A Term Equality Problem Equivalent to Graph Isomorphism.
    Information Processing Letters, 1994.

  56. A Recursion Planning Analysis of Inductive Completion.
    Annals of Artificial Intelligence and Mathematics, 1993.

  57. Formally Verified Synthesis of Combinational CMOS Circuits.
    Integration: The International Journal of VLSI Design, 1991.

Magazine Articles

  1. Improving the Security of Cryptographic Protocol Standards (IEEE Preprint).
    IEEE Security & Privacy.

  2. On Secure Data Deletion.
    IEEE Security & Privacy, 2014.

  3. Verification for Monitoring Requirements of Train Monitoring Systems in Event-B.
    Information Processing Society of Japan, 2013.

  4. The Research Value of Publishing Attacks.
    Communications of the ACM, 2012.

  5. Conflict or Review --- Two Approaches to an Information Security Laboratory.
    Communications of the ACM, 2008.

  6. SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates.
    IEEE Computer, 2008.

  7. Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking.
    IEEE Communications, 2008.

  8. The Z Specification Language and the Proof Environment Isabelle/HOL-Z. (In Japanese)
    Computer Software --- Journal of the Japanese Society for Software Science and Technology, 2007.

  9. Distributed Usage Control.
    Communications of the ACM, 2006.
    See also the German version, which appeared in Digma, 2007.

  10. A Formal Analysis of a Digital Signature System. (In Japanese)
    Computer Software --- Journal of the Japanese Society for Software Science and Technology, 2005.

  11. Konflikt oder Review --- zwei Ansätze für Labors in angewandter Informationssicherheit. (In German)
    Informatik Spektrum, 2005.

Books

  1. Applied Information Security --- A Hands-on Approach.
    Springer Verlag, 2011.

  2. Rippling: Meta-level Guidance for Mathematical Reasoning.
    Cambridge Tracts in Theoretical Computer Science, No. 56, June 2005.

Chapters in Books

  1. Model Checking Security Protocols.
    Handbook of Model Checking, To appear.

  2. Model-Driven Development of a Secure eHealth Application.
    Engineering Secure Future Inernet Services and Systems, 2014.

  3. Technology Transfer.
    Industrial Deployment of System Engineering Methods, 2013.

  4. Model-Driven Develoment of Security-Aware GUIs for Data-Centric Applications.
    Foundations of Security Analysis and Design VI (FOSAD Tutorial Lectures), 2011.

  5. Model Driven Security.
    Engineering Theories of Software Intensive Systems, 2004.

  6. A Formal Analysis of a Digital Signature Architecture.
    6th Conference on Integrity and Internal Control in Information Systems, 2004.

  7. Synthesis of Programs in Computational Logic.
    Program Development in Computational Logic, 2004.

  8. Logical Frameworks.
    Handbook of Philosophical Logic, 2002.

  9. Combining WS1S with HOL.
    Frontiers of Combining Systems 2, 2000.

  10. A Recipe for the Complexity Analysis of Non-Classical Logics.
    Frontiers of Combining Systems 2, 2000.

  11. Formalization of the Development Process.
    Algebraic Foundations of System Specification, 1988.

  12. A Modular Presentation of Modal Logics in a Logical Framework.
    The Tbilisi Symposium on Logic, Language, and Computation, 1998.

  13. A Topography of Labelled Modal Logics.
    Frontiers of Combining Systems, 1996.

  14. Logic Program Synthesis via Proof Planning.
    Logic Programming Synthesis and Transformation, 1993.

  15. Metalogical Frameworks.
    Logical Environments, 1993.

  16. Experience with FS0 as a Framework Theory.
    Logical Environments, 1993.

  17. The Boyer-Moore Prover and Nuprl: An Experimental Comparison.
    Logical Frameworks, 1991.

Conference and Workshop Proceedings

  1. Runtime Verification of Temporal Properties over Out-of-order Data Streams.
    To appear in 29th International Conference on Computer-Aided Verification (CAV), 2017.

  2. Cutoff Bounds for Consensus Algorithms.
    To appear in 29th International Conference on Computer-Aided Verification (CAV), 2017.

  3. Almost Event-Rate Independent Monitoring of Metric Temporal Logic.
    To appear in 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), 2017.

  4. Refining Authenticated Key Agreement with Strong Adversaries.
    To appear in 2nd IEEE European Symposium on Security and Privacy (Euro S&P), 2017.

  5. Modeling Human Errors in Security Protocols.
    29th IEEE Computer Security Foundations Symposium, 2016.

  6. Access Control Synthesis for Physical Spaces.
    29th IEEE Computer Security Foundations Symposium, 2016.

  7. In the Nick of Time: Proactive Prevention of Obligation Violations.
    29th IEEE Computer Security Foundations Symposium, 2016.

  8. Strong and Provably Secure Database Access Control.
    1st IEEE European Symposium on Security and Privacy (Euro S&P), 2016.

  9. Security Testing Beyond Functional Tests.
    Eight International Symposium on Engineering Secure Software and Systems (ESSOS), 2016.

  10. Failure-aware Runtime Verification of Distributed Systems.
    35th Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTCCS), 2015.

  11. Automated Symbolic Proofs of Observational Equivalence.
    22nd ACM Conference on Computer and Communications Security (CCS), 2015.

  12. Alice and Bob Meet Equational Theories.
    Logic, Rewriting, and Concurrency, 2015.

  13. Semantic Vacuity.
    22nd International Symposium on Temporal Representation and Reasoning (TIME), 2015.

  14. Analyzing First-order Role Based Access Control.
    28th Computer Security Foundations (CSF), 2015.

  15. A Complete Characterization of Secure Human-Server Communication.
    28th Computer Security Foundations (CSF), 2015.

  16. Consensus Refined.
    45th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2015.

  17. Fail-Secure Access Control.
    21st ACM Conference on Computer and Communications Security (CCS), 2014.

  18. ARPKI: Attack Resilient Public-key Infrastructure.
    21st ACM Conference on Computer and Communications Security (CCS), 2014.

  19. Scalable Offline Monitoring.
    5th International Conference on Runtime Verification (RV), 2014.

  20. On Real-time Monitoring with Imprecise Timestamps.
    5th International Conference on Runtime Verification (RV), 2014.

  21. Optimal Security-Aware Query Processing.
    40th International Conference on Very Large Data Bases (VLDB), 2014.

  22. Code Generation for Event-B.
    11th International Conference on Integrated Formal Methods (IFM), 2014.

  23. Detection of GPS Spoofing Attacks in Power Grids.
    7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2014.

  24. Anchored LTL Separation.
    Twenty-Third Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 2014.

  25. Actor Key Compromise: Consequences and Countermeasures.
    Computer Security Foundations (CSF), 2014.

  26. Formal System Modelling Using Abstract Data Types in Event-B.
    4th International ABZ Conference, 2014.

  27. Automated Verification of Group Key Agreement Protocols.
    IEEE Symposium on Security and Privacy, 2014.

  28. Decentralized Composite Access Control.
    3rd Conference on Principles of Security and Trust (POST), 2014.

  29. Secure Data Deletion from Persistent Media.
    20th ACM Conference on Computer and Communications Security (CCS), 2013.

  30. Symbolic Probabilistic Analysis of Off-line Guessing.
    18th European Symposium on Research in Computer Security (ESORICS), 2013.

  31. Monitoring of Temporal First-Order Properties with Aggregations.
    4th International Conference on Runtime Verification (RV), 2013.

  32. The TAMARIN Prover for the Symbolic Analysis of Security Protocols.
    25th International Conference on Computer Aided Verification (CAV), 2013.

  33. Semi-valid Input Coverage for Fuzz Testing.
    International Symposium on Software Testing and Analysis (ISSTA), 2013.

  34. Secure Data Deletion
    IEEE Symposium on Security and Privacy, 2013.

  35. Monitoring Compliance Policies over Incomplete and Disagreeing Logs (full version).
    3rd International Conferene on Runtime Verification (RV), 2012.

  36. Automated Analysis of Diffie- Hellman Protocols and Advanced Security Properties.
    25th IEEE Computer Security Foundations Symposium (CSF), 2012.

  37. Refining Key Establishment.
    25th IEEE Computer Security Foundations Symposium (CSF), 2012.

  38. Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory.
    21st USENIX Security Symposium, 2012.

  39. SecFuzz: Fuzz-testing Security Protocols.
    7th International Workshop on Automation of Software Test, 2012.

  40. Optimal Workflow-aware Authorizations.
    17th ACM Symposium on Access Control Models and Technologies (SACMAT), 2012.

  41. User-Level Secure Deletion on Log-structured File Systems.
    7th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012.

  42. Enforceable Security Policies Revisited.
    1st Conference on Principles of Security and Trust (POST), 2012.

  43. Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication.
    1st Conference on Principles of Security and Trust (POST), 2012.

  44. Constructing Mid-Points for Two-Party Asynchronous Protocols.
    15th International Conference On Principles Of Distributed Systems (OPODIS), 2011.

  45. MONPOLY: Monitoring Usage-control Policies.
    2nd International Conference on Runtime Verification (RV), 2011.

  46. Algorithms for Monitoring Real-time Properties. (full version).
    2nd International Conference on Runtime Verification (RV), 2011.

  47. Monitoring Usage-control Policies in Distributed Systems (full version).
    8th International Symposium on Temporal Representation and Reasoning (TIME), 2011.

  48. Separation of Duties as a Service.
    6th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2011.

  49. Obstruction-free Authorization Enforcement: Aligning Security With Business Objectives.
    24th IEEE Computer Security Foundations Symposium (CSF), 2011.

  50. A Decade of Model-Driven Security.
    16th ACM Symposium on Access Control Models and Technologies (SACMAT), 2011.

  51. FAST: An Efficient Decision Procedure for Deduction and Static Equivalence.
    22nd International Conference on Rewriting Techniques and Applications (RTA), 2011.

  52. Keeping Data Secret under Full Compromise using Porter Devices.
    Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2010.

  53. Developing Security Protocols by Refinement.
    17th ACM Conference on Computer and Communications Security (CCS), 2010.

  54. Efficient Decision Procedures for Message Deducibility and Static Equivalence.
    Formal Aspects in Security and Trust (FAST), 2010.

  55. Modeling and Analyzing Security in the Presence of Compromising Adversaries.
    The 15th European Symposium on Research in Computer Security (ESORICS), 2010.

  56. Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries.
    19th EACSL Annual Conference on Computer Science Logic (CSL), 2010.

  57. Policy Monitoring in First-order Temporal Logic.
    22nd International Conference on Computer-Aided Verification (CAV), 2010.

  58. Impossibility Results for Secret Establishment.
    23rd IEEE Computer Security Foundations Symposium (CSF), 2010.

  59. Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs.
    23rd IEEE Computer Security Foundations Symposium (CSF), 2010.

  60. On the Definition of Role Mining.
    15th ACM Symposium on Access Control Models and Technologies (SACMAT), 2010.

  61. SSG: A Model-Based Development Environment for Smart, Security-Aware GUIs.
    32nd ACM/IEEE Conference on Software Engineering (ICSE), 2010.

  62. Monitoring Security Policies with Metric First-order Temporal Logic.
    15th ACM Symposium on Access Control Models and Technologies (SACMAT), 2010.

  63. Automatic Generation of Smart, Security-Aware GUI Models.
    International Symposium on Engineering Secure Software and Systems (ESSOS), 2010.

  64. How to Evaluate the Security of Real-life Cryptographic Protocols? The cases of ISO/IEC 29128 and CRYPTREC.
    1st Workshop on Real-life Cryptographic Protocols and Standardization, 2010.

  65. A Probabilistic Approach to Hybrid Role Mining.
    16th ACM Conference on Computer and Communications Security, 2009.

  66. Dynamic Enforcement of Abstract Separation of Duty Constraints.
    14th European Symposium on Research in Computer Security (ESORICS), 2009.

  67. Let's Get Physical: Models and Methods for Real-World Security Protocols.
    22nd International Conference on Theorem Proving in Higher Order Logics (TPHOLs), 2009.

  68. Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks.
    22nd IEEE Computer Security Foundations Symposium (CSF), 2009.

  69. Automatic Generation of Security-Aware GUI Models.
    Security in Model Driven Architecture (Sec-MDA), 2009.

  70. Multi-Assignment Clustering for Boolean Data.
    26th International Conference on Machine Learning (ICML), 2009.

  71. Developing Topology Discovery in Event-B.
    7th International Conference on Integrated Formal Methods (IFM), 2009.

  72. Runtime Monitoring of Metric First-order Temporal Properties.
    Foundations of Software Technology and Theoretical Computer Science (FSTTCS), 2008.

  73. Topology Dynamics and Routing for Predictable Mobile Networks.
    16th IEEE International Conference on Network Protocols (ICNP), 2008

  74. Cryptographically-sound Protocol-model Abstractions.
    Logic in Computer Science (LICS), 2008.

  75. Cryptographically-sound Protocol-model Abstractions.
    Compuer Security Foundations (CSF), 2008.

  76. A Class of Probabilistic Models for Role Engineering.
    15th ACM Conference on Computer and Communications Security (CCS), 2008.

  77. A Labeled Tableaux System for the Distributed Temporal Logic DTL.
    15th International Symposium on Temporal Representationand Reasoning (TIME), 2008.

  78. Mechanisms for Usage Control.
    ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2008.

  79. An Information-Theoretic Model for Adaptive Side-Channel Attacks.
    14th ACM Conference on Computer and Communications Security (CCS), 2007.
  80. A Policy Language for Distributed Usage Control.
    12th European Symposium on Research in Computer Security (ESORICS), 2007.
  81. A Metamodel-Based Approach for Analyzing Security-Design Models.
    ACM/IEEE 10th International Conference on Model Driven Engineering Languages and Systems (MODELS), 2007.

  82. A Monad-based Modeling and Verification Toolbox with Application to Security Protocols.
    20th International Conference on Theorem Proving in Higher Order Logics (TPHOLs), 2007.

  83. BAP: Broadcast Authentication Using Cryptographic Puzzles.
    International Conference on Applied Cryptography and Network Security (ACNS), 2007.
  84. Midpoints versus Endpoints: From Protocols to Firewalls.
    5th International Conference on Applied Cryptography and Network Security (ACNS), 2007.

  85. Securing the Distribution and Storage of Secrets with Trusted Platform Modules.
    Workshop on Information Security Theory and Practice (WISTP), 2007.

  86. Specifying and Analyzing Security Automata using CSP-OZ.
    2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2007.

  87. A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication.
    Kommunikation in Verteilten Systemen (KiVS), 2007.

  88. Formalizing and Analyzing Sender Invariance.
    Formal Aspects of Security and Trust (FAST), 2007.

  89. Timing-Sensitive Information Flow Analysis for Synchronous Systems.
    11th European Symposium on Research in Computer Security (ESORICS), 2006.

  90. Cryptographically Sound Theorem Proving.
    19th IEEE Computer Security Foundations Workshop (CSFW), 2006.

  91. Controlling Access to Documents: A Formal Access Control Model.
    International Conference on Emerging Trends in Information and Communication Security (ETRICS), 2006.

  92. Algebraic Intruder Deductions.
    12th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR), 2005.

  93. On Obligations.
    10th European Symposium on Research in Computer Security (ESORICS), 2005.

  94. Verification of a Signature Architecture with HOL-Z.
    Formal Methods (FM), 2005.

  95. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
    17th International Conference on Computer Aided Verification (CAV), 2005.

  96. Deconstructing Alice and Bob.
    Workshop on Automated Reasoning for Security Protocol Analysis, 2005.

  97. Firewall Conformance Testing.
    Testing of Communicating Systems (TestCom), 2005.

  98. Metareasoning about Security Protocols using Distributed Temporal Logic.
    Workshop on Automated Reasoning for Security Protocol Analysis, 2004.

  99. Towards a Metalogic for Security Protocol Analysis.
    Proceedings of the Workshop on the Combination of Logics: Theory and Applications, 2004.

  100. Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols.
    10th ACM Conference on Computer and Communications Security (CCS), 2003.

  101. An On-The-Fly Model-Checker for Security Protocol Analysis.
    8th European Symposium on Research in Computer Security (ESORICS), 2003.

  102. Model Driven Security for Process-Oriented Systems.
    8th ACM Symposium on Access Control Models and Technologies (SACMAT), 2003.

  103. QUBOS: Deciding Quantified Boolean Logic using Propositional Satisfiability Solvers.
    4th International Conference on Formal Methods in Computer-Aided Design (CAV), 2002.

  104. SecureUML: A UML-Based Modeling Language for Model-Driven Security.
    5th International Conference on the Unified Modeling Language (UML), 2002.

  105. Modal Specifications of Trace-based Security Properties.
    2nd International Workshop on Security of Mobile Multiagent Systems, 2002.

  106. The AVISS Security Protocol Analysis Tool.
    14th International Conference on Computer-Aided Verification (CAV), 2002.

  107. Verified Bytecode Model Checkers.
    15th International Conference on Theorem Proving in Higher Order Logics (TPHOLs), 2002.

  108. Bytecode Model Checking: An Experimental Analysis.
    9th International SPIN Workshop on Model Checking of Software, 2002.

  109. A Formal Analysis of the CORBA Security Service.
    The 2nd International Z and B Conference, 2002.

  110. A Formal Data-Model of the CORBA Security Service.
    8th European Software Engineering Conference (ESEC), 2001.

  111. Towards an Awareness-based Semantics for the Analysis of Security Protocols.
    Workshop on Logical Aspects of Cryptographic Protocol Verification
    , 2001.

  112. Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis.
    International Workshop on Rewriting Logic and its Applications, 2001.

  113. Rewriting Logic as a Metalogical Framework.
    Foundations of Software Technology and Theoretical Computer Science (FSTTCS), 2000.

  114. B2M: A Semantic Based Tool for BLIF Hardware Descriptions.
    3rd International Conference on Formal Methods in Computer Aided Design (FMCAD), 2000.

  115. Decision Procedures for Inductive Boolean Functions based on Alternating Automata.
    12th International Conference on Computer-Aided Verification (CAV), 2000.

  116. Bounded Model Construction for Monadic Second-Order Logics.
    12th International Conference on Computer-Aided Verification (CAV), 2000.

  117. Combining Knowledge and Search to Solve Single-suit Bridge.
    Seventeenth National Conference on Artificial Intelligence (AAAI), 2000.

  118. Lazy Infinite-State Analysis of Security Protocols.
    Secure Networking -- CQRE [Secure] '99, 1999.

  119. Strategies Explained.
    Proceedings of the Fifth Game Programming Workshop in Japan (GPW), 1999.

  120. Java Byte Code Verification by Model Checking.
    11th International Conference on Computer-Aided Verification (CAV), 1999.

  121. Structural and Behavioral Modeling with Monadic Logics.
    IEEE International Symposium on Multiple-Valued Logic, 1999

  122. Scoped Metatheorems.
    International Workshop on Rewriting Logic and its Applications, 1998.

  123. Finding Optimal Strategies for Imperfect Information Games.
    Fifteenth National Conference on Artificial Intelligence (AAAI), 1998.

  124. Optimal Play Against Best Defence: Complexity and Heuristics.
    The First International Conference on Computers and Games (CG), 1998.

  125. LISA: A Specification Language Based on WS2S.
    Annual Conference of the European Association for Computer Science Logic (CSL), 1997.

  126. Monte-Carlo Sampling in Games with Incomplete Information: empirical investigation and analysis.
    Game-Tree Search in the Past, Present, and Future, 1997.

  127. Labelled Quantified Modal Logics.
    21st German Annual Conference on Artificial Intelligence, 1997.

  128. A New Method for Bounding the Complexity of Modal Logics.
    5th Kurt Goedel Colloquium (KGC) on Computational Logic and Proof Theory, 1997.

  129. Implementing Modal and Relevance Logics in a Logical Framework.
    Fifth International Conference On Principles of Knowledge Representation and Reasoning (KR), 1996.

  130. Modeling a Hardware Synthesis Methodology in Isabelle.
    1996 International Conference on Theorem Proving in Higher Order Logics (TPHOLs), 1996.

  131. Experiments in Automating Hardware Verification using Inductive Proof Planning.
    Formal Methods in Computer-Aided Design (FMCAD), 1996.

  132. Complexity Analysis Based on Ordered Resolution.
    11th Annual IEEE Symposium on Logic in Computer Science (LICS), 1996.

  133. Structuring Metatheory on Inductive Definitions.
    Thirteenth International Conference on Automated Deduction (CADE), 1996.

  134. Generic System Support for Deductive Program Development.
    Second International Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), 1996.

  135. Deriving and Applying Logic Program Transformers.
    Asian Computer Science Conference, 1995.

  136. Hardware Verification using Monadic Second-Order Logic.
    7th International Conference on Computer-Aided Verification (CAV), 1995.

  137. A Calculus for Rippling.
    Workshop on Conditional (and Typed) Term Rewriting Systems (CTRS), 1994.

  138. Coloured Rippling: An Extension of a Theorem P roving Heuristic.
    12th European Conference on Artificial Intelligence (ECAI), 1994.

  139. Logic Frameworks for Logic Programs.
    4th International Workshop on Logic Program Synthesis and Transformation, (LOPSTR), 1994.

  140. IsaWhelk: Whelk Interpreted in Isabelle.
    11th International Conference on Logic Programming (ICLP), 1994.

  141. Termination Orderings for Rippling.
    12th International Conference on Automated Deduction (CADE), 1994.

  142. A Conservative Extension of First Order Logic and its Applications to Theorem Proving.
    13th Conference of the Foundations of Software Technology and Theoretical Computer Science (FSTTCS), 1993.

  143. A Framework for Program Development Based on Schematic Proof.
    7th International Workshop on Software Specification and Design (IWSSD), 1993.

  144. Difference Unification.
    Thirteenth International Joint Conference on Artificial Intelligence (IJCAI), 1993.

  145. Middle-Out Reasoning for Logic Program Synthesis.
    10th International Conference on Logic Programming (ICLP), 1993.

  146. Finesse: An Adaptation of Proof-Planning to Declarer Play in Bridge.
    10th European Conference on Artificial Intelligence (ECAI), 1992.

  147. Difference Matching.
    11th International Conference On Automated Deduction (CADE), 1992.

  148. Some Normalization Properties of Martin-Lof's Type Theory, and Applications.
    Theoretical Aspects of Computer Software (TACS), 1991.

  149. Automating Meta-theory Creation and System Extension.
    Italian Association for Artificial Intelligence (AI*IA), 1991.

  150. Extracting Circuits from Constructive Proofs.
    IFIP-IEEE International Workshop on: Formal Methods in VLSI Design, 1991.

  151. Equality of Terms Containing Associative-Commutative Functions and Commutative Binding Operators is Isomorphism Complete.
    10th International Conference On Automated Deduction (CADE), 1990.

  152. Formally Verified Synthesis of CMOS.
    IMEC-IFIP International Workshop on Applied Formal Methods For Correct VLSI Design, 1989.

  153. Verification of Combinational Logic in Nuprl.
    Workshop on Hardware Specification, Verification and Synthesis: Mathematical Aspects, 1989.

  154. Building Theories in Nuprl.
    Logic At Botik, 1989.

  155. An Environment for Automated Reasoning about Partial Functions.
    9th International Conference On Automated Deduction (CADE), 1988.

Edited Volumes

  1. Second International Conference, Principles of Security and Trust.
    Springer, 2013.

  2. 5th ACM Symposium on Information, Computer and Communications Security.
    ACM Press, 2010.

  3. Second ACM Conference on Wireless Network Security.
    ACM Press, 2009.

  4. Automated Reasoning for Security Protocol Analysis.
    Special issue of the Journal of Automated Reasoning, 2006.

  5. ACM Workshop on Formal Methods in Security Engineering.
    ACM Press, 2004.

  6. International Joint Conference on Automated Reasoning.
    Springer-Verlag LNCS, 2004.

  7. Theorem Proving in Higher Order Logics.
    Springer-Verlag LNCS, 2003.

  8. ACM Workshop on Formal Methods in Security Engineering.
    ACM Press, 2003.

  9. Current Trends in Logical Frameworks and Metalanguages.
    Editorial for the Special Issue of the Journal of Automated Reasoning on Logical Frameworks and Meta-languages, 2001.

  10. Labelled Deduction.
    Kluwer Applied Logic Series, 2000

Miscellaneous

  1. Solving Single-suit Bridge Play: Winning and Knowing Why. (Draft)

  2. Single-suit Bridge Play: computer outperforms human.
    The Bridge World, 2000.

  3. Building Problem Solving Environments in Constructive Type Theory.
    Ph.D. Dissertation, Cornell University, December 1989. Cornell Technical Report 89-1063.

Back to David Basin