Photo of Sebastian Alexander Mödersheim
  • Richard Petersens Plads, 324, 180

    2800 Kgs. Lyngby

    Denmark

20092022

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article in proceedings
2019

Formalizing and Proving Privacy Properties of Voting Protocols Using Alpha-Beta Privacy

Gondron, S. P. C. & Mödersheim, S. A., 2019, Proceedings of 24th European Symposium on Research in Computer Security. Springer, p. 535-555 21 p. (Lecture Notes in Computer Science, Vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

GTPL: A graphical trust policy language

Mödersheim, S. A. & Ni, B., 1 Jan 2019, Proceedings of Open Identity Summit 2019. Rossnagel, H., Wagner, S. & Huhnlein, D. (eds.). Gesellschaft fur Informatik (GI), p. 107-118 (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), Vol. P-293).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
17 Downloads (Pure)

TPL: A Trust Policy Language

Mödersheim, S. A., Schlichtkrull, A., Wagner, G., More, S. & Alber, L., 2019, Trust Management XIII. Springer, Vol. 563. p. 209-223 (IFIP Advances in Information and Communication Technology, Vol. 563).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
24 Downloads (Pure)
2018

A Typing Result for Stateful Protocols

Hess, A. V. & Modersheim, S., 2018, 2018 IEEE 31st Computer Security Foundations Symposium. IEEE, Vol. 2018-July. p. 374-388 15 p. (I E E E Computer Security Foundations Symposium. Proceedings).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Stateful Protocol Composition

Hess, A. V., Mödersheim, S. A. & Brucker, A. D., 2018, ESORICS 2018: Computer Security . J. L., J. Z. & M. S. (eds.). Springer, p. 427-446 (Lecture Notes in Computer Science, Vol. 11098).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
5 Downloads (Pure)
2017

Formalizing and proving a typing result for security protocols in Isabelle/HOL

Hess, A. V. & Modersheim, S., 2017, Proceedings of 2017 IEEE 30th Computer Security Foundations Symposium. IEEE, p. 451-63 (I E E E Computer Security Foundations Symposium. Proceedings).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2016

AIF-ω: Set-Based Protocol Abstraction with Countable Families

Mödersheim, S. A. & Bruni, A., 2016, Proceedings of the 5th International Conference on Principles of Security and Trust (POST 2016): Held as Part of the European Joint Conferences on Theory and Practice of Software (ETAPS 2016). Piessens, F. & Viganò, L. (eds.). Springer, p. 233-253 (Lecture Notes in Computer Science, Vol. 9635).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

1 Downloads (Pure)
2015

Set-Pi: Set Membership pi-Calculus

Bruni, A., Mödersheim, S. A., Nielson, F. & Nielson, H. R., 2015, Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF 2015). IEEE, p. 185-198 (I E E E Computer Security Foundations Symposium. Proceedings).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
208 Downloads (Pure)

Typing and compositionality for security protocols: A generalization to the geometric fragment

Almousa, O., Mödersheim, S. A., Modesti, P. & Viganò, L., 2015, Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015): Part II. Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Springer, p. 209-229 (Lecture Notes in Computer Science, Vol. 9327).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
150 Downloads (Pure)
2014

A Sound Abstraction of the Parsing Problem

Mödersheim, S. A. & Katsoris, G., 2014, Proceedings of the IEEE 27th Computer Security Foundations Symposium, CSF 2014. IEEE, p. 259-273 (I E E E Computer Security Foundations Symposium. Proceedings).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Verification of Stateful Protocols - Set-Based Abstractions in the Applied Pi-Calculus

Bruni, A., Mödersheim, S. A., Nielson, F. & Nielson, H. R., 2014, Proceedings of the 19th Nordic Conference on Secure IT Systems, NordSec 2014. Springer, p. 281-282 (Lecture Notes in Computer Science; No. 8788).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2013

Defining Privacy Is Supposed to Be Easy

Mödersheim, S. A., Gross, T. & Viganò, L., 2013, Logic for Programming, Artificial Intelligence, and Reasoning: 19th International Conference, LPAR-19, Stellenbosch, South Africa, December 14-19, 2013. Proceedings. Springer, p. 619-635 (Lecture Notes in Computer Science, Vol. 8312).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs

Di Mauro, A., Fafoutis, X., Mödersheim, S. A. & Dragoni, N., 2013, Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings. Springer, p. 1-16 (Lecture Notes in Computer Science, Vol. 8208).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Lazy Mobile Intruders

Mödersheim, S. A., Nielson, F. & Nielson, H. R., 2013, Principles of Security and Trust: Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Springer, p. 147-166 (Logical Methods in Computer Science, Vol. 7796).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2012

Deciding Security for a Fragment of ASLan

Mödersheim, S. A., 2012, Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer, p. 127-144 (Lecture Notes in Computer Science, Vol. 7459).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures

Armando, A., Arsac, W., Avanesov, T., Barletta, M., Calvi, A., Cappai, A., Carbone, R., Chevalier, Y., Compagna, L., Cuéllar, J., Erzse, G., Frau, S., Minea, M., Mödersheim, S. A., Von Oheimb, D., Pellegrino, G., Ponta, S. E., Rocchetto, M., Rusinowitch, M., Torabi Dashti, M. & 2 others, Turuani, M. & Viganò, L., 2012, Tools and Algorithms for the Construction and Analysis of Systems: 18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 – April 1, 2012. Proceedings. Springer, p. 267-282 (Lecture Notes in Computer Science, Vol. 7214).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2011

Automated Verification of Virtualized Infrastructures

Bleikertz, S., Gross, T. & Mödersheim, S. A., 2011, CCSW '11 Proceedings of the 3rd ACM workshop on Cloud computing security workshop. ACM, p. 47-58

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

File
305 Downloads (Pure)

Diffie-Hellman without Difficulty

Mödersheim, S. A., 2011, Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011. Barthe, G., Datta, A. & Etalle, S. (eds.). Springer, p. 214-229 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Verifying SeVeCom Using Set-based Abstraction

Mödersheim, S. A. & Modesti, P., 2011, 2011 7th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, p. 1164-1169

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Vertical Protocol Composition

Groß, T. & Mödersheim, S. A., 2011, Proceedings of the 24th Computer Security Foundations Symposium 2011.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2010

Abstraction by Set-Membership: Verifying Security Protocols and Web Services with Databases

Mödersheim, S. A., 2010, Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: Association for Computing Machinery, p. 351-360 9 p.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
230 Downloads (Pure)

A Formal Model of Identity Mixer

Camenisch, J., Mödersheim, S. A. & Sommer, D., 2010, Proceedings of the 15th International Workshop on Formal Methods for Industrial Critical Systems. Heidelberg: Springer, p. 198-214 16 p. (Lecture Notes in Computer Science; No. LNCS 6371).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
332 Downloads (Pure)

ASLan++ — A Formal Security Specification Language for Distributed Systems

Von Oheimb, D. & Mödersheim, S. A., 2010, Formal Methods for Components and Objects: 9th International Symposium, FMCO 2010 Graz, Austria, November 29 - December 1, 2010 Revised Papers. Springer, p. 1-22 (Lecture Notes in Computer Science; No. 6957).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review