Search Results - "Nielson, Hanne Riis"
-
1
Atomistic Galois insertions for flow sensitive integrity
Published in Computer languages, systems & structures (01-12-2017)“…•We develop the theory of atomistic Galois insertions to link abstract security policies with the results of static analyses.•We use this to impose a content…”
Get full text
Journal Article -
2
Timing Leaks and Coarse-Grained Clocks
Published in 2019 IEEE 32nd Computer Security Foundations Symposium (CSF) (01-06-2019)“…Timing-based side-channel attacks have matured from an academic exercise to a powerful attack vector in the hand of real-world adversaries. A widely deployed…”
Get full text
Conference Proceeding -
3
Discovering, quantifying, and displaying attacks
Published in Logical methods in computer science (27-04-2017)“…In the design of software and cyber-physical systems, security is often perceived as a qualitative need, but can only be attained quantitatively. Especially…”
Get full text
Journal Article -
4
A Coordination Language for Databases
Published in Logical methods in computer science (01-01-2017)“…We present a coordination language for the modeling of distributed database applications. The language, baptized Klaim-DB, borrows the concepts of localities…”
Get full text
Journal Article -
5
A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks
Published in Computer journal (01-04-2011)“…ZigRee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4's physical and medium access control layers…”
Get full text
Journal Article -
6
Static Analysis for the π-Calculus with Applications to Security
Published in Information and computation (10-07-2001)“…Control Flow Analysis is a static technique for predicting safe and computable approximations to the set of values that the objects of a program may assume…”
Get full text
Journal Article -
7
Validating firewalls using flow logics
Published in Theoretical computer science (14-06-2002)“…The ambient calculus is a calculus of computation that allows active processes to communicate and to move between sites. A site is said to be a protective…”
Get full text
Journal Article -
8
A calculus for control flow analysis of security protocols
Published in International journal of information security (01-08-2004)“…The design of a process calculus for analysing security protocols is governed by three factors: expressing the security protocol in a precise and faithful…”
Get full text
Journal Article -
9
Content dependent information flow control
Published in Journal of logical and algebraic methods in programming (01-02-2017)Get full text
Journal Article -
10
Kleene's Logic with Equality
Published in Information processing letters (15-11-2001)“…Plotkin's Powerdomain facilitates a rational reconstruction of Kleene's Logic from Predicate Logic and we use this to apply the techniques developed in…”
Get full text
Journal Article -
11
The logic of XACML
Published in Science of computer programming (01-04-2014)“…We study the international standard XACML 3.0 for describing security access control policies in a compositional way. Our main contributions are (i) to derive…”
Get full text
Journal Article -
12
Explicit Versus Symbolic Algorithms for Solving ALFP Constraints
Published in Electronic notes in theoretical computer science (01-10-2010)“…ALFP, Alternation-free Least Fixed Point logic, has successfully been used as an intermediate language in the implementation of static analysis and model…”
Get full text
Journal Article -
13
Enforcing globally dependent flow policies in message-passing systems
Published in Journal of computer languages (Online) (01-10-2019)“…The flow of information in a computing system is a crucial indicator for the security of the system. In a system of multiple message-passing processes, the…”
Get full text
Journal Article -
14
Modelling and Verifying Communication Failure of Hybrid Systems in HCSP
Published in Computer journal (01-08-2017)Get full text
Journal Article -
15
A calculus of quality for robustness against unreliable communication
Published in Journal of logical and algebraic methods in programming (01-09-2015)Get full text
Journal Article -
16
Control Flow Analysis for BioAmbients
Published in Electronic notes in theoretical computer science (18-07-2007)“…This paper presents a static analysis for investigating properties of biological systems specified in BioAmbients. We exploit the control flow analysis to…”
Get full text
Journal Article -
17
Heuristics for Safety and Security Constraints
Published in Electronic notes in theoretical computer science (01-04-2007)“…The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in…”
Get full text
Journal Article -
18
Predictive access control for distributed computation
Published in Science of computer programming (01-09-2013)“…We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge…”
Get full text
Journal Article -
19
Static analysis of topology-dependent broadcast networks
Published in Information and computation (01-02-2010)“…Broadcast semantics poses significant challenges over point-to-point communication when it comes to formal modelling and analysis. Current approaches to…”
Get full text
Journal Article -
20
Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study
Published in International journal on software tools for technology transfer (01-08-2014)“…Cyber-physical systems integrate information and communication technology with the physical elements of a system, mainly for monitoring and controlling…”
Get full text
Journal Article