BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Belgium
1 × Czech Republic
1 × France
1 × Hungary
1 × Russia
1 × Serbia
1 × South Africa
1 × Switzerland
2 × Austria
2 × Canada
3 × Denmark
3 × Germany
3 × United Kingdom
4 × Italy
8 × USA
Collaborated with:
A.Ayari S.Matthews F.Klaedtke T.Walsh L.Viganò M.T.Dashti I.Kraan A.Bundy J.Doser M.Guarnieri C.J.F.Cremers H.Kuruma C.Sprenger G.Denker H.Ganzinger N.Klarlund T.S.Hoang M.Clavel M.Egea G.P.Maretic P.Tsankov B.Conchinha C.Caleiro S.Müller D.Senn G.Caronni T.Lodderstedt F.Rittinger A.Podelski E.Zalinescu O.Maric C.S.0001 S.Meier B.Schmidt C.Cremers A.P.Streich M.Frank J.M.Buhmann J.Abrial K.Takaragi B.Wolff S.Friedrich J.Posegga H.Vogt Y.Deville P.Flener A.Hamfelt J.F.Nilsson A.Fürst K.Desai N.Sato K.Miyazaki M.A.G.d.Dios C.Dania M.Schläpfer A.Armando Y.Chevalier L.Compagna S.Mödersheim M.Rusinowitch M.Turuani L.Vigneron M.Bouallagui Y.Boichut J.Cuéllar P.H.Drielsma P.Héam O.Kouchnarenko J.Mantovani D.v.Oheimb J.Santiago
Talks about:
secur (11) logic (10) model (8) protocol (6) order (6) base (6) program (5) synthesi (4) analysi (4) verif (4)

Person: David A. Basin

DBLP DBLP: Basin:David_A=

Facilitated 1 volumes:

IJCAR 2004Ed

Contributed to:

IFM 20142014
CSL-LICS 20142014
VLDB 20142014
CAV 20132013
ISSTA 20132013
RTA 20112011
CAV 20102010
CSL 20102010
ICSE 20102010
ICML 20092009
IFM 20092009
LICS 20082008
MoDELS 20072007
CAV 20052005
FM 20052005
TestCom 20052005
PDCL 20042004
CAV 20022002
FME 20022002
UML 20022002
ESEC/FSE 20012001
CAV 20002000
WRLA 20002000
CAV 19991999
WRLA 19981998
CSL 19971997
CADE 19961996
KR 19961996
LICS 19961996
TACAS 19961996
CAV 19951995
CADE 19941994
ICLP 19941994
LOPSTR/META 19941994
ICLP 19931993
CADE 19921992
LOPSTR 19921992
CADE 19901990
CADE 19881988
CAV (1) 20172017
CAV (2) 20172017

Wrote 42 papers:

IFM-2014-FurstHBDSM #code generation
Code Generation for Event-B (AF, TSH, DAB, KD, NS, KM), pp. 323–338.
LICS-CSL-2014-MareticDB #ltl
Anchored LTL separation (GPM, MTD, DAB), p. 9.
VLDB-2014-GuarnieriB #query
Optimal Security-Aware Query Processing (MG, DAB), pp. 1307–1318.
CAV-2013-MeierSCB #analysis #protocol #proving #security
The TAMARIN Prover for the Symbolic Analysis of Security Protocols (SM, BS, CC, DAB), pp. 696–701.
ISSTA-2013-TsankovDB #testing
Semi-valid input coverage for fuzz testing (PT, MTD, DAB), pp. 56–66.
RTA-2011-ConchinhaBC #deduction #equivalence #named #performance
FAST: An Efficient Decision Procedure for Deduction and Static Equivalence (BC, DAB, CC), pp. 11–20.
CAV-2010-BasinKM #first-order #logic #monitoring #policy
Policy Monitoring in First-Order Temporal Logic (DAB, FK, SM), pp. 1–18.
CSL-2010-BasinC #protocol #security
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries (DAB, CJFC), pp. 1–18.
ICSE-2010-DiosDSBCE #development #modelling #named #user interface
SSG: a model-based development environment for smart, security-aware GUIs (MAGdD, CD, MS, DAB, MC, ME), pp. 311–312.
ICML-2009-StreichFBB #clustering #multi
Multi-assignment clustering for Boolean data (APS, MF, DAB, JMB), pp. 969–976.
IFM-2009-HoangKBA
Developing Topology Discovery in Event-B (TSH, HK, DAB, JRA), pp. 1–19.
LICS-2008-SprengerB #abstraction
Cryptographically-Sound Protocol-Model Abstractions (CS, DAB), pp. 115–129.
MoDELS-2007-BasinCDE #approach #metamodelling #modelling
A Metamodel-Based Approach for Analyzing Security-Design Models (DAB, MC, JD, ME), pp. 420–435.
CAV-2005-ArmandoBBCCCDHKMMORSTVV #automation #internet #protocol #security #validation
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications (AA, DAB, YB, YC, LC, JC, PHD, PCH, OK, JM, SM, DvO, MR, JS, MT, LV, LV), pp. 281–285.
FM-2005-BasinKTW #architecture #verification
Verification of a Signature Architecture with HOL-Z (DAB, HK, KT, BW), pp. 269–285.
TestCom-2005-SennBC #consistency #testing
Firewall Conformance Testing (DS, DAB, GC), pp. 226–241.
PDCL-2004-BasinDFHN #logic #source code #synthesis
Synthesis of Programs in Computational Logic (DAB, YD, PF, AH, JFN), pp. 30–65.
CAV-2002-ArmandoBBCCMRTVV #analysis #protocol #security
The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
FME-2002-Basin #calculus #synthesis
The Next 700 Synthesis Calculi (DAB), p. 430.
UML-2002-LodderstedtBD #modelling #named #security #uml
SecureUML: A UML-Based Modeling Language for Model-Driven Security (TL, DAB, JD), pp. 426–441.
ESEC-FSE-2001-BasinRV #corba #security
A formal data-model of the CORBA security service (DAB, FR, LV), pp. 303–304.
CAV-2000-AyariB #bound #higher-order #logic #monad
Bounded Model Construction for Monadic Second-Order Logics (AA, DAB), pp. 99–112.
CAV-2000-AyariBK #automaton #induction
Decision Procedures for Inductive Boolean Functions Based on Alternating Automata (AA, DAB, FK), pp. 170–185.
WRLA-2000-BasinD #analysis #comparison #haskell #maude #protocol #security
Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis (DAB, GD), pp. 235–256.
CAV-1999-BasinFPV #bytecode #java #model checking #verification
Java Bytecode Verification by Model Checking (DAB, SF, JP, HV), pp. 491–494.
WRLA-1998-BasinM
Scoped metatheorems (DAB, SM), pp. 353–366.
CSL-1997-AyariBP #named #specification
LISA: A Specification Language Based on WS2S (AA, DAB, AP), pp. 18–34.
CADE-1996-BasinM #induction
Structuring Metatheory on Inductive Definitions (DAB, SM), pp. 171–185.
KR-1996-BasinMV #framework #implementation #logic
Implementing Modal and Relevance Logics in a Logical Framework (DAB, SM, LV), pp. 386–397.
LICS-1996-BasinG #analysis #complexity #order
Complexity Analysis Based on Ordered Resolution (DAB, HG), pp. 456–465.
TACAS-1996-AyariB #deduction #development
Generic System Support for Deductive Program Development (AA, DAB), pp. 313–328.
CAV-1995-BasinK #hardware #higher-order #logic #monad #using #verification
Hardware Verification using Monadic Second-Order Logic (DAB, NK), pp. 31–41.
CADE-1994-BasinW #order #termination
Termination Orderings for Rippling (DAB, TW), pp. 466–483.
ICLP-1994-Basin
IsaWhelk Interpreted in Isabelle (DAB), p. 741.
LOPSTR-1994-Basin #framework #logic programming #source code
Logic Frameworks for Logic Programs (DAB), pp. 1–16.
ICLP-1993-KraanBB #logic programming #reasoning #synthesis
Middle-Out Reasoning for Logic Program Synthesis (IK, DAB, AB), pp. 441–455.
CADE-1992-BasinW #difference
Difference Matching (DAB, TW), pp. 295–309.
LOPSTR-1992-KraanBB #logic programming #proving #synthesis #theorem proving
Logic Program Synthesis via Proof Planning (IK, DAB, AB), pp. 1–14.
CADE-1990-Basin #commutative #morphism #similarity
Equality of Terms Containing Associative-Commutative Functions and Commutative Binding Operators in Isomorphism Complete (DAB), pp. 251–260.
CADE-1988-Basin #automation #reasoning
An Environment For Automated Reasoning About Partial Functions (DAB), pp. 101–110.
CAV-2017-BasinKZ #data type #runtime #verification
Runtime Verification of Temporal Properties over Out-of-Order Data Streams (DAB, FK, EZ), pp. 356–376.
CAV-2017-MaricSB #algorithm #bound
Cutoff Bounds for Consensus Algorithms (OM, CS0, DAB), pp. 217–237.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.