Seguir
Sebastian Alexander Mödersheim
Sebastian Alexander Mödersheim
Associate Professor of Computer Science, Denmark's Technical University
Email confirmado em imm.dtu.dk - Página inicial
Título
Citado por
Citado por
Ano
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
15582005
An on-the-fly model-checker for security protocol analysis
D Basin, S Mödersheim, L Vigano
Computer Security–ESORICS 2003, 253-270, 2003
886*2003
A high level protocol specification language for industrial security-sensitive protocols
Y Chevalier, L Compagna, J Cuellar, P Hankes Drielsma, J Mantovani, ...
Proceedings of workshop on specification and automated processing of …, 2004
2192004
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
1372012
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
Computer Aided Verification, 349-354, 2002
1052002
Secure pseudonymous channels
S Mödersheim, L Viganò
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
952009
Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario
M Backes, S Mödersheim, B Pfitzmann, L Vigano
International Conference on Foundations of Software Science and Computation …, 2006
892006
The open-source fixed-point model checker for symbolic analysis of security protocols
S Mödersheim, L Vigano
International School on Foundations of Security Analysis and Design, 166-194, 2007
842007
Algebraic properties in alice and bob notation
S Mödersheim
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
692009
CDiff: a new reduction technique for constraint-based analysis of security protocols
D Basin, S Mödersheim, L Vigano
Proceedings of the 10th ACM conference on Computer and communications …, 2003
592003
A formal model of identity mixer
J Camenisch, S Mödersheim, D Sommer
Formal Methods for Industrial Critical Systems, 198-214, 2010
55*2010
Abstraction by set-membership: verifying security protocols and web services with databases
SA Mödersheim
ACM Conference on Computer and Communications Security 17, 351-360, 2010
532010
Proactive security analysis of changes in virtualized infrastructures
S Bleikertz, C Vogel, T Groß, S Mödersheim
Proceedings of the 31st annual computer security applications conference, 51-60, 2015
492015
A card requirements language enabling privacy-preserving access control
J Camenisch, S Mödersheim, G Neven, FS Preiss, D Sommer
Proceeding of the 15th ACM symposium on Access control models and …, 2010
492010
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
S Mödersheim, L Vigano, D Basin
Journal of Computer Security 18 (4), 575-618, 2010
462010
Algebraic intruder deductions
D Basin, S Mödersheim, L Vigano
Logic for Programming, Artificial Intelligence, and Reasoning, 549-564, 2005
462005
ASLan++—a formal security specification language for distributed systems
D Von Oheimb, S Mödersheim
Formal Methods for Components and Objects: 9th International Symposium, FMCO …, 2012
432012
Vertical Protocol Composition
T Groß, S Mödersheim
24th IEEE Computer Security Foundations Workshop (CSF 2011), 2011
422011
Avispa v1. 1 user manual
TA Team
Information society technologies programme (June 2006), http://avispa …, 2006
412006
Automated verification of virtualized infrastructures
S Bleikertz, T Groß, S Mödersheim
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 47-58, 2011
342011
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20