BibTeX records: Florian Kammüller

download as .bib file

@article{DBLP:journals/information/KammullerS23,
  author       = {Florian Kamm{\"{u}}ller and
                  Dimpy Satija},
  title        = {Explanation of Student Attendance {AI} Prediction with the Isabelle
                  Infrastructure Framework},
  journal      = {Inf.},
  volume       = {14},
  number       = {8},
  pages        = {453},
  year         = {2023},
  url          = {https://doi.org/10.3390/info14080453},
  doi          = {10.3390/INFO14080453},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/information/KammullerS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Kammuller23,
  author       = {Florian Kamm{\"{u}}ller},
  editor       = {Sokratis K. Katsikas and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Rita Maria Ugarelli and
                  Isabel Pra{\c{c}}a and
                  Wenjuan Li and
                  Weizhi Meng and
                  Steven Furnell and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla and
                  Michele Ianni and
                  Mila Dalla Preda and
                  Kim{-}Kwang Raymond Choo and
                  Miguel Pupo Correia and
                  Abhishta Abhishta and
                  Giovanni Sileno and
                  Mina Alishahi and
                  Harsha K. Kalutarage and
                  Naoto Yanai},
  title        = {Introducing Distributed Ledger Security into System Specifications
                  with the Isabelle RR-Cycle},
  booktitle    = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP,
                  ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The
                  Netherlands, September 25-29, 2023, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14399},
  pages        = {330--340},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54129-2\_19},
  doi          = {10.1007/978-3-031-54129-2\_19},
  timestamp    = {Mon, 25 Mar 2024 20:43:51 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/Kammuller23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-17555,
  author       = {Florian Kamm{\"{u}}ller},
  title        = {Higher Order Model Checking in Isabelle for Human Centric Infrastructure
                  Security},
  journal      = {CoRR},
  volume       = {abs/2312.17555},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.17555},
  doi          = {10.48550/ARXIV.2312.17555},
  eprinttype    = {arXiv},
  eprint       = {2312.17555},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-17555.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ci/KarthickMKA22,
  author       = {Gayathri Karthick and
                  Glenford Mapp and
                  Florian Kammueller and
                  Mahdi Aiash},
  title        = {Modeling and verifying a resource allocation algorithm for secure
                  service migration for commercial cloud systems},
  journal      = {Comput. Intell.},
  volume       = {38},
  number       = {3},
  pages        = {811--828},
  year         = {2022},
  url          = {https://doi.org/10.1111/coin.12421},
  doi          = {10.1111/COIN.12421},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ci/KarthickMKA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Kammuller22,
  author       = {Florian Kamm{\"{u}}ller},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Nicola Dragoni},
  title        = {Explanation of Black Box {AI} for {GDPR} Related Privacy Using Isabelle},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2022 International Workshops, {DPM} 2022 and {CBT} 2022,
                  Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13619},
  pages        = {69--84},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25734-6\_5},
  doi          = {10.1007/978-3-031-25734-6\_5},
  timestamp    = {Tue, 28 Feb 2023 08:10:09 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/Kammuller22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/Kammuller22,
  author       = {Florian Kamm{\"{u}}ller},
  editor       = {Jessie Y. C. Chen and
                  Gino Fragomeni and
                  Helmut Degen and
                  Stavroula Ntoa},
  title        = {Explanation by Automated Reasoning Using the Isabelle Infrastructure
                  Framework},
  booktitle    = {{HCI} International 2022 - Late Breaking Papers: Interacting with
                  eXtended Reality and Artificial Intelligence - 24th International
                  Conference on Human-Computer Interaction, {HCII} 2022, Virtual Event,
                  June 26 - July 1, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13518},
  pages        = {307--318},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-21707-4\_22},
  doi          = {10.1007/978-3-031-21707-4\_22},
  timestamp    = {Thu, 01 Dec 2022 15:24:24 +0100},
  biburl       = {https://dblp.org/rec/conf/hci/Kammuller22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/KammullerA22,
  author       = {Florian Kamm{\"{u}}ller and
                  Chelsea Mira Alvarado},
  editor       = {Abbas Moallem},
  title        = {Exploring Rationality of Self Awareness in Social Networking for Logical
                  Modeling of Unintentional Insiders},
  booktitle    = {{HCI} for Cybersecurity, Privacy and Trust - 4th International Conference,
                  {HCI-CPT} 2022, Held as Part of the 24th {HCI} International Conference,
                  {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13333},
  pages        = {340--357},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-05563-8\_22},
  doi          = {10.1007/978-3-031-05563-8\_22},
  timestamp    = {Tue, 21 Jun 2022 15:24:36 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/KammullerA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/KammullerK21,
  author       = {Florian Kamm{\"{u}}ller and
                  Manfred Kerber},
  title        = {Applying the Isabelle Insider framework to airplane security},
  journal      = {Sci. Comput. Program.},
  volume       = {206},
  pages        = {102623},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.scico.2021.102623},
  doi          = {10.1016/J.SCICO.2021.102623},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/KammullerK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/KammullerLS21,
  author       = {Florian Kamm{\"{u}}ller and
                  Axel Legay and
                  Stefano Schivo},
  title        = {Masterminding change by combining secure system design with security
                  risk assessment},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {23},
  number       = {1},
  pages        = {69--70},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10009-020-00595-8},
  doi          = {10.1007/S10009-020-00595-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/KammullerLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-15425,
  author       = {Florian Kamm{\"{u}}ller and
                  Chelsea Mira Alvarado},
  title        = {Exploring rationality of self awareness in social networking for logical
                  modeling of unintentional insiders},
  journal      = {CoRR},
  volume       = {abs/2111.15425},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.15425},
  eprinttype    = {arXiv},
  eprint       = {2111.15425},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-15425.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-04374,
  author       = {Florian Kamm{\"{u}}ller},
  title        = {Dependability Engineering in Isabelle},
  journal      = {CoRR},
  volume       = {abs/2112.04374},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.04374},
  eprinttype    = {arXiv},
  eprint       = {2112.04374},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-04374.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-14809,
  author       = {Florian Kamm{\"{u}}ller},
  title        = {Explanation by Automated Reasoning Using the Isabelle Infrastructure
                  Framework},
  journal      = {CoRR},
  volume       = {abs/2112.14809},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.14809},
  eprinttype    = {arXiv},
  eprint       = {2112.14809},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-14809.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/afp/Kammueller20,
  author       = {Florian Kammueller},
  title        = {Attack Trees in Isabelle for {GDPR} compliance of IoT healthcare systems},
  journal      = {Arch. Formal Proofs},
  volume       = {2020},
  year         = {2020},
  url          = {https://www.isa-afp.org/entries/Attack\_Trees.html},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/afp/Kammueller20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/KammullerN20,
  author       = {Florian Kamm{\"{u}}ller and
                  Uwe Nestmann},
  editor       = {Bruno Bernardo and
                  Diego Marmsoler},
  title        = {Inter-Blockchain Protocols with the Isabelle Infrastructure Framework},
  booktitle    = {2nd Workshop on Formal Methods for Blockchains, FMBC@CAV 2020, July
                  20-21, 2020, Los Angeles, California, {USA} (Virtual Conference)},
  series       = {OASIcs},
  volume       = {84},
  pages        = {11:1--11:12},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/OASIcs.FMBC.2020.11},
  doi          = {10.4230/OASICS.FMBC.2020.11},
  timestamp    = {Mon, 21 Dec 2020 13:23:22 +0100},
  biburl       = {https://dblp.org/rec/conf/cav/KammullerN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KammullerL20,
  author       = {Florian Kamm{\"{u}}ller and
                  Bianca Lutz},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {Modeling and Analyzing the Corona-Virus Warning App with the Isabelle
                  Infrastructure Framework},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2020 International Workshops, {DPM} 2020 and {CBT} 2020,
                  Guildford, UK, September 17-18, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12484},
  pages        = {128--144},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66172-4\_8},
  doi          = {10.1007/978-3-030-66172-4\_8},
  timestamp    = {Tue, 12 Jan 2021 14:44:40 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KammullerL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/BornatBKPN20,
  author       = {Richard Bornat and
                  Jaap Boender and
                  Florian Kammueller and
                  Guillaume Poly and
                  Rajagopal Nagarajan},
  editor       = {Armin Biere and
                  David Parker},
  title        = {Describing and Simulating Concurrent Quantum Systems},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 26th International Conference, {TACAS} 2020, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2020, Dublin, Ireland, April 25-30, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12079},
  pages        = {271--277},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45237-7\_16},
  doi          = {10.1007/978-3-030-45237-7\_16},
  timestamp    = {Fri, 14 May 2021 08:34:19 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/BornatBKPN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-08983,
  author       = {Florian Kamm{\"{u}}ller},
  title        = {A Formal Development Cycle for Security Engineering in Isabelle},
  journal      = {CoRR},
  volume       = {abs/2001.08983},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.08983},
  eprinttype    = {arXiv},
  eprint       = {2001.08983},
  timestamp    = {Thu, 30 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-08983.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-11838,
  author       = {Florian Kamm{\"{u}}ller and
                  Manfred Kerber},
  title        = {Applying the Isabelle Insider Framework to Airplane Security},
  journal      = {CoRR},
  volume       = {abs/2003.11838},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.11838},
  eprinttype    = {arXiv},
  eprint       = {2003.11838},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-11838.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kammuller19,
  author       = {Florian Kamm{\"{u}}ller},
  title        = {Attack trees in Isabelle extended with probabilities for quantum cryptography},
  journal      = {Comput. Secur.},
  volume       = {87},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.101572},
  doi          = {10.1016/J.COSE.2019.101572},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kammuller19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/Kammuller19,
  author       = {Florian Kamm{\"{u}}ller},
  title        = {Combining Secure System Design with Risk Assessment for IoT Healthcare
                  Systems},
  booktitle    = {{IEEE} International Conference on Pervasive Computing and Communications
                  Workshops, PerCom Workshops 2019, Kyoto, Japan, March 11-15, 2019},
  pages        = {961--966},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PERCOMW.2019.8730776},
  doi          = {10.1109/PERCOMW.2019.8730776},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/Kammuller19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-02426,
  author       = {Florian Kamm{\"{u}}ller and
                  Oladapo O. Ogunyanwo and
                  Christian W. Probst},
  title        = {Designing Data Protection for {GDPR} Compliance into IoT Healthcare
                  Systems},
  journal      = {CoRR},
  volume       = {abs/1901.02426},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.02426},
  eprinttype    = {arXiv},
  eprint       = {1901.02426},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-02426.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-00325,
  author       = {Florian Kamm{\"{u}}ller},
  title        = {{QKD} in Isabelle - Bayesian Calculation},
  journal      = {CoRR},
  volume       = {abs/1905.00325},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.00325},
  eprinttype    = {arXiv},
  eprint       = {1905.00325},
  timestamp    = {Mon, 27 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-00325.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Kammuller18,
  author       = {Florian Kamm{\"{u}}ller},
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {Attack Trees in Isabelle},
  booktitle    = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11149},
  pages        = {611--628},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1\_36},
  doi          = {10.1007/978-3-030-01950-1\_36},
  timestamp    = {Sat, 05 Sep 2020 18:01:07 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/Kammuller18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/Kammueller18,
  author       = {Florian Kammueller},
  title        = {Formal Modeling and Analysis of Data Protection for {GDPR} Compliance
                  of IoT Healthcare Systems},
  booktitle    = {{IEEE} International Conference on Systems, Man, and Cybernetics,
                  {SMC} 2018, Miyazaki, Japan, October 7-10, 2018},
  pages        = {3319--3324},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SMC.2018.00562},
  doi          = {10.1109/SMC.2018.00562},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/Kammueller18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucc/KarthickMKA18,
  author       = {Gayathri Karthick and
                  Glenford Mapp and
                  Florian Kammueller and
                  Mahdi Aiash},
  editor       = {Alan Sill and
                  Josef Spillner},
  title        = {Formalization and Analysis of a Resource Allocation Security Protocol
                  for Secure Service Migration},
  booktitle    = {2018 {IEEE/ACM} International Conference on Utility and Cloud Computing
                  Companion, {UCC} Companion 2018, Zurich, Switzerland, December 17-20,
                  2018},
  pages        = {207--212},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/UCC-Companion.2018.00058},
  doi          = {10.1109/UCC-COMPANION.2018.00058},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ucc/KarthickMKA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-06494,
  author       = {Florian Kamm{\"{u}}ller},
  title        = {Attack Trees in Isabelle - {CTL} semantics, correctness and completeness},
  journal      = {CoRR},
  volume       = {abs/1803.06494},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.06494},
  eprinttype    = {arXiv},
  eprint       = {1803.06494},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-06494.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KammullerKP17,
  author       = {Florian Kamm{\"{u}}ller and
                  Manfred Kerber and
                  Christian W. Probst},
  title        = {Insider Threats and Auctions: Formalization, Mechanized Proof, and
                  Code Generation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {1},
  pages        = {44--78},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.03.31.044},
  doi          = {10.22667/JOWUA.2017.03.31.044},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KammullerKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/KammullerP17,
  author       = {Florian Kamm{\"{u}}ller and
                  Christian W. Probst},
  title        = {Modeling and Verification of Insider Threats Using Logical Analysis},
  journal      = {{IEEE} Syst. J.},
  volume       = {11},
  number       = {2},
  pages        = {534--545},
  year         = {2017},
  url          = {https://doi.org/10.1109/JSYST.2015.2453215},
  doi          = {10.1109/JSYST.2015.2453215},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/KammullerP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ahfe/Kammuller17,
  author       = {Florian Kamm{\"{u}}ller},
  editor       = {Denise Nicholson},
  title        = {Human Centric Security and Privacy for the IoT Using Formal Techniques},
  booktitle    = {Advances in Human Factors in Cybersecurity - Proceedings of the {AHFE}
                  2017 International Conference on Human Factors in Cybersecurity, July
                  17-21, 2017, The Westin Bonaventure Hotel, Los Angeles, California,
                  {USA}},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {593},
  pages        = {106--116},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60585-2\_12},
  doi          = {10.1007/978-3-319-60585-2\_12},
  timestamp    = {Tue, 05 Oct 2021 13:49:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ahfe/Kammuller17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Kammuller17,
  author       = {Florian Kamm{\"{u}}ller},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Hannes Hartenstein and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {A Proof Calculus for Attack Trees in Isabelle},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2017 International Workshops, {DPM} 2017 and {CBT} 2017,
                  Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10436},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67816-0\_1},
  doi          = {10.1007/978-3-319-67816-0\_1},
  timestamp    = {Fri, 27 Dec 2019 21:19:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/Kammuller17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/Kammuller17,
  author       = {Florian Kamm{\"{u}}ller},
  editor       = {Theo Tryfonas},
  title        = {Formal Modeling and Analysis with Humans in Infrastructures for IoT
                  Health Care Systems},
  booktitle    = {Human Aspects of Information Security, Privacy and Trust - 5th International
                  Conference, {HAS} 2017, Held as Part of {HCI} International 2017,
                  Vancouver, BC, Canada, July 9-14, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10292},
  pages        = {339--352},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58460-7\_24},
  doi          = {10.1007/978-3-319-58460-7\_24},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/Kammuller17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sera/KammullerAJ17,
  author       = {Florian Kamm{\"{u}}ller and
                  Juan Carlos Augusto and
                  Simon Jones},
  editor       = {Liz Bacon and
                  Jixin Ma and
                  Lachlan M. MacKinnon},
  title        = {Security and privacy requirements engineering for human centric IoT
                  systems using eFRIEND and Isabelle},
  booktitle    = {15th {IEEE} International Conference on Software Engineering Research,
                  Management and Applications, {SERA} 2017, London, United Kingdom,
                  June 7-9, 2017},
  pages        = {401--406},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SERA.2017.7965758},
  doi          = {10.1109/SERA.2017.7965758},
  timestamp    = {Mon, 12 Oct 2020 16:45:55 +0200},
  biburl       = {https://dblp.org/rec/conf/sera/KammullerAJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ProbstKH16,
  author       = {Christian W. Probst and
                  Florian Kamm{\"{u}}ller and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Christian W. Probst and
                  Chris Hankin and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {Formal Modelling and Analysis of Socio-Technical Systems},
  booktitle    = {Semantics, Logics, and Calculi - Essays Dedicated to Hanne Riis Nielson
                  and Flemming Nielson on the Occasion of Their 60th Birthdays},
  series       = {Lecture Notes in Computer Science},
  volume       = {9560},
  pages        = {54--73},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-27810-0\_3},
  doi          = {10.1007/978-3-319-27810-0\_3},
  timestamp    = {Tue, 21 Mar 2023 20:58:42 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/ProbstKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KammuellerKP16,
  author       = {Florian Kammueller and
                  Manfred Kerber and
                  Christian W. Probst},
  editor       = {Ilsun You and
                  Elisa Bertino},
  title        = {Towards Formal Analysis of Insider Threats for Auctions},
  booktitle    = {Proceedings of the 8th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October
                  28, 2016},
  pages        = {23--34},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2995963},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KammuellerKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/Chen0KNP16,
  author       = {Taolue Chen and
                  Tingting Han and
                  Florian Kammueller and
                  Ibrahim Nemli and
                  Christian W. Probst},
  title        = {Model based analysis of insider threats},
  booktitle    = {2016 International Conference On Cyber Security And Protection Of
                  Digital Services (Cyber Security), London, United Kingdom, June 13-14,
                  2016},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CyberSecPODS.2016.7502350},
  doi          = {10.1109/CYBERSECPODS.2016.7502350},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/Chen0KNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Kammuller16,
  author       = {Florian Kamm{\"{u}}ller},
  editor       = {Giovanni Livraga and
                  Vicen{\c{c}} Torra and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {Isabelle Modelchecking for Insider Threats},
  booktitle    = {Data Privacy Management and Security Assurance - 11th International
                  Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016,
                  Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9963},
  pages        = {196--210},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47072-6\_13},
  doi          = {10.1007/978-3-319-47072-6\_13},
  timestamp    = {Sat, 30 Sep 2023 09:40:25 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Kammuller16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Kammuller16a,
  author       = {Florian Kamm{\"{u}}ller},
  editor       = {Giovanni Livraga and
                  Vicen{\c{c}} Torra and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {Refactoring Preserves Security},
  booktitle    = {Data Privacy Management and Security Assurance - 11th International
                  Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016,
                  Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9963},
  pages        = {238--245},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47072-6\_17},
  doi          = {10.1007/978-3-319-47072-6\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Kammuller16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/KammullerNP16,
  author       = {Florian Kamm{\"{u}}ller and
                  Jason R. C. Nurse and
                  Christian W. Probst},
  editor       = {Theo Tryfonas},
  title        = {Attack Tree Analysis for Insider Threats on the IoT Using Isabelle},
  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - 4th International
                  Conference, {HAS} 2016, Held as Part of {HCI} International 2016,
                  Toronto, ON, Canada, July 17-22, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9750},
  pages        = {234--246},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39381-0\_21},
  doi          = {10.1007/978-3-319-39381-0\_21},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/KammullerNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KammullerK16,
  author       = {Florian Kamm{\"{u}}ller and
                  Manfred Kerber},
  title        = {Investigating Airplane Safety and Security Against Insider Threats
                  Using Logical Modeling},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {304--313},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.47},
  doi          = {10.1109/SPW.2016.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KammullerK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/IvanovaPHK15,
  author       = {Marieta Georgieva Ivanova and
                  Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen and
                  Florian Kamm{\"{u}}ller},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {Transforming Graphical System Models to Graphical Attack Models},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {82--96},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_6},
  doi          = {10.1007/978-3-319-29968-6\_6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/IvanovaPHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HelkeKP15,
  author       = {Steffen Helke and
                  Florian Kamm{\"{u}}ller and
                  Christian W. Probst},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {Secure Refactoring with Java Information Flow},
  booktitle    = {Data Privacy Management, and Security Assurance - 10th International
                  Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015,
                  Vienna, Austria, September 21-22, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9481},
  pages        = {264--272},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29883-2\_19},
  doi          = {10.1007/978-3-319-29883-2\_19},
  timestamp    = {Sun, 25 Oct 2020 22:34:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/HelkeKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/ChenKNP15,
  author       = {Taolue Chen and
                  Florian Kamm{\"{u}}ller and
                  Ibrahim Nemli and
                  Christian W. Probst},
  editor       = {Theo Tryfonas and
                  Ioannis G. Askoxylakis},
  title        = {A Probabilistic Analysis Framework for Malicious Insider Threats},
  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - Third
                  International Conference, {HAS} 2015, Held as Part of {HCI} International
                  2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9190},
  pages        = {178--189},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20376-8\_16},
  doi          = {10.1007/978-3-319-20376-8\_16},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/ChenKNP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/IvanovaPHK15,
  author       = {Marieta Georgieva Ivanova and
                  Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen and
                  Florian Kamm{\"{u}}ller},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Attack Tree Generation by Policy Invalidation},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {249--259},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_16},
  doi          = {10.1007/978-3-319-24018-3\_16},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/IvanovaPHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/BoenderKN15,
  author       = {Jaap Boender and
                  Florian Kamm{\"{u}}ller and
                  Rajagopal Nagarajan},
  editor       = {Chris Heunen and
                  Peter Selinger and
                  Jamie Vicary},
  title        = {Formalization of Quantum Protocols using Coq},
  booktitle    = {Proceedings 12th International Workshop on Quantum Physics and Logic,
                  {QPL} 2015, Oxford, UK, July 15-17, 2015},
  series       = {{EPTCS}},
  volume       = {195},
  pages        = {71--83},
  year         = {2015},
  url          = {https://doi.org/10.4204/EPTCS.195.6},
  doi          = {10.4204/EPTCS.195.6},
  timestamp    = {Wed, 14 Nov 2018 10:31:26 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/BoenderKN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KammullerP14,
  author       = {Florian Kamm{\"{u}}ller and
                  Christian W. Probst},
  title        = {Invalidating Policies using Structural Information},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {2},
  pages        = {59--79},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.06.31.059},
  doi          = {10.22667/JOWUA.2014.06.31.059},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KammullerP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict/Kammuller14,
  author       = {Florian Kamm{\"{u}}ller},
  title        = {Verification of DNSsec Delegation Signatures},
  booktitle    = {21st International Conference on Telecommunications, {ICT} 2014, Lisbon,
                  Portugal, 4-7 May, 2014},
  pages        = {298--392},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICT.2014.6845127},
  doi          = {10.1109/ICT.2014.6845127},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ict/Kammuller14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KammullerP14,
  author       = {Florian Kamm{\"{u}}ller and
                  Christian W. Probst},
  title        = {Combining Generated Data Models with Formal Invalidation for Insider
                  Threat Analysis},
  booktitle    = {35. {IEEE} Security and Privacy Workshops, {SPW} 2014, San Jose, CA,
                  USA, May 17-18, 2014},
  pages        = {229--235},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SPW.2014.45},
  doi          = {10.1109/SPW.2014.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KammullerP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/BoenderIKP14,
  author       = {Jaap Boender and
                  Marieta Georgieva Ivanova and
                  Florian Kamm{\"{u}}ller and
                  Giuseppe Primiero},
  editor       = {Giampaolo Bella and
                  Gabriele Lenzini},
  title        = {Modeling Human Behaviour with Higher Order Logic: Insider Threats},
  booktitle    = {2014 Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
                  2014, Vienna, Austria, July 18, 2014},
  pages        = {31--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/STAST.2014.13},
  doi          = {10.1109/STAST.2014.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stast/BoenderIKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kammueller14,
  author       = {Florian Kammueller},
  title        = {Confinement for Active Objects},
  journal      = {CoRR},
  volume       = {abs/1405.0867},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.0867},
  eprinttype    = {arXiv},
  eprint       = {1405.0867},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kammueller14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/IvanovaPHK13,
  author       = {Marieta Georgieva Ivanova and
                  Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen and
                  Florian Kamm{\"{u}}ller},
  title        = {Externalizing Behaviour for Analysing System Models},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {52--62},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.052},
  doi          = {10.22667/JISIS.2013.11.31.052},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/IvanovaPHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KammullerP13,
  author       = {Florian Kamm{\"{u}}ller and
                  S{\"{o}}ren Preibusch},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Georgios V. Lioudakis and
                  Nora Cuppens{-}Boulahia and
                  Simon N. Foley and
                  William M. Fitzgerald},
  title        = {Privacy Analysis of a Hidden Friendship Protocol},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security - 8th
                  International Workshop, {DPM} 2013, and 6th International Workshop,
                  {SETOP} 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8247},
  pages        = {83--99},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-54568-9\_6},
  doi          = {10.1007/978-3-642-54568-9\_6},
  timestamp    = {Sun, 25 Oct 2020 22:34:56 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KammullerP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/AlghothamiK13,
  author       = {Alwaleed Alghothami and
                  Florian Kamm{\"{u}}ller},
  title        = {Network Information Flow Control: Proof of Concept},
  booktitle    = {{IEEE} International Conference on Systems, Man, and Cybernetics,
                  Manchester, {SMC} 2013, United Kingdom, October 13-16, 2013},
  pages        = {2957--2962},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SMC.2013.504},
  doi          = {10.1109/SMC.2013.504},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/AlghothamiK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/KammullerKC13,
  author       = {Florian Kamm{\"{u}}ller and
                  Yoney Kirsal Ever and
                  Xiaochun Cheng},
  title        = {DNSsec in Isabelle - Replay Attack and Origin Authentication},
  booktitle    = {{IEEE} International Conference on Systems, Man, and Cybernetics,
                  Manchester, {SMC} 2013, United Kingdom, October 13-16, 2013},
  pages        = {4772--4777},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SMC.2013.812},
  doi          = {10.1109/SMC.2013.812},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smc/KammullerKC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KammullerP13,
  author       = {Florian Kamm{\"{u}}ller and
                  Christian W. Probst},
  title        = {Invalidating Policies using Structural Information},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {76--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.36},
  doi          = {10.1109/SPW.2013.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KammullerP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/HenrioKL12,
  author       = {Ludovic Henrio and
                  Florian Kamm{\"{u}}ller and
                  Bianca Lutz},
  title        = {ASP\({}_{\mbox{fun}}\) : {A} typed functional active object calculus},
  journal      = {Sci. Comput. Program.},
  volume       = {77},
  number       = {7-8},
  pages        = {823--847},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.scico.2010.12.008},
  doi          = {10.1016/J.SCICO.2010.12.008},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/HenrioKL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Kammuller12,
  author       = {Florian Kamm{\"{u}}ller},
  editor       = {Roberto Di Pietro and
                  Javier Herranz and
                  Ernesto Damiani and
                  Radu State},
  title        = {A Semi-lattice Model for Multi-lateral Security},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security, 7th International
                  Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012,
                  Pisa, Italy, September 13-14, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7731},
  pages        = {118--132},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35890-6\_9},
  doi          = {10.1007/978-3-642-35890-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Kammuller12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/adntiic/2011,
  editor       = {Francisco V. Cipolla Ficarra and
                  Kim H. Veltman and
                  Domen Verber and
                  Miguel Cipolla{-}Ficarra and
                  Florian Kamm{\"{u}}ller},
  title        = {Advances in New Technologies, Interactive Interfaces and Communicability
                  - Second International Conference, {ADNTIIC} 2011, Huerta Grande,
                  Argentina, December 5-7, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7547},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34010-9},
  doi          = {10.1007/978-3-642-34010-9},
  isbn         = {978-3-642-34009-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/adntiic/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Kammuller11,
  author       = {Florian Kamm{\"{u}}ller},
  title        = {Mechanical Analysis of Finite Idempotent Relations},
  journal      = {Fundam. Informaticae},
  volume       = {107},
  number       = {1},
  pages        = {43--65},
  year         = {2011},
  url          = {https://doi.org/10.3233/FI-2011-392},
  doi          = {10.3233/FI-2011-392},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Kammuller11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgidis/Kammueller11,
  author       = {Florian Kammueller},
  editor       = {Francisco V. Cipolla Ficarra and
                  Kim H. Veltman and
                  Miguel Cipolla{-}Ficarra and
                  Andreas Kratky},
  title        = {A Security Model for Functional Active Objects},
  booktitle    = {Communicability, Computer Graphics and Innovative Design for Interactive
                  Systems - First International Symposium, {CCGIDIS} 2011, C{\'{o}}rdoba,
                  Spain, June 28-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7545},
  pages        = {42--50},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33760-4\_4},
  doi          = {10.1007/978-3-642-33760-4\_4},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/ccgidis/Kammueller11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/afp/HelkeK10,
  author       = {Steffen Helke and
                  Florian Kamm{\"{u}}ller},
  title        = {Formalizing Statecharts using Hierarchical Automata},
  journal      = {Arch. Formal Proofs},
  volume       = {2010},
  year         = {2010},
  url          = {https://www.isa-afp.org/entries/Statecharts.shtml},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/afp/HelkeK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/afp/HenrioKLS10,
  author       = {Ludovic Henrio and
                  Florian Kamm{\"{u}}ller and
                  Bianca Lutz and
                  Henry Sudhof},
  title        = {Locally Nameless Sigma Calculus},
  journal      = {Arch. Formal Proofs},
  volume       = {2010},
  year         = {2010},
  url          = {https://www.isa-afp.org/entries/Locally-Nameless-Sigma.shtml},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/afp/HenrioKLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Kammuller10,
  author       = {Florian Kamm{\"{u}}ller},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Ana R. Cavalli and
                  Jean Leneutre},
  title        = {Privacy Enforcement and Analysis for Functional Active Objects},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security - 5th
                  International Workshop, {DPM} 2010 and 3rd International Workshop,
                  {SETOP} 2010, Athens, Greece, September 23, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6514},
  pages        = {93--107},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19348-4\_8},
  doi          = {10.1007/978-3-642-19348-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Kammuller10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/KammullerRR10,
  author       = {Florian Kamm{\"{u}}ller and
                  Alexander Rein and
                  Mark{-}Oliver Reiser},
  editor       = {Julia Rubin and
                  Goetz Botterweck and
                  Mira Mezini and
                  Itay Maman and
                  Andreas Pleuss},
  title        = {Feature link propagation across variability representations with Isabelle/HOL},
  booktitle    = {Proceedings of the 2010 {ICSE} Workshop on Product Line Approaches
                  in Software Engineering, {PLEASE} 2010, Cape Town, South Africa, May
                  2, 2010},
  pages        = {48--53},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1808937.1808944},
  doi          = {10.1145/1808937.1808944},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/KammullerRR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmco/HenrioKK09,
  author       = {Ludovic Henrio and
                  Florian Kamm{\"{u}}ller and
                  Muhammad Uzair Khan},
  editor       = {Frank S. de Boer and
                  Marcello M. Bonsangue and
                  Stefan Hallerstede and
                  Michael Leuschel},
  title        = {A Framework for Reasoning on Component Composition},
  booktitle    = {Formal Methods for Components and Objects - 8th International Symposium,
                  {FMCO} 2009, Eindhoven, The Netherlands, November 4-6, 2009. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6286},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-17071-3\_1},
  doi          = {10.1007/978-3-642-17071-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fmco/HenrioKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/HenrioK09,
  author       = {Ludovic Henrio and
                  Florian Kamm{\"{u}}ller},
  editor       = {Gwen Sala{\"{u}}n and
                  Marjan Sirjani},
  title        = {Functional Active Objects: Typing and Formalisation},
  booktitle    = {Proceedings of the 8th International Workshop on the Foundations of
                  Coordination Languages and Software Architectures, {FOCLASA} 2009,
                  Rhodes, Greece, July 11, 2009},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {255},
  pages        = {83--101},
  publisher    = {Elsevier},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.entcs.2009.10.026},
  doi          = {10.1016/J.ENTCS.2009.10.026},
  timestamp    = {Tue, 06 Dec 2022 12:48:24 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/HenrioK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/Kammuller08,
  author       = {Florian Kamm{\"{u}}ller},
  title        = {Formalizing non-interference for a simple bytecode language in Coq},
  journal      = {Formal Aspects Comput.},
  volume       = {20},
  number       = {3},
  pages        = {259--275},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00165-007-0055-2},
  doi          = {10.1007/S00165-007-0055-2},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/Kammuller08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ife/KammullerP08,
  author       = {Florian Kamm{\"{u}}ller and
                  S{\"{o}}ren Preibusch},
  title        = {An industrial application of symbolic model checking},
  journal      = {Inform. Forsch. Entwickl.},
  volume       = {22},
  number       = {2},
  pages        = {95--108},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00450-007-0032-2},
  doi          = {10.1007/S00450-007-0032-2},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ife/KammullerP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmco/HenrioKR08,
  author       = {Ludovic Henrio and
                  Florian Kamm{\"{u}}ller and
                  Marcela Rivera},
  editor       = {Frank S. de Boer and
                  Marcello M. Bonsangue and
                  Eric Madelaine},
  title        = {An Asynchronous Distributed Component Model and Its Semantics},
  booktitle    = {Formal Methods for Components and Objects, 7th International Symposium,
                  {FMCO} 2008, Sophia Antipolis, France, October 21-23, 2008, Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {5751},
  pages        = {159--179},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04167-9\_9},
  doi          = {10.1007/978-3-642-04167-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fmco/HenrioKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jtb/KammullerS08,
  author       = {Florian Kamm{\"{u}}ller and
                  Henry Sudhof},
  editor       = {Bernd Mahr and
                  Huanye Sheng},
  title        = {Compositionality of Aspect Weaving},
  booktitle    = {Autonomous Systems - Self-Organization, Management, and Control, Proceedings
                  of the 8th International Workshop held at Shanghai Jiao Tong University,
                  Shanghai, China, October 6-7, 2008},
  pages        = {87--95},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-1-4020-8889-6\_10},
  doi          = {10.1007/978-1-4020-8889-6\_10},
  timestamp    = {Tue, 12 Jan 2021 12:26:52 +0100},
  biburl       = {https://dblp.org/rec/conf/jtb/KammullerS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soco/KammullerS08,
  author       = {Florian Kamm{\"{u}}ller and
                  Henry Sudhof},
  editor       = {Cesare Pautasso and
                  {\'{E}}ric Tanter},
  title        = {Composing Safely - {A} Type System for Aspects},
  booktitle    = {Software Composition - 7th International Symposium, SC@ETAPS 2008,
                  Budapest, Hungary, March 29-30, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4954},
  pages        = {231--247},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78789-1\_18},
  doi          = {10.1007/978-3-540-78789-1\_18},
  timestamp    = {Thu, 25 Jun 2020 18:19:16 +0200},
  biburl       = {https://dblp.org/rec/conf/soco/KammullerS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmics/PreibuschK07,
  author       = {S{\"{o}}ren Preibusch and
                  Florian Kamm{\"{u}}ller},
  editor       = {Stefan Leue and
                  Pedro Merino},
  title        = {Checking the {TWIN} Elevator System by Translating Object-Z to {SMV}},
  booktitle    = {Formal Methods for Industrial Critical Systems, 12th International
                  Workshop, {FMICS} 2007, Berlin, Germany, July 1-2, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4916},
  pages        = {38--55},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79707-4\_5},
  doi          = {10.1007/978-3-540-79707-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fmics/PreibuschK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmoods/HenrioK07,
  author       = {Ludovic Henrio and
                  Florian Kamm{\"{u}}ller},
  editor       = {Marcello M. Bonsangue and
                  Einar Broch Johnsen},
  title        = {A Mechanized Model of the Theory of Objects},
  booktitle    = {Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP}
                  {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus,
                  June 6-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4468},
  pages        = {190--205},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72952-5\_12},
  doi          = {10.1007/978-3-540-72952-5\_12},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/fmoods/HenrioK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/HelkeK05,
  author       = {Steffen Helke and
                  Florian Kamm{\"{u}}ller},
  editor       = {Farn Wang},
  title        = {Structure Preserving Data Abstractions for Statecharts},
  booktitle    = {Formal Techniques for Networked and Distributed Systems - {FORTE}
                  2005, 25th {IFIP} {WG} 6.1 International Conference, Taipei, Taiwan,
                  October 2-5, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3731},
  pages        = {305--319},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11562436\_23},
  doi          = {10.1007/11562436\_23},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/forte/HelkeK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictac/KammullerS04,
  author       = {Florian Kamm{\"{u}}ller and
                  Jeff W. Sanders},
  editor       = {Zhiming Liu and
                  Keijiro Araki},
  title        = {Idempotent Relations in Isabelle/HOL},
  booktitle    = {Theoretical Aspects of Computing - {ICTAC} 2004, First International
                  Colloquium, Guiyang, China, September 20-24, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3407},
  pages        = {310--324},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31862-0\_23},
  doi          = {10.1007/978-3-540-31862-0\_23},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ictac/KammullerS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sefm/KammullerS04,
  author       = {Florian Kamm{\"{u}}ller and
                  Jeff W. Sanders},
  title        = {Heuristics for Refinement Relations},
  booktitle    = {2nd International Conference on Software Engineering and Formal Methods
                  {(SEFM} 2004), 28-30 September 2004, Beijing, China},
  pages        = {292--299},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.ieeecomputersociety.org/10.1109/SEFM.2004.24},
  doi          = {10.1109/SEFM.2004.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sefm/KammullerS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/memocode/BittnerK03,
  author       = {Margot Bittner and
                  Florian Kamm{\"{u}}ller},
  title        = {Translating Fusion/UML to Object-Z},
  booktitle    = {1st {ACM} {\&} {IEEE} International Conference on Formal Methods
                  and Models for Co-Design {(MEMOCODE} 2003), 24-26 June 2003, Mont
                  Saint-Michel, France, Proceedings},
  pages        = {49--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/MEMCOD.2003.1210087},
  doi          = {10.1109/MEMCOD.2003.1210087},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/memocode/BittnerK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stvr/Kammuller02,
  author       = {Florian Kamm{\"{u}}ller},
  title        = {Book Reviews},
  journal      = {Softw. Test. Verification Reliab.},
  volume       = {12},
  number       = {3},
  pages        = {188--189},
  year         = {2002},
  url          = {https://doi.org/10.1002/stvr.250},
  doi          = {10.1002/STVR.250},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/stvr/Kammuller02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/zum/SmithKS02,
  author       = {Graeme Smith and
                  Florian Kamm{\"{u}}ller and
                  Thomas Santen},
  editor       = {Didier Bert and
                  Jonathan P. Bowen and
                  Martin C. Henson and
                  Ken Robinson},
  title        = {Encoding Object-Z in Isabelle/HOL},
  booktitle    = {{ZB} 2002: Formal Specification and Development in {Z} and B, 2nd
                  International Conference of {B} and {Z} Users, Grenoble, France, January
                  23-25, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2272},
  pages        = {82--99},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45648-1\_5},
  doi          = {10.1007/3-540-45648-1\_5},
  timestamp    = {Thu, 07 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/zum/SmithKS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/BurghardtKS01,
  author       = {Jochen Burghardt and
                  Florian Kamm{\"{u}}ller and
                  Jeff W. Sanders},
  title        = {On the antisymmetry of Galois embeddings},
  journal      = {Inf. Process. Lett.},
  volume       = {79},
  number       = {2},
  pages        = {57--63},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0020-0190(00)00176-9},
  doi          = {10.1016/S0020-0190(00)00176-9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/BurghardtKS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tphol/HelkeK01,
  author       = {Steffen Helke and
                  Florian Kamm{\"{u}}ller},
  editor       = {Richard J. Boulton and
                  Paul B. Jackson},
  title        = {Representing Hierarchical Automata in Interactive Theorem Provers},
  booktitle    = {Theorem Proving in Higher Order Logics, 14th International Conference,
                  TPHOLs 2001, Edinburgh, Scotland, UK, September 3-6, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2152},
  pages        = {233--248},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44755-5\_17},
  doi          = {10.1007/3-540-44755-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/tphol/HelkeK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/Kammuller00,
  author       = {Florian Kamm{\"{u}}ller},
  editor       = {David A. McAllester},
  title        = {Modular Reasoning in Isabelle},
  booktitle    = {Automated Deduction - CADE-17, 17th International Conference on Automated
                  Deduction, Pittsburgh, PA, USA, June 17-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1831},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10721959\_7},
  doi          = {10.1007/10721959\_7},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/Kammuller00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Kammuller99,
  author       = {Florian Kamm{\"{u}}ller},
  title        = {Modular reasoning in Isabelle},
  school       = {University of Cambridge, {UK}},
  year         = {1999},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.624446},
  timestamp    = {Mon, 22 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Kammuller99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/KammullerP99,
  author       = {Florian Kamm{\"{u}}ller and
                  Lawrence C. Paulson},
  title        = {A Formal Proof of Sylow's Theorem},
  journal      = {J. Autom. Reason.},
  volume       = {23},
  number       = {3-4},
  pages        = {235--264},
  year         = {1999},
  url          = {https://doi.org/10.1023/A:1006269330992},
  doi          = {10.1023/A:1006269330992},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/KammullerP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tphol/KammullerWP99,
  author       = {Florian Kamm{\"{u}}ller and
                  Markus Wenzel and
                  Lawrence C. Paulson},
  editor       = {Yves Bertot and
                  Gilles Dowek and
                  Andr{\'{e}} Hirschowitz and
                  Christine Paulin{-}Mohring and
                  Laurent Th{\'{e}}ry},
  title        = {Locales - {A} Sectioning Concept for Isabelle},
  booktitle    = {Theorem Proving in Higher Order Logics, 12th International Conference,
                  TPHOLs'99, Nice, France, September, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1690},
  pages        = {149--166},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48256-3\_11},
  doi          = {10.1007/3-540-48256-3\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/tphol/KammullerWP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/types/Kammuller98,
  author       = {Florian Kamm{\"{u}}ller},
  editor       = {Thorsten Altenkirch and
                  Wolfgang Naraschewski and
                  Bernhard Reus},
  title        = {Modular Structures as Dependent Types in Isabelle},
  booktitle    = {Types for Proofs and Programs, International Workshop {TYPES} '98,
                  Kloster Irsee, Germany, March 27-31, 1998, Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {1657},
  pages        = {121--132},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48167-2\_9},
  doi          = {10.1007/3-540-48167-2\_9},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/types/Kammuller98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/korso/SantenKJB95,
  author       = {Thomas Santen and
                  Florian Kamm{\"{u}}ller and
                  Stefan J{\"{a}}hnichen and
                  Martin Beyer},
  editor       = {Manfred Broy and
                  Stefan J{\"{a}}hnichen},
  title        = {Formalization of Algebraic Specification in the Development Language
                  {DEVA}},
  booktitle    = {{KORSO} - Methods, Languages, and Tools for the Construction of Correct
                  Software},
  series       = {Lecture Notes in Computer Science},
  volume       = {1009},
  pages        = {223--238},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0015464},
  doi          = {10.1007/BFB0015464},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/korso/SantenKJB95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics