Photo of Sebastian Alexander Mödersheim
  • Richard Petersens Plads, 324, 180

    2800 Kgs. Lyngby

    Denmark

20092022

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2019

Formalizing and Proving Privacy Properties of Voting Protocols Using Alpha-Beta Privacy

Gondron, S. P. C. & Mödersheim, S. A., 2019, Proceedings of 24th European Symposium on Research in Computer Security. Springer, p. 535-555 21 p. (Lecture Notes in Computer Science, Vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

GTPL: A graphical trust policy language

Mödersheim, S. A. & Ni, B., 1 Jan 2019, Proceedings of Open Identity Summit 2019. Rossnagel, H., Wagner, S. & Huhnlein, D. (eds.). Gesellschaft fur Informatik (GI), p. 107-118 (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), Vol. P-293).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
17 Downloads (Pure)

TPL: A Trust Policy Language

Mödersheim, S. A., Schlichtkrull, A., Wagner, G., More, S. & Alber, L., 2019, Trust Management XIII. Springer, Vol. 563. p. 209-223 (IFIP Advances in Information and Communication Technology, Vol. 563).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
24 Downloads (Pure)
2018

Alpha-Beta Privacy

Mödersheim, S. A. & Viganò, L., 2018, DTU Compute. 46 p. (DTU Compute Technical Report-2018, Vol. 07).

Research output: Book/ReportReport

Open Access
File
249 Downloads (Pure)

A Typing Result for Stateful Protocols

Hess, A. V. & Modersheim, S., 2018, 2018 IEEE 31st Computer Security Foundations Symposium. IEEE, Vol. 2018-July. p. 374-388 15 p. (I E E E Computer Security Foundations Symposium. Proceedings).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

A Typing Result for Stateful Protocols - Extended Version

Hess, A. V. & Mödersheim, S. A., 2018, DTU Compute. 48 p. (DTU Compute Technical Report-2018, Vol. 4).

Research output: Book/ReportReport

Open Access
File
55 Downloads (Pure)

Stateful Protocol Composition

Hess, A. V., Mödersheim, S. A. & Brucker, A. D., 2018, ESORICS 2018: Computer Security . J. L., J. Z. & M. S. (eds.). Springer, p. 427-446 (Lecture Notes in Computer Science, Vol. 11098).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
5 Downloads (Pure)

Stateful Protocol Composition - Extended Version

Hess, A. V., Mödersheim, S. A. & Brucker, A. D., 2018, DTU Compute. 28 p. (DTU Compute Technical Report-2018, Vol. 3).

Research output: Book/ReportReport

Open Access
File
64 Downloads (Pure)

The LIGHTest Foundation

Mödersheim, S. A. & Schlichtkrull, A., 2018, Technical University of Denmark. 33 p. (DTU Compute Technical Report-2018, Vol. 6).

Research output: Book/ReportReport

Open Access
File
121 Downloads (Pure)
2017

Formalizing and proving a typing result for security protocols in Isabelle/HOL

Hess, A. V. & Modersheim, S., 2017, Proceedings of 2017 IEEE 30th Computer Security Foundations Symposium. IEEE, p. 451-63 (I E E E Computer Security Foundations Symposium. Proceedings).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2016

AIF-ω: Set-Based Protocol Abstraction with Countable Families

Mödersheim, S. A. & Bruni, A., 2016, Proceedings of the 5th International Conference on Principles of Security and Trust (POST 2016): Held as Part of the European Joint Conferences on Theory and Practice of Software (ETAPS 2016). Piessens, F. & Viganò, L. (eds.). Springer, p. 233-253 (Lecture Notes in Computer Science, Vol. 9635).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

1 Downloads (Pure)

Security protocol specification and verification with AnBx

Bugliesi, M., Calzavara, S., Mödersheim, S. A. & Modesti, P., 2016, In : Journal of Information Security and Applications. 30, p. 46-63

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
190 Downloads (Pure)
2015

Alice and Bob: Reconciling Formal Models and Implementation

Almousa, O., Mödersheim, S. A. & Viganò, L., 2015, Programming Languages with Applications to Biology and Security: Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday. Springer, p. 66-85 (Lecture Notes in Computer Science, Vol. 9465).

Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

Open Access
File
198 Downloads (Pure)

Set-Pi: Set Membership pi-Calculus

Bruni, A., Mödersheim, S. A., Nielson, F. & Nielson, H. R., 2015, Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF 2015). IEEE, p. 185-198 (I E E E Computer Security Foundations Symposium. Proceedings).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
208 Downloads (Pure)

Typing and compositionality for security protocols: A generalization to the geometric fragment

Almousa, O., Mödersheim, S. A., Modesti, P. & Viganò, L., 2015, Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015): Part II. Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Springer, p. 209-229 (Lecture Notes in Computer Science, Vol. 9327).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
150 Downloads (Pure)

Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment (Extended Version)

Almousa, O., Mödersheim, S. A., Modesti, P. & Viganò, L., 2015, Kgs. Lyngby: Technical University of Denmark. 26 p. (DTU Compute-Technical Report-2015; No. 3).

Research output: Book/ReportReport

Open Access
File
93 Downloads (Pure)
2014

A Sound Abstraction of the Parsing Problem

Mödersheim, S. A. & Katsoris, G., 2014, Proceedings of the IEEE 27th Computer Security Foundations Symposium, CSF 2014. IEEE, p. 259-273 (I E E E Computer Security Foundations Symposium. Proceedings).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

A Sound Abstraction of the Parsing Problem (Extended Version)

Mödersheim, S. A. & Katsoris, G., 2014, DTU Compute. 16 p. (DTU Compute-Technical Report-2014; No. 12).

Research output: Book/ReportReport

Open Access
File
113 Downloads (Pure)

Foundational aspects of security

Chatzikokolakis, K., Mödersheim, S. A., Palamidessi, C. & Pang, J., 2014, In : Journal of Computer Security. 22, p. 201-202

Research output: Contribution to journalEditorialResearch

Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

Mödersheim, S. A. & Viganò, L., 2014, DTU Compute. 20 p. (DTU Compute-Technical Report-2014; No. 7).

Research output: Book/ReportReport

Open Access
File
94 Downloads (Pure)

Verification of Stateful Protocols - Set-Based Abstractions in the Applied Pi-Calculus

Bruni, A., Mödersheim, S. A., Nielson, F. & Nielson, H. R., 2014, Proceedings of the 19th Nordic Conference on Secure IT Systems, NordSec 2014. Springer, p. 281-282 (Lecture Notes in Computer Science; No. 8788).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2013

Defining Privacy Is Supposed to Be Easy

Mödersheim, S. A., Gross, T. & Viganò, L., 2013, Logic for Programming, Artificial Intelligence, and Reasoning: 19th International Conference, LPAR-19, Stellenbosch, South Africa, December 14-19, 2013. Proceedings. Springer, p. 619-635 (Lecture Notes in Computer Science, Vol. 8312).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs

Di Mauro, A., Fafoutis, X., Mödersheim, S. A. & Dragoni, N., 2013, Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings. Springer, p. 1-16 (Lecture Notes in Computer Science, Vol. 8208).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Lazy Mobile Intruders

Mödersheim, S. A., Nielson, F. & Nielson, H. R., 2013, Principles of Security and Trust: Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Springer, p. 147-166 (Logical Methods in Computer Science, Vol. 7796).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2012

Deciding Security for a Fragment of ASLan

Mödersheim, S. A., 2012, Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer, p. 127-144 (Lecture Notes in Computer Science, Vol. 7459).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Deciding Security for a Fragment of ASLan

Mödersheim, S. A., 2012, Technical University of Denmark. 24 p. (D T U Compute. Technical Report; No. 2012-06).

Research output: Book/ReportReport

Open Access
File
124 Downloads (Pure)

Lazy Mobile Intruders

Mödersheim, S. A., Nielson, F. & Nielson, H. R., 2012, Kgs. Lyngby: Technical University of Denmark. 20 p. (D T U Compute. Technical Report; No. 2012-13).

Research output: Book/ReportReport

Open Access
File
148 Downloads (Pure)

The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures

Armando, A., Arsac, W., Avanesov, T., Barletta, M., Calvi, A., Cappai, A., Carbone, R., Chevalier, Y., Compagna, L., Cuéllar, J., Erzse, G., Frau, S., Minea, M., Mödersheim, S. A., Von Oheimb, D., Pellegrino, G., Ponta, S. E., Rocchetto, M., Rusinowitch, M., Torabi Dashti, M. & 2 others, Turuani, M. & Viganò, L., 2012, Tools and Algorithms for the Construction and Analysis of Systems: 18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 – April 1, 2012. Proceedings. Springer, p. 267-282 (Lecture Notes in Computer Science, Vol. 7214).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Theory of Security and Applications: Joint Workshop, TOSCA 2011 Saarbrücken, Germany, March 31 - April 1, 2011 Revised Selected Papers

Mödersheim, S. A. (ed.) & Palamidessi, C. (ed.), 2012, Springer. (Lecture Notes in Computer Science, Vol. 6993).

Research output: Book/ReportBook

2011

Automated Verification of Virtualized Infrastructures

Bleikertz, S., Gross, T. & Mödersheim, S. A., 2011, CCSW '11 Proceedings of the 3rd ACM workshop on Cloud computing security workshop. ACM, p. 47-58

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

File
305 Downloads (Pure)

Diffie-Hellman without Difficulty

Mödersheim, S. A., 2011, Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011. Barthe, G., Datta, A. & Etalle, S. (eds.). Springer, p. 214-229 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Diffie-Hellman without Difficulty (Extended Version)

Mödersheim, S. A., 2011, Kgs. Lyngby, Denmark: Technical University of Denmark. (IMM-Technical Report-2011; No. 13).

Research output: Book/ReportReport

Open Access
File
86 Downloads (Pure)

Towards Formal Validation of Trust and Security of the Internet of Services

Carbone, R., Minea, M., Mödersheim, S. A., Ponta, S. E., Turuani, M. & Viganò, L., 2011, The Future Internet: Future Internet Assembly 2011: Achievements and Technological Promises. Springer, p. 193-207 (Lecture Notes in Computer Science; No. 6656).

Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

Verifying SeVeCom Using Set-based Abstraction

Mödersheim, S. A. & Modesti, P., 2011, Kgs. Lyngby, Denmark: Technical University of Denmark, DTU Informatics, Building 321. (IMM-Technical Report-2011-01).

Research output: Book/ReportReport

Open Access
File
200 Downloads (Pure)

Verifying SeVeCom Using Set-based Abstraction

Mödersheim, S. A. & Modesti, P., 2011, 2011 7th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, p. 1164-1169

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Vertical Protocol Composition

Groß, T. & Mödersheim, S. A., 2011, Proceedings of the 24th Computer Security Foundations Symposium 2011.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2010

Abstraction by Set-Membership: Verifying Security Protocols and Web Services with Databases

Mödersheim, S. A., 2010, Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: Association for Computing Machinery, p. 351-360 9 p.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
230 Downloads (Pure)

A Formal Model of Identity Mixer

Camenisch, J., Mödersheim, S. A. & Sommer, D., 2010, Proceedings of the 15th International Workshop on Formal Methods for Industrial Critical Systems. Heidelberg: Springer, p. 198-214 16 p. (Lecture Notes in Computer Science; No. LNCS 6371).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
332 Downloads (Pure)

ASLan++ — A Formal Security Specification Language for Distributed Systems

Von Oheimb, D. & Mödersheim, S. A., 2010, Formal Methods for Components and Objects: 9th International Symposium, FMCO 2010 Graz, Austria, November 29 - December 1, 2010 Revised Papers. Springer, p. 1-22 (Lecture Notes in Computer Science; No. 6957).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Constraint Differentiation: Search-Space Reduction for the Constraint-Based Analysis of Security Protocols

Mödersheim, S. A., Basin, D. & Viganò, L., 2010, In : Journal of Computer Security. 18, 4, p. 575-618

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
269 Downloads (Pure)