• Richard Petersens Plads, 324, 182

    2800 Kgs. Lyngby

    Denmark

1982 …2019
If you made any changes in Pure these will be visible here soon.

Research Output 1982 2019

Filter
Article in proceedings
2019

Timing leaks and coarse-grained clocks

Vasilikos, P., Nielson, H. R., Nielson, F. & Kopf, B., 1 Jun 2019, Proceedings of 2019 IEEE 32nd Computer Security Foundations Symposium. IEEE Computer Society Press, p. 32-47 8823781. (Proceedings - IEEE Computer Security Foundations Symposium, Vol. 2019-June).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2018
36 Downloads (Pure)

Process-Local Static Analysis of Synchronous Processes

Midtgaard, J., Nielson, F. & Nielson, H. R., 2018, Static Analysis. Springer, p. 284-305 (Lecture Notes in Computer Science, Vol. 11002).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
239 Downloads (Pure)

Secure information release in timed automata

Vasilikos, P., Nielson, F. & Nielson, H. R., 2018, POST 2018: Principles of Security and Trust. Springer, p. 28-52 (Lecture Notes in Computer Science, Vol. 10804).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
2017
133 Downloads (Pure)

Effect-driven QuickChecking of compilers

Midtgaard, J., Justesen, M. N., Kasting, P. F. S., Nielson, F. & Nielson, H. R., 2017, Proceedings of the Acm on Programming Languages . Association for Computing Machinery, Vol. 1. p. 1-23 23 p. (Proceedings of the Acm on Programming Languages).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File

Information Flow for Timed Automata

Nielson, F., Nielson, H. R. & Vasilikos, P., 2017, Models, Algorithms, Logics and Tools. Springer, Vol. 10460. p. 3-21 19 p. (Lecture Notes in Computer Science, Vol. 10460).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Model checking exact cost for attack scenarios

Aslanyan, Z. & Nielson, F., 2017, Principles of Security and Trust. Springer, p. 210-31 (Principles of Security and Trust. 6th International Conference, Post 2017, Held As Part of the European Joint Conferences on Theory and Practice of Software, Etaps 2017. Proceedings: Lncs 10204). (Lecture Notes in Computer Science, Vol. 10204).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2016
187 Downloads (Pure)

A Parametric Abstract Domain for Lattice-Valued Regular Expressions

Midtgaard, J., Nielson, F. & Nielson, H. R., 2016, Proceedings of the 23rd International Symposium on Static Analysis (SAS 2016). Rival, X. (ed.). Springer, p. 338-360 (Lecture Notes in Computer Science, Vol. 9837).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File

Disjunctive Information Flow for Communicating Processes

Li, X., Nielson, F., Nielson, H. R. & Feng, X., 2016, Revised Selected Papers of the 10th International Symposium on Trustworthy Global Computing (TGC 2015). Ganty, P. & Loreti, M. (eds.). Springer, p. 95-111 (Lecture Notes in Computer Science, Vol. 9533).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

234 Downloads (Pure)

Enforcing Availability in Failure-Aware Communicating Systems

López-Acosta, H-A., Nielson, F. & Nielson, H. R., 2016, Proceedings of the 36th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE 2016). Albert, E. & Lanese, I. (eds.). Springer, p. 195-211 (Lecture Notes in Computer Science, Vol. 9688).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File

Future-dependent Flow Policies with Prophetic Variables

Li, X., Nielson, F. & Nielson, H. R., 2016, Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security. Association for Computing Machinery, p. 29-42 (Proceedings of the 2016 Acm Workshop on Programming Languages and Analysis for Security (plas'16)).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2 Downloads (Pure)

Iterated Process Analysis over Lattice-Valued Regular Expressions

Midtgaard, J., Nielson, F. & Nielson, H. R., 2016, Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming (PPDP '16). Association for Computing Machinery, p. 132-145

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

306 Downloads (Pure)

Quantitative Verification and Synthesis of Attack-Defence Scenarios

Aslanyan, Z., Nielson, F. & Parker, D., 2016, Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF 2016). IEEE, p. 105-119 (I E E E Computer Security Foundations Symposium. Proceedings).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File

Towards Static Analysis of Policy-Based Self-adaptive Computing Systems

Margheri, A., Nielson, H. R., Nielson, F. & Pugliese, R., 2016, Leveraging Applications of Formal Methods, Verification and Validation. Foundational Techniques: Proceedings. Part 1. Margaria, T. & Steffen, B. (eds.). Springer, p. 554-569 16 p. (Lecture Notes in Computer Science, Vol. 9952).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2015

Factorization of Behavioral Integrity

Li, X., Nielson, F. & Nielson, H. R., 2015, Proceedings of th 20th European Symposium on Research in Computer Security - ESORICS 2015: Part 2. Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Springer, p. 500-519 (Lecture Notes in Computer Science, Vol. 9327).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

How to Trust the Re-use of Data

Karafili, E., Nielson, H. R. & Nielson, F., 2015, Proceedings of the 11th International Workshop on Security and Trust Management (STM 2015). Foresti, S. (ed.). Springer, p. 72-88 (Lecture Notes in Computer Science, Vol. 9331).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

252 Downloads (Pure)

Klaim-DB: A Modeling Language for Distributed Database Applications

Wu, X., Li, X., Lluch Lafuente, A., Nielson, F. & Nielson, H. R., 2015, Coordination Models and Languages: Proceedings of the 17th IFIP WG 6.1 International Conference (COORDINATION 2015). Holvoet, T. & Viroli, M. (eds.). Springer, p. 197-212 (Lecture Notes in Computer Science, Vol. 9037).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
234 Downloads (Pure)

Modelling and Analysing Socio-Technical Systems

Aslanyan, Z., Ivanova, M. G., Nielson, F. & Probst, C. W., 2015, Proceedings of the 1st International Workshop on Socio-Technical Perspective in IS Development (STPIS'15). Kowalski, S., Bednar, P. & Bider, I. (eds.). p. 121-124 (CEUR Workshop Proceedings; No. urn:nbn:de:0074-1374-8, Vol. 1374).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File

Pareto Efficient Solutions of Attack-Defence Trees

Aslanyan, Z. & Nielson, F., 2015, Principles of Security and Trust: Proceedings of the 4th International Conference, POST 2015. Focardi, R. & Myers, A. (eds.). Springer, p. 95-114 (Lecture Notes in Computer Science, Vol. 9036).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

208 Downloads (Pure)

Set-Pi: Set Membership pi-Calculus

Bruni, A., Mödersheim, S. A., Nielson, F. & Nielson, H. R., 2015, Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF 2015). IEEE, p. 185-198 (I E E E Computer Security Foundations Symposium. Proceedings).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
2014

Automated Generation of Attack Trees

Vigo, R., Nielson, F. & Nielson, H. R., 2014, Proceedings of the IEEE 27th Computer Security Foundations Symposium, CSF 2014 . IEEE, p. 337-350

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Availability by Design

Vigo, R., Nielson, F. & Nielson, H. R., 2014, Proceedings of the 19th Nordic Conference on Secure IT Systems, NordSec 2014. Springer, p. 277-278 (Lecture Notes in Computer Science; No. 8788).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Denial-of-Service Security Attack in the Continuous-Time World

Wang, S., Nielson, F. & Nielson, H. R., 2014, Formal Techniques for Distributed Objects, Components, and Systems. Proceedings. Ábrahám, E. & Palamidessi, C. (eds.). Springer, p. 149-165 (Lecture Notes in Computer Science, Vol. 8461).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

1 Downloads (Pure)

Formal Security Analysis of the MaCAN Protocol.

Bruni, A., Sojka, M., Nielson, F. & Nielson, H. R., 2014, Proceedings of the 11th International Conference on Integrated Formal Methods, IFM 2014. Albert, E. & Sekerinski, E. (eds.). Springer, p. 241-255 (Lecture Notes in Computer Science, Vol. 8739).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

ICT-powered Health Care Processes

Carbone, M., Christensen, A. S., Nielson, F., Nielson, H. R., Hildebrandt, T. & Sølvkjær, M., 2014, Foundations of Health Information Engineering and Systems: Third International Symposium, FHIES 2013, Macau, China, August 21-23, 2013. Revised Selected Papers. Springer, p. 59-68 (Lecture Notes in Computer Science, Vol. 8315).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Pareto Efficient Solutions of Attack Trees

Aslanyan, Z. & Nielson, F., 2014, Proceedings of the 19th Nordic Conference on Secure IT Systems, NordSec 2014. Springer, p. 279-280 (Lecture Notes in Computer Science; No. 8788).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

204 Downloads (Pure)

The Guided System Development Framework: Modeling and Verifying Communication Systems

Carvalho Quaresma, J. N., Probst, C. W. & Nielson, F., 2014, Leveraging Applications of Formal Methods, Verification and Validation - Specialized Techniques and Applications: 6th International Symposium, ISoLA 2014, Proceedings, Part II. Margaria, T. & Steffen, B. (eds.). Springer, p. 509-523 (Lecture Notes in Computer Science, Vol. 8803).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File

The stochastic quality calculus

Zeng, K., Nielson, F. & Nielson, H. R., 2014, Coordination Models and Languages. Proceedings. Kühn, E. & Pugliese, R. (eds.). Springer, p. 179-193 (Lecture Notes in Computer Science, Vol. 8459).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Uniform Protection for Multi-exposed Targets

Vigo, R., Nielson, F. & Nielson, H. R., 2014, Formal Techniques for Distributed Objects, Components, and Systems. Proceedings. Ábrahám, E. & Palamidessi, C. (eds.). Springer, p. 182-198 (Lecture Notes in Computer Science, Vol. 8461).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Verification of Stateful Protocols - Set-Based Abstractions in the Applied Pi-Calculus

Bruni, A., Mödersheim, S. A., Nielson, F. & Nielson, H. R., 2014, Proceedings of the 19th Nordic Conference on Secure IT Systems, NordSec 2014. Springer, p. 281-282 (Lecture Notes in Computer Science; No. 8788).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2013

A calculus for quality

Nielson, H. R., Nielson, F. & Vigo, R., 2013, Formal Aspects of Component Software: 9th International Symposium, FACS 2012, Mountain View, CA, USA, September 12-14, 2012. Revised Selected Papers. Springer, p. 188-204

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Broadcast, Denial-of-Service, and Secure Communication

Vigo, R., Nielson, F. & Nielson, H. R., 2013, Integrated Formal Methods: 10th International Conference, IFM 2013, Turku, Finland, June 10-14, 2013. Proceedings. Springer, p. 412-427 (Lecture Notes in Computer Science, Vol. 7940).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Lazy Mobile Intruders

Mödersheim, S. A., Nielson, F. & Nielson, H. R., 2013, Principles of Security and Trust: Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Springer, p. 147-166 (Logical Methods in Computer Science, Vol. 7796).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Probabilistic Analysis of the Quality Calculus

Nielson, H. R. & Nielson, F., 2013, Formal Techniques for Distributed Systems: Joint IFIP WG 6.1 International Conference, FMOODS/FORTE 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings. Springer, p. 258-272 (Lecture Notes in Computer Science, Vol. 7892).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

XACML 3.0 in Answer Set Programming

Ramli, C. D. P. K., Nielson, H. R. & Nielson, F., 2013, Logic-Based Program Synthesis and Transformation: 22nd International Symposium, LOPSTR 2012, Leuven, Belgium, September 18-20, 2012, Revised Selected Papers. Springer, p. 89-105 (Lecture Notes in Computer Science, Vol. 7844).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2012

Belief Bisimulation for Hidden Markov Models Logical Characterisation and Decision Algorithm

Jansen, D. N., Nielson, F. & Zhang, L., 2012, NASA Formal Methods: 4th International Symposium, NFM 2012, Norfolk, VA, USA, April 3-5, 2012. Proceedings. Springer, p. 326-340 (Lecture Notes in Computer Science, Vol. 7226).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

63 Downloads (Pure)

Fixpoints vs Moore Families

Zhang, F., Nielson, F. & Nielson, H. R., 2012, Proceedings of SOFSEM 2011. 12 p.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

File

From Explicit to Symbolic Types for Communication Protocols in CCS

Nielson, H. R., Nielson, F., Kreiker, J. & Pilegaard, H., 2012, Formal Modeling: Actors, Open Systems, Biological Systems: Essays Dedicated to Carolyn Talcott on the Occasion of Her 70th Birthday. Springer, p. 74-89 (Lecture Notes in Computer Science; No. 7000).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Key Update Assistant for Resource-Constrained Networks

Yuksel, E., Nielson, H. R. & Nielson, F., 2012, 2012 IEEE Symposium on Computers and Communications (ISCC). IEEE, p. 000075-000081 (I E E E International Symposium on Computers and Communications).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Layered Fixed Point Logic

Filipiuk, P., Nielson, F. & Nielson, H. R., 2012, Proceedings of the 14th symposium on Principles and practice of declarative programming. Association for Computing Machinery, p. 45-54

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

4 Downloads (Pure)

LBTool: A stochastic toolkit for leave-based key updates

Yuksel, E., Nielson, H. R., Nielson, F. & Nielsen, B. F., 2012, 2012 IEEE Symposium on Computers and Communications. IEEE, p. 868-875

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Model Checking as Static Analysis: Revisited

Zhang, F., Nielson, F. & Nielson, H. R., 2012, Integrated Formal Methods: 9th International Conference, IFM 2012 Pisa, Italy, June 18-21, 2012 Proceedings. Springer, p. 99-112 (Lecture Notes in Computer Science; No. 7321).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study

Yuksel, E., Zhu, H., Nielson, H. R., Huang, H. & Nielson, F., 2012, 2012 Sixth International Symposium on Theoretical Aspects of Software Engineering (TASE). IEEE, p. 25-32 8 p.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Position paper: A generic approach for security policies composition

Hernandez, A. M. & Nielson, F., 2012, PLAS '12 Proceedings of the 7th Workshop on Programming Languages and Analysis for Security . Association for Computing Machinery, p. Article No. 5 4 p.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Recursive Advice for Coordination

Terepeta, M. T., Nielson, H. R. & Nielson, F., 2012, Coordination Models and Languages: 14th International Conference, COORDINATION 2012 Stockholm, Sweden, June 14-15, 2012 Proceedings. Sirjani, M. (ed.). p. 137-151 (Lecture Notes in Computer Science; No. 7274).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

The Logic of XACML

Ramli, C. D. P. K., Nielson, H. R. & Nielson, F., 2012, Formal Aspects of Component Software: 8th International Symposium, FACS 2011, Oslo, Norway, September 14-16, 2011, Revised Selected Papers. Springer, p. 205-222 (Lecture Notes in Computer Science, Vol. 7253).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2011

Automata-Based CSL Model Checking

Zhang, L., Jansen, D. N., Nielson, F. & Hermanns, H., 2011, Automata, Languages and Programming: 38th International Colloquium, ICALP 2011 - Zurich, Switzerland, July 4-8, 2011 - Proceedings, Part II. Springer, p. 271-282 (Lecture Notes in Computer Science; No. 6756).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

137 Downloads (Pure)

Characteristics of Key Update Strategies for Wireless Sensor Networks

Yuksel, E., Nielson, H. R. & Nielson, F., 2011, Proceedings of the International Conference on Network Communication and Computer (ICNCC 2011). p. 132-136

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

File

Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces

Yang, F., Aotani, T., Masuhara, H., Nielson, F. & Nielson, H. R., 2011, Coordination Models and Languages: 13th International Conference, COORDINATION 2011, Reykjavik, Iceland, June 6-9, 2011 - Proceedings. Springer, Vol. 6721. p. 202-218 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Controlling Modelling Artifacts

Smith, M. J. A., Nielson, F. & Nielson, H. R., 2011, 2011 Eighth International Conference on Quantitative Evaluation of Systems (QEST). IEEE, p. 171-180

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Galois Connections for Flow Algebras

Filipiuk, P., Terepeta, M. T., Nielson, H. R. & Nielson, F., 2011, Formal Techniques for Distributed Systems: Joint 13th IFIP WG 6.1 International Conference, FMOODS 2011 and 30th IFIP WG 6.1 International Conference, FORTE 2011 Reykjavik, Iceland, June 6-9, 2011 Proceedings. Springer, p. 138-152 (Lecture Notes in Computer Science; No. 6722).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review