Search Results - "Nielson, Flemming"

Refine Results
  1. 1

    Discovering, quantifying, and displaying attacks by Vigo, Roberto, Nielson, Flemming, Nielson, Hanne Riis

    Published in Logical methods in computer science (27-04-2017)
    “…In the design of software and cyber-physical systems, security is often perceived as a qualitative need, but can only be attained quantitatively. Especially…”
    Get full text
    Journal Article
  2. 2

    A Coordination Language for Databases by Ximeng Li, Xi Wu, Alberto Lluch Lafuente, Flemming Nielson, Hanne Riis Nielson

    Published in Logical methods in computer science (01-01-2017)
    “…We present a coordination language for the modeling of distributed database applications. The language, baptized Klaim-DB, borrows the concepts of localities…”
    Get full text
    Journal Article
  3. 3

    Efficient CSL Model Checking Using Stratification by Zhang, Lijun, Jansen, David N., Nielson, Flemming, Hermanns, Holger

    Published in Logical methods in computer science (01-01-2012)
    “…For continuous-time Markov chains, the model-checking problem with respect to continuous-time stochastic logic (CSL) has been introduced and shown to be…”
    Get full text
    Journal Article
  4. 4

    A Stochastic Broadcast Pi-Calculus by Song, Lei, Nielson, Flemming, Nielsen, Bo Friis

    “…In this paper we propose a stochastic broadcast PI-calculus which can be used to model server-client based systems where synchronization is always governed by…”
    Get full text
    Journal Article
  5. 5

    History-sensitive versus future-sensitive approaches to security in distributed systems by Hernandez, Alejandro Mario, Nielson, Flemming

    “…We consider the use of aspect-oriented techniques as a flexible way to deal with security policies in distributed systems. Recent work suggests to use aspects…”
    Get full text
    Journal Article
  6. 6

    Quantitative Verification and Synthesis of Attack-Defence Scenarios by Aslanyan, Zaruhi, Nielson, Flemming, Parker, David

    “…Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction…”
    Get full text
    Conference Proceeding Journal Article
  7. 7
  8. 8

    The logic of XACML by Ramli, Carroline Dewi Puspa Kencana, Nielson, Hanne Riis, Nielson, Flemming

    Published in Science of computer programming (01-04-2014)
    “…We study the international standard XACML 3.0 for describing security access control policies in a compositional way. Our main contributions are (i) to derive…”
    Get full text
    Journal Article
  9. 9

    Enforcing globally dependent flow policies in message-passing systems by Li, Ximeng, Nielson, Flemming, Nielson, Hanne Riis

    Published in Journal of computer languages (Online) (01-10-2019)
    “…The flow of information in a computing system is a crucial indicator for the security of the system. In a system of multiple message-passing processes, the…”
    Get full text
    Journal Article
  10. 10
  11. 11

    Atomistic Galois insertions for flow sensitive integrity by Nielson, Flemming, Riis Nielson, Hanne

    Published in Computer languages, systems & structures (01-12-2017)
    “…•We develop the theory of atomistic Galois insertions to link abstract security policies with the results of static analyses.•We use this to impose a content…”
    Get full text
    Journal Article
  12. 12
  13. 13

    Timing Leaks and Coarse-Grained Clocks by Vasilikos, Panagiotis, Riis Nielson, Hanne, Nielson, Flemming, Kopf, Boris

    “…Timing-based side-channel attacks have matured from an academic exercise to a powerful attack vector in the hand of real-world adversaries. A widely deployed…”
    Get full text
    Conference Proceeding
  14. 14

    Predictive access control for distributed computation by Yang, Fan, Hankin, Chris, Nielson, Flemming, Nielson, Hanne Riis

    Published in Science of computer programming (01-09-2013)
    “…We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge…”
    Get full text
    Journal Article
  15. 15

    Static analysis of topology-dependent broadcast networks by Nanz, Sebastian, Nielson, Flemming, Nielson, Hanne Riis

    Published in Information and computation (01-02-2010)
    “…Broadcast semantics poses significant challenges over point-to-point communication when it comes to formal modelling and analysis. Current approaches to…”
    Get full text
    Journal Article
  16. 16

    Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study by Yüksel, Ender, Nielson, Hanne Riis, Nielson, Flemming, Zhu, Huibiao, Huang, Heqing

    “…Cyber-physical systems integrate information and communication technology with the physical elements of a system, mainly for monitoring and controlling…”
    Get full text
    Journal Article
  17. 17

    Program Analysis (an Appetizer) by Nielson, Flemming, Nielson, Hanne Riis

    Published 18-12-2020
    “…This book is an introduction to program analysis that is meant to be considerably more elementary than our advanced book Principles of Program Analysis…”
    Get full text
    Journal Article
  18. 18

    Automated Generation of Attack Trees by Vigo, Roberto, Nielson, Flemming, Nielson, Hanne Riis

    “…Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The…”
    Get full text
    Conference Proceeding
  19. 19

    CaPiTo: protocol stacks for services by Gao, Han, Nielson, Flemming, Nielson, Hanne Riis

    Published in Formal aspects of computing (01-07-2011)
    “…CaPiTo allows the modelling of service-oriented applications using process algebras at three levels of abstraction. The level focuses on the key functionality…”
    Get full text
    Journal Article