• Richard Petersens Plads, 321, 018

    2800 Kgs. Lyngby

    Denmark

If you made any changes in Pure these will be visible here soon.
Filter
Article in proceedings

Search results

  • 2022

    Privacy as Reachability

    Gondron, S., Mödersheim, S. & Viganò, L., 2022, Proceedings of the 2022 IEEE 35th Computer Security Foundations Symposium (CSF). IEEE, p. 130-146

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • Rewriting Privacy

    Mödersheim, S., 2022, Proceedings of 14th International Workshop Rewriting Logic and Its Applications. Bae, K. (ed.). Springer, p. 22-41 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 13252 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • 2021

    Adapting the TPL trust policy language for a self-sovereign identity world

    Alber, L., More, S., Mödersheim, S. & Schlichtkrull, A., 2021, Open Identity Summit 2021. Gesellschaft fur Informatik (GI), p. 107-118 (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI)).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    29 Downloads (Pure)
  • Deciding a Fragment of (α, β)-Privacy

    Fernet, L. P. K. & Mödersheim, S. A., 2021, Proceedings of 17th International Workshop on Security and Trust Management. 22 p.

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    34 Downloads (Pure)
  • Performing Security Proofs of Stateful Protocols

    Hess, A. V., Mödersheim, S. A., Brucker, A. D. & Schlichtkrull, A., 2021, Proceedings of 34th IEEE Computer Security Foundations Symposium. IEEE, 36 p.

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    83 Downloads (Pure)
  • Vertical Composition and Sound Payload Abstraction for Stateful Protocols

    Gondron, S. & Modersheim, S., 2021, Proceedings of 2021 IEEE 34th Computer Security Foundations Symposium. IEEE, p. 329-344

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • 2020

    Accountable Trust Decisions: A Semantic Approach

    Schlichtkrull, A. & Mödersheim, S. A., 2020, Open Identity Summit 2020. Roßnagel, H., Schunck, C. H., Mödersheim, S. A. & Hühnlein, D. (eds.). Gesellschaft für Informatik e.V., p. 71-82 (Lecture Notes in Informatics, Vol. P305).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    49 Downloads (Pure)
  • HotSpot: Hot Issues in Security Principles and Trust 2020

    Guttman, J. & Modersheim, S., 2020, Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops . IEEE, p. 260-260

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • 2019

    Formalizing and Proving Privacy Properties of Voting Protocols Using Alpha-Beta Privacy

    Gondron, S. P. C. & Mödersheim, S. A., 2019, Proceedings of 24th European Symposium on Research in Computer Security. Springer, p. 535-555 (Lecture Notes in Computer Science, Vol. 11735).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    114 Downloads (Pure)
  • GTPL: A graphical trust policy language

    Mödersheim, S. A. & Ni, B., 1 Jan 2019, Proceedings of Open Identity Summit 2019. Rossnagel, H., Wagner, S. & Huhnlein, D. (eds.). Gesellschaft fur Informatik (GI), p. 107-118 (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), Vol. P-293).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    78 Downloads (Pure)
  • TPL: A Trust Policy Language

    Mödersheim, S. A., Schlichtkrull, A., Wagner, G., More, S. & Alber, L., 2019, Trust Management XIII. Springer, Vol. 563. p. 209-223 (IFIP Advances in Information and Communication Technology, Vol. 563).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    217 Downloads (Pure)
  • 2018

    A Typing Result for Stateful Protocols

    Hess, A. V. & Modersheim, S., 2018, 2018 IEEE 31st Computer Security Foundations Symposium. IEEE, Vol. 2018-July. p. 374-388 15 p. (I E E E Computer Security Foundations Symposium. Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • Stateful Protocol Composition

    Hess, A. V., Mödersheim, S. A. & Brucker, A. D., 2018, ESORICS 2018: Computer Security . J. L., J. Z. & M. S. (eds.). Springer, p. 427-446 (Lecture Notes in Computer Science, Vol. 11098).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    70 Downloads (Pure)
  • 2017

    Formalizing and proving a typing result for security protocols in Isabelle/HOL

    Hess, A. V. & Modersheim, S., 2017, Proceedings of 2017 IEEE 30th Computer Security Foundations Symposium. IEEE, p. 451-63 (I E E E Computer Security Foundations Symposium. Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • 2016

    AIF-ω: Set-Based Protocol Abstraction with Countable Families

    Mödersheim, S. A. & Bruni, A., 2016, Proceedings of the 5th International Conference on Principles of Security and Trust (POST 2016): Held as Part of the European Joint Conferences on Theory and Practice of Software (ETAPS 2016). Piessens, F. & Viganò, L. (eds.). Springer, p. 233-253 (Lecture Notes in Computer Science, Vol. 9635).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    1 Downloads (Pure)
  • 2015

    Set-Pi: Set Membership pi-Calculus

    Bruni, A., Mödersheim, S. A., Nielson, F. & Nielson, H. R., 2015, Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF 2015). IEEE, p. 185-198 (I E E E Computer Security Foundations Symposium. Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    576 Downloads (Pure)
  • Typing and compositionality for security protocols: A generalization to the geometric fragment

    Almousa, O., Mödersheim, S. A., Modesti, P. & Viganò, L., 2015, Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015): Part II. Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Springer, p. 209-229 (Lecture Notes in Computer Science, Vol. 9327).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    280 Downloads (Pure)
  • 2014

    A Sound Abstraction of the Parsing Problem

    Mödersheim, S. A. & Katsoris, G., 2014, Proceedings of the IEEE 27th Computer Security Foundations Symposium, CSF 2014. IEEE, p. 259-273 (I E E E Computer Security Foundations Symposium. Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • Verification of Stateful Protocols - Set-Based Abstractions in the Applied Pi-Calculus

    Bruni, A., Mödersheim, S. A., Nielson, F. & Nielson, H. R., 2014, Proceedings of the 19th Nordic Conference on Secure IT Systems, NordSec 2014. Springer, p. 281-282 (Lecture Notes in Computer Science; No. 8788).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • 2013

    Defining Privacy Is Supposed to Be Easy

    Mödersheim, S. A., Gross, T. & Viganò, L., 2013, Logic for Programming, Artificial Intelligence, and Reasoning: 19th International Conference, LPAR-19, Stellenbosch, South Africa, December 14-19, 2013. Proceedings. Springer, p. 619-635 (Lecture Notes in Computer Science, Vol. 8312).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs

    Di Mauro, A., Fafoutis, X., Mödersheim, S. A. & Dragoni, N., 2013, Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings. Springer, p. 1-16 (Lecture Notes in Computer Science, Vol. 8208).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • Lazy Mobile Intruders

    Mödersheim, S. A., Nielson, F. & Nielson, H. R., 2013, Principles of Security and Trust: Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Springer, p. 147-166 (Logical Methods in Computer Science, Vol. 7796).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • 2012

    Deciding Security for a Fragment of ASLan

    Mödersheim, S. A., 2012, Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer, p. 127-144 (Lecture Notes in Computer Science, Vol. 7459).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures

    Armando, A., Arsac, W., Avanesov, T., Barletta, M., Calvi, A., Cappai, A., Carbone, R., Chevalier, Y., Compagna, L., Cuéllar, J., Erzse, G., Frau, S., Minea, M., Mödersheim, S. A., Von Oheimb, D., Pellegrino, G., Ponta, S. E., Rocchetto, M., Rusinowitch, M., Torabi Dashti, M., & 2 othersTuruani, M. & Viganò, L., 2012, Tools and Algorithms for the Construction and Analysis of Systems: 18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 – April 1, 2012. Proceedings. Springer, p. 267-282 (Lecture Notes in Computer Science, Vol. 7214).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • 2011

    Automated Verification of Virtualized Infrastructures

    Bleikertz, S., Gross, T. & Mödersheim, S. A., 2011, CCSW '11 Proceedings of the 3rd ACM workshop on Cloud computing security workshop. ACM, p. 47-58

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    File
    478 Downloads (Pure)
  • Diffie-Hellman without Difficulty

    Mödersheim, S. A., 2011, Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011. Barthe, G., Datta, A. & Etalle, S. (eds.). Springer, p. 214-229 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • Verifying SeVeCom Using Set-based Abstraction

    Mödersheim, S. A. & Modesti, P., 2011, 2011 7th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, p. 1164-1169

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • Vertical Protocol Composition

    Groß, T. & Mödersheim, S. A., 2011, Proceedings of the 24th Computer Security Foundations Symposium 2011.

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • 2010

    Abstraction by Set-Membership: Verifying Security Protocols and Web Services with Databases

    Mödersheim, S. A., 2010, Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: Association for Computing Machinery, p. 351-360 9 p.

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    347 Downloads (Pure)
  • A Formal Model of Identity Mixer

    Camenisch, J., Mödersheim, S. A. & Sommer, D., 2010, Proceedings of the 15th International Workshop on Formal Methods for Industrial Critical Systems. Heidelberg: Springer, p. 198-214 16 p. (Lecture Notes in Computer Science; No. LNCS 6371).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    637 Downloads (Pure)
  • ASLan++ — A Formal Security Specification Language for Distributed Systems

    Von Oheimb, D. & Mödersheim, S. A., 2010, Formal Methods for Components and Objects: 9th International Symposium, FMCO 2010 Graz, Austria, November 29 - December 1, 2010 Revised Papers. Springer, p. 1-22 (Lecture Notes in Computer Science; No. 6957).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review