Audit-based compliance control JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini International Journal of Information Security 6, 133-151, 2007 | 126 | 2007 |

Entailment relations and distributive lattices J Cederquist, T Coquand Logic colloquium 98, 127-139, 1998 | 96 | 1998 |

An audit logic for accountability JG Cederquist, R Conn, MAC Dekker, S Etalle, JI Den Hartog Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005 | 81 | 2005 |

A constructive proof of the Heine-Borel covering theorem for formal reals J Cederquist, S Negri International Workshop on Types for Proofs and Programs, 62-75, 1995 | 50 | 1995 |

A machine-checked formalization of the generic model and the random oracle model G Barthe, J Cederquist, S Tarento Automated Reasoning: Second International Joint Conference, IJCAR 2004, Cork …, 2004 | 45 | 2004 |

The Hahn-Banach theorem in type theory J Cederquist, T Coquand, S Negri Twenty-Five years of Constructive Type Theory, Oxford, 1998 | 38 | 1998 |

On the quest for impartiality: Design and analysis of a fair non-repudiation protocol J Cederquist, R Corin, MT Dashti Information and Communications Security: 7th International Conference, ICICS …, 2005 | 30 | 2005 |

An intruder model for verifying liveness in security protocols J Cederquist, MT Dashti Proceedings of the fourth ACM workshop on Formal methods in security, 23-32, 2006 | 22 | 2006 |

A certified email protocol using key chains J Cederquist, MT Dashti, S Mauw 21st International Conference on Advanced Information Networking and …, 2007 | 19 | 2007 |

A machine assisted formalization of pointfree topology in type theory J Cederquist Department of Computing Science, 1994 | 14 | 1994 |

The audit logic: Policy compliance in distributed systems JG Cederquist, RJ Corin, MAC Dekker, S Etalle, J den Hartog, G Lenzini Centre for Telematics and Information Technology (CTIT), 2006 | 13 | 2006 |

Entailment relations and Distributive Lattices Logic Colloquium’98 (Prague), 127–139, Lect J Cederquist, T Coquand Notes Log 13, 2000 | 13 | 2000 |

A pointfree approach to constructive analysis in type theory J Cederquist Department of Computing Science, 1997 | 13 | 1997 |

Formal analysis of a fair payment protocol J Cederquist, MT Dashti IFIP World Computer Congress, TC 1, 41-54, 2004 | 12 | 2004 |

An introduction to well-ordering proofs in Martin-Löf's type theory A Setzer¹ Twenty Five Years of Constructive Type Theory 36, 245, 1998 | 12 | 1998 |

Extended privilege inheritance in RBAC MAC Dekker, JG Cederquist, J Crampton, S Etalle Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 11 | 2007 |

An intruder model for verifying termination in security protocols JG Cederquist, MT Dashti Centre for Telematics and Information Technology (CTIT), 2005 | 11 | 2005 |

An implementation of the Heine-Borel covering theorem in type theory J Cederquist International Workshop on Types for Proofs and Programs, 46-65, 1996 | 7 | 1996 |

A machine assisted proof of the Hahn-Banach theorem J Cederquist Chalmers University of Technology and University of Göteborg, 1997 | 6 | 1997 |

Non-disclosure for distributed mobile code AA Matos, J Cederquist Mathematical Structures in Computer Science 21 (6), 1111-1181, 2011 | 5 | 2011 |