Search Results - "Nielson, Flemming"
-
1
Discovering, quantifying, and displaying attacks
Published in Logical methods in computer science (27-04-2017)“…In the design of software and cyber-physical systems, security is often perceived as a qualitative need, but can only be attained quantitatively. Especially…”
Get full text
Journal Article -
2
A Coordination Language for Databases
Published in Logical methods in computer science (01-01-2017)“…We present a coordination language for the modeling of distributed database applications. The language, baptized Klaim-DB, borrows the concepts of localities…”
Get full text
Journal Article -
3
Efficient CSL Model Checking Using Stratification
Published in Logical methods in computer science (01-01-2012)“…For continuous-time Markov chains, the model-checking problem with respect to continuous-time stochastic logic (CSL) has been introduced and shown to be…”
Get full text
Journal Article -
4
A Stochastic Broadcast Pi-Calculus
Published in Electronic proceedings in theoretical computer science (04-07-2011)“…In this paper we propose a stochastic broadcast PI-calculus which can be used to model server-client based systems where synchronization is always governed by…”
Get full text
Journal Article -
5
History-sensitive versus future-sensitive approaches to security in distributed systems
Published in Electronic proceedings in theoretical computer science (26-10-2010)“…We consider the use of aspect-oriented techniques as a flexible way to deal with security policies in distributed systems. Recent work suggests to use aspects…”
Get full text
Journal Article -
6
Quantitative Verification and Synthesis of Attack-Defence Scenarios
Published in 2016 IEEE 29th Computer Security Foundations Symposium (CSF) (01-06-2016)“…Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction…”
Get full text
Conference Proceeding Journal Article -
7
Content dependent information flow control
Published in Journal of logical and algebraic methods in programming (01-02-2017)Get full text
Journal Article -
8
The logic of XACML
Published in Science of computer programming (01-04-2014)“…We study the international standard XACML 3.0 for describing security access control policies in a compositional way. Our main contributions are (i) to derive…”
Get full text
Journal Article -
9
Enforcing globally dependent flow policies in message-passing systems
Published in Journal of computer languages (Online) (01-10-2019)“…The flow of information in a computing system is a crucial indicator for the security of the system. In a system of multiple message-passing processes, the…”
Get full text
Journal Article -
10
Modelling and Verifying Communication Failure of Hybrid Systems in HCSP
Published in Computer journal (01-08-2017)Get full text
Journal Article -
11
Atomistic Galois insertions for flow sensitive integrity
Published in Computer languages, systems & structures (01-12-2017)“…•We develop the theory of atomistic Galois insertions to link abstract security policies with the results of static analyses.•We use this to impose a content…”
Get full text
Journal Article -
12
A calculus of quality for robustness against unreliable communication
Published in Journal of logical and algebraic methods in programming (01-09-2015)Get full text
Journal Article -
13
Timing Leaks and Coarse-Grained Clocks
Published in 2019 IEEE 32nd Computer Security Foundations Symposium (CSF) (01-06-2019)“…Timing-based side-channel attacks have matured from an academic exercise to a powerful attack vector in the hand of real-world adversaries. A widely deployed…”
Get full text
Conference Proceeding -
14
Predictive access control for distributed computation
Published in Science of computer programming (01-09-2013)“…We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge…”
Get full text
Journal Article -
15
Static analysis of topology-dependent broadcast networks
Published in Information and computation (01-02-2010)“…Broadcast semantics poses significant challenges over point-to-point communication when it comes to formal modelling and analysis. Current approaches to…”
Get full text
Journal Article -
16
Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study
Published in International journal on software tools for technology transfer (01-08-2014)“…Cyber-physical systems integrate information and communication technology with the physical elements of a system, mainly for monitoring and controlling…”
Get full text
Journal Article -
17
Program Analysis (an Appetizer)
Published 18-12-2020“…This book is an introduction to program analysis that is meant to be considerably more elementary than our advanced book Principles of Program Analysis…”
Get full text
Journal Article -
18
Automated Generation of Attack Trees
Published in 2014 IEEE 27th Computer Security Foundations Symposium (01-07-2014)“…Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The…”
Get full text
Conference Proceeding -
19
CaPiTo: protocol stacks for services
Published in Formal aspects of computing (01-07-2011)“…CaPiTo allows the modelling of service-oriented applications using process algebras at three levels of abstraction. The level focuses on the key functionality…”
Get full text
Journal Article