Sebastian Alexander Mödersheim
Sebastian Alexander Mödersheim
Associate Professor of Computer Science, Denmark's Technical University
Geverifieerd e-mailadres voor imm.dtu.dk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
International conference on computer aided verification, 281-285, 2005
11962005
An on-the-fly model-checker for security protocol analysis
D Basin, S Mödersheim, L Vigano
Computer Security–ESORICS 2003, 253-270, 2003
778*2003
A high level protocol specification language for industrial security-sensitive protocols
Y Chevalier, L Compagna, J Cuellar, P Hankes Drielsma, J Mantovani, ...
Proceedings of workshop on specification and automated processing of …, 2004
1852004
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction and …, 2012
1242012
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
Computer Aided Verification, 349-354, 2002
982002
Secure pseudonymous channels
S Mödersheim, L Viganò
European Symposium on Research in Computer Security, 337-354, 2009
882009
Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario
M Backes, S Mödersheim, B Pfitzmann, L Vigano
International Conference on Foundations of Software Science and Computation …, 2006
862006
The open-source fixed-point model checker for symbolic analysis of security protocols
S Mödersheim, L Vigano
Foundations of Security Analysis and Design V, 166-194, 2009
692009
Algebraic properties in alice and bob notation
S Mödersheim
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
622009
CDiff: a new reduction technique for constraint-based analysis of security protocols
D Basin, S Mödersheim, L Vigano
Proceedings of the 10th ACM conference on Computer and communications …, 2003
562003
Abstraction by set-membership: verifying security protocols and web services with databases
SA Mödersheim
ACM Conference on Computer and Communications Security 17, 351-360, 2010
492010
A card requirements language enabling privacy-preserving access control
J Camenisch, S Mödersheim, G Neven, FS Preiss, D Sommer
Proceeding of the 15th ACM symposium on Access control models and …, 2010
472010
A formal model of identity mixer
J Camenisch, S Mödersheim, D Sommer
Formal Methods for Industrial Critical Systems, 198-214, 2010
45*2010
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
S Mödersheim, L Vigano, D Basin
Journal of Computer Security 18 (4), 575-618, 2010
432010
Algebraic intruder deductions
D Basin, S Mödersheim, L Vigano
Logic for Programming, Artificial Intelligence, and Reasoning, 549-564, 2005
422005
ASLan++—a formal security specification language for distributed systems
D Von Oheimb, S Mödersheim
International Symposium on Formal Methods for Components and Objects, 1-22, 2010
412010
Proactive security analysis of changes in virtualized infrastructures
S Bleikertz, C Vogel, T Groß, S Mödersheim
Proceedings of the 31st annual computer security applications conference, 51-60, 2015
362015
Automated verification of virtualized infrastructures
S Bleikertz, T Groß, S Mödersheim
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 47-58, 2011
362011
Vertical Protocol Composition
T Groß, S Mödersheim
24th IEEE Computer Security Foundations Workshop (CSF 2011), 2011
342011
Integrating automated and interactive protocol verification
A Brucker, S Mödersheim
Formal Aspects in Security and Trust, 248-262, 2010
272010
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20