Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Florian Kammüller
@article{DBLP:journals/information/KammullerS23, author = {Florian Kamm{\"{u}}ller and Dimpy Satija}, title = {Explanation of Student Attendance {AI} Prediction with the Isabelle Infrastructure Framework}, journal = {Inf.}, volume = {14}, number = {8}, pages = {453}, year = {2023}, url = {https://doi.org/10.3390/info14080453}, doi = {10.3390/INFO14080453}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/information/KammullerS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Kammuller23, author = {Florian Kamm{\"{u}}ller}, editor = {Sokratis K. Katsikas and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Rita Maria Ugarelli and Isabel Pra{\c{c}}a and Wenjuan Li and Weizhi Meng and Steven Furnell and Basel Katt and Sandeep Pirbhulal and Ankur Shukla and Michele Ianni and Mila Dalla Preda and Kim{-}Kwang Raymond Choo and Miguel Pupo Correia and Abhishta Abhishta and Giovanni Sileno and Mina Alishahi and Harsha K. Kalutarage and Naoto Yanai}, title = {Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle}, booktitle = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14399}, pages = {330--340}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54129-2\_19}, doi = {10.1007/978-3-031-54129-2\_19}, timestamp = {Mon, 25 Mar 2024 20:43:51 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Kammuller23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-17555, author = {Florian Kamm{\"{u}}ller}, title = {Higher Order Model Checking in Isabelle for Human Centric Infrastructure Security}, journal = {CoRR}, volume = {abs/2312.17555}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.17555}, doi = {10.48550/ARXIV.2312.17555}, eprinttype = {arXiv}, eprint = {2312.17555}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-17555.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ci/KarthickMKA22, author = {Gayathri Karthick and Glenford Mapp and Florian Kammueller and Mahdi Aiash}, title = {Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems}, journal = {Comput. Intell.}, volume = {38}, number = {3}, pages = {811--828}, year = {2022}, url = {https://doi.org/10.1111/coin.12421}, doi = {10.1111/COIN.12421}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ci/KarthickMKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Kammuller22, author = {Florian Kamm{\"{u}}ller}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nicola Dragoni}, title = {Explanation of Black Box {AI} for {GDPR} Related Privacy Using Isabelle}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2022 International Workshops, {DPM} 2022 and {CBT} 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13619}, pages = {69--84}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25734-6\_5}, doi = {10.1007/978-3-031-25734-6\_5}, timestamp = {Tue, 28 Feb 2023 08:10:09 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Kammuller22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/Kammuller22, author = {Florian Kamm{\"{u}}ller}, editor = {Jessie Y. C. Chen and Gino Fragomeni and Helmut Degen and Stavroula Ntoa}, title = {Explanation by Automated Reasoning Using the Isabelle Infrastructure Framework}, booktitle = {{HCI} International 2022 - Late Breaking Papers: Interacting with eXtended Reality and Artificial Intelligence - 24th International Conference on Human-Computer Interaction, {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13518}, pages = {307--318}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-21707-4\_22}, doi = {10.1007/978-3-031-21707-4\_22}, timestamp = {Thu, 01 Dec 2022 15:24:24 +0100}, biburl = {https://dblp.org/rec/conf/hci/Kammuller22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/KammullerA22, author = {Florian Kamm{\"{u}}ller and Chelsea Mira Alvarado}, editor = {Abbas Moallem}, title = {Exploring Rationality of Self Awareness in Social Networking for Logical Modeling of Unintentional Insiders}, booktitle = {{HCI} for Cybersecurity, Privacy and Trust - 4th International Conference, {HCI-CPT} 2022, Held as Part of the 24th {HCI} International Conference, {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13333}, pages = {340--357}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-05563-8\_22}, doi = {10.1007/978-3-031-05563-8\_22}, timestamp = {Tue, 21 Jun 2022 15:24:36 +0200}, biburl = {https://dblp.org/rec/conf/hci/KammullerA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/KammullerK21, author = {Florian Kamm{\"{u}}ller and Manfred Kerber}, title = {Applying the Isabelle Insider framework to airplane security}, journal = {Sci. Comput. Program.}, volume = {206}, pages = {102623}, year = {2021}, url = {https://doi.org/10.1016/j.scico.2021.102623}, doi = {10.1016/J.SCICO.2021.102623}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scp/KammullerK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/KammullerLS21, author = {Florian Kamm{\"{u}}ller and Axel Legay and Stefano Schivo}, title = {Masterminding change by combining secure system design with security risk assessment}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {23}, number = {1}, pages = {69--70}, year = {2021}, url = {https://doi.org/10.1007/s10009-020-00595-8}, doi = {10.1007/S10009-020-00595-8}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/KammullerLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-15425, author = {Florian Kamm{\"{u}}ller and Chelsea Mira Alvarado}, title = {Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders}, journal = {CoRR}, volume = {abs/2111.15425}, year = {2021}, url = {https://arxiv.org/abs/2111.15425}, eprinttype = {arXiv}, eprint = {2111.15425}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-15425.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-04374, author = {Florian Kamm{\"{u}}ller}, title = {Dependability Engineering in Isabelle}, journal = {CoRR}, volume = {abs/2112.04374}, year = {2021}, url = {https://arxiv.org/abs/2112.04374}, eprinttype = {arXiv}, eprint = {2112.04374}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-04374.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-14809, author = {Florian Kamm{\"{u}}ller}, title = {Explanation by Automated Reasoning Using the Isabelle Infrastructure Framework}, journal = {CoRR}, volume = {abs/2112.14809}, year = {2021}, url = {https://arxiv.org/abs/2112.14809}, eprinttype = {arXiv}, eprint = {2112.14809}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-14809.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/afp/Kammueller20, author = {Florian Kammueller}, title = {Attack Trees in Isabelle for {GDPR} compliance of IoT healthcare systems}, journal = {Arch. Formal Proofs}, volume = {2020}, year = {2020}, url = {https://www.isa-afp.org/entries/Attack\_Trees.html}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/Kammueller20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/KammullerN20, author = {Florian Kamm{\"{u}}ller and Uwe Nestmann}, editor = {Bruno Bernardo and Diego Marmsoler}, title = {Inter-Blockchain Protocols with the Isabelle Infrastructure Framework}, booktitle = {2nd Workshop on Formal Methods for Blockchains, FMBC@CAV 2020, July 20-21, 2020, Los Angeles, California, {USA} (Virtual Conference)}, series = {OASIcs}, volume = {84}, pages = {11:1--11:12}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/OASIcs.FMBC.2020.11}, doi = {10.4230/OASICS.FMBC.2020.11}, timestamp = {Mon, 21 Dec 2020 13:23:22 +0100}, biburl = {https://dblp.org/rec/conf/cav/KammullerN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KammullerL20, author = {Florian Kamm{\"{u}}ller and Bianca Lutz}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Jordi Herrera{-}Joancomart{\'{\i}}}, title = {Modeling and Analyzing the Corona-Virus Warning App with the Isabelle Infrastructure Framework}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2020 International Workshops, {DPM} 2020 and {CBT} 2020, Guildford, UK, September 17-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12484}, pages = {128--144}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66172-4\_8}, doi = {10.1007/978-3-030-66172-4\_8}, timestamp = {Tue, 12 Jan 2021 14:44:40 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KammullerL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/BornatBKPN20, author = {Richard Bornat and Jaap Boender and Florian Kammueller and Guillaume Poly and Rajagopal Nagarajan}, editor = {Armin Biere and David Parker}, title = {Describing and Simulating Concurrent Quantum Systems}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 26th International Conference, {TACAS} 2020, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2020, Dublin, Ireland, April 25-30, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12079}, pages = {271--277}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45237-7\_16}, doi = {10.1007/978-3-030-45237-7\_16}, timestamp = {Fri, 14 May 2021 08:34:19 +0200}, biburl = {https://dblp.org/rec/conf/tacas/BornatBKPN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-08983, author = {Florian Kamm{\"{u}}ller}, title = {A Formal Development Cycle for Security Engineering in Isabelle}, journal = {CoRR}, volume = {abs/2001.08983}, year = {2020}, url = {https://arxiv.org/abs/2001.08983}, eprinttype = {arXiv}, eprint = {2001.08983}, timestamp = {Thu, 30 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-08983.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-11838, author = {Florian Kamm{\"{u}}ller and Manfred Kerber}, title = {Applying the Isabelle Insider Framework to Airplane Security}, journal = {CoRR}, volume = {abs/2003.11838}, year = {2020}, url = {https://arxiv.org/abs/2003.11838}, eprinttype = {arXiv}, eprint = {2003.11838}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-11838.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kammuller19, author = {Florian Kamm{\"{u}}ller}, title = {Attack trees in Isabelle extended with probabilities for quantum cryptography}, journal = {Comput. Secur.}, volume = {87}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.101572}, doi = {10.1016/J.COSE.2019.101572}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kammuller19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/Kammuller19, author = {Florian Kamm{\"{u}}ller}, title = {Combining Secure System Design with Risk Assessment for IoT Healthcare Systems}, booktitle = {{IEEE} International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2019, Kyoto, Japan, March 11-15, 2019}, pages = {961--966}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PERCOMW.2019.8730776}, doi = {10.1109/PERCOMW.2019.8730776}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/percom/Kammuller19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-02426, author = {Florian Kamm{\"{u}}ller and Oladapo O. Ogunyanwo and Christian W. Probst}, title = {Designing Data Protection for {GDPR} Compliance into IoT Healthcare Systems}, journal = {CoRR}, volume = {abs/1901.02426}, year = {2019}, url = {http://arxiv.org/abs/1901.02426}, eprinttype = {arXiv}, eprint = {1901.02426}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-02426.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-00325, author = {Florian Kamm{\"{u}}ller}, title = {{QKD} in Isabelle - Bayesian Calculation}, journal = {CoRR}, volume = {abs/1905.00325}, year = {2019}, url = {http://arxiv.org/abs/1905.00325}, eprinttype = {arXiv}, eprint = {1905.00325}, timestamp = {Mon, 27 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-00325.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Kammuller18, author = {Florian Kamm{\"{u}}ller}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {Attack Trees in Isabelle}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {611--628}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_36}, doi = {10.1007/978-3-030-01950-1\_36}, timestamp = {Sat, 05 Sep 2020 18:01:07 +0200}, biburl = {https://dblp.org/rec/conf/icics/Kammuller18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/Kammueller18, author = {Florian Kammueller}, title = {Formal Modeling and Analysis of Data Protection for {GDPR} Compliance of IoT Healthcare Systems}, booktitle = {{IEEE} International Conference on Systems, Man, and Cybernetics, {SMC} 2018, Miyazaki, Japan, October 7-10, 2018}, pages = {3319--3324}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SMC.2018.00562}, doi = {10.1109/SMC.2018.00562}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/Kammueller18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucc/KarthickMKA18, author = {Gayathri Karthick and Glenford Mapp and Florian Kammueller and Mahdi Aiash}, editor = {Alan Sill and Josef Spillner}, title = {Formalization and Analysis of a Resource Allocation Security Protocol for Secure Service Migration}, booktitle = {2018 {IEEE/ACM} International Conference on Utility and Cloud Computing Companion, {UCC} Companion 2018, Zurich, Switzerland, December 17-20, 2018}, pages = {207--212}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/UCC-Companion.2018.00058}, doi = {10.1109/UCC-COMPANION.2018.00058}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ucc/KarthickMKA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-06494, author = {Florian Kamm{\"{u}}ller}, title = {Attack Trees in Isabelle - {CTL} semantics, correctness and completeness}, journal = {CoRR}, volume = {abs/1803.06494}, year = {2018}, url = {http://arxiv.org/abs/1803.06494}, eprinttype = {arXiv}, eprint = {1803.06494}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-06494.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KammullerKP17, author = {Florian Kamm{\"{u}}ller and Manfred Kerber and Christian W. Probst}, title = {Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {1}, pages = {44--78}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.03.31.044}, doi = {10.22667/JOWUA.2017.03.31.044}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KammullerKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/KammullerP17, author = {Florian Kamm{\"{u}}ller and Christian W. Probst}, title = {Modeling and Verification of Insider Threats Using Logical Analysis}, journal = {{IEEE} Syst. J.}, volume = {11}, number = {2}, pages = {534--545}, year = {2017}, url = {https://doi.org/10.1109/JSYST.2015.2453215}, doi = {10.1109/JSYST.2015.2453215}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/KammullerP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ahfe/Kammuller17, author = {Florian Kamm{\"{u}}ller}, editor = {Denise Nicholson}, title = {Human Centric Security and Privacy for the IoT Using Formal Techniques}, booktitle = {Advances in Human Factors in Cybersecurity - Proceedings of the {AHFE} 2017 International Conference on Human Factors in Cybersecurity, July 17-21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, {USA}}, series = {Advances in Intelligent Systems and Computing}, volume = {593}, pages = {106--116}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60585-2\_12}, doi = {10.1007/978-3-319-60585-2\_12}, timestamp = {Tue, 05 Oct 2021 13:49:08 +0200}, biburl = {https://dblp.org/rec/conf/ahfe/Kammuller17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Kammuller17, author = {Florian Kamm{\"{u}}ller}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Hannes Hartenstein and Jordi Herrera{-}Joancomart{\'{\i}}}, title = {A Proof Calculus for Attack Trees in Isabelle}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2017 International Workshops, {DPM} 2017 and {CBT} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10436}, pages = {3--18}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67816-0\_1}, doi = {10.1007/978-3-319-67816-0\_1}, timestamp = {Fri, 27 Dec 2019 21:19:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Kammuller17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/Kammuller17, author = {Florian Kamm{\"{u}}ller}, editor = {Theo Tryfonas}, title = {Formal Modeling and Analysis with Humans in Infrastructures for IoT Health Care Systems}, booktitle = {Human Aspects of Information Security, Privacy and Trust - 5th International Conference, {HAS} 2017, Held as Part of {HCI} International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10292}, pages = {339--352}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58460-7\_24}, doi = {10.1007/978-3-319-58460-7\_24}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/hci/Kammuller17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sera/KammullerAJ17, author = {Florian Kamm{\"{u}}ller and Juan Carlos Augusto and Simon Jones}, editor = {Liz Bacon and Jixin Ma and Lachlan M. MacKinnon}, title = {Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle}, booktitle = {15th {IEEE} International Conference on Software Engineering Research, Management and Applications, {SERA} 2017, London, United Kingdom, June 7-9, 2017}, pages = {401--406}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SERA.2017.7965758}, doi = {10.1109/SERA.2017.7965758}, timestamp = {Mon, 12 Oct 2020 16:45:55 +0200}, biburl = {https://dblp.org/rec/conf/sera/KammullerAJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ProbstKH16, author = {Christian W. Probst and Florian Kamm{\"{u}}ller and Ren{\'{e}} Rydhof Hansen}, editor = {Christian W. Probst and Chris Hankin and Ren{\'{e}} Rydhof Hansen}, title = {Formal Modelling and Analysis of Socio-Technical Systems}, booktitle = {Semantics, Logics, and Calculi - Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays}, series = {Lecture Notes in Computer Science}, volume = {9560}, pages = {54--73}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-27810-0\_3}, doi = {10.1007/978-3-319-27810-0\_3}, timestamp = {Tue, 21 Mar 2023 20:58:42 +0100}, biburl = {https://dblp.org/rec/conf/birthday/ProbstKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KammuellerKP16, author = {Florian Kammueller and Manfred Kerber and Christian W. Probst}, editor = {Ilsun You and Elisa Bertino}, title = {Towards Formal Analysis of Insider Threats for Auctions}, booktitle = {Proceedings of the 8th {ACM} {CCS} International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {23--34}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2995963}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KammuellerKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/Chen0KNP16, author = {Taolue Chen and Tingting Han and Florian Kammueller and Ibrahim Nemli and Christian W. Probst}, title = {Model based analysis of insider threats}, booktitle = {2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016}, pages = {1--3}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSecPODS.2016.7502350}, doi = {10.1109/CYBERSECPODS.2016.7502350}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/Chen0KNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Kammuller16, author = {Florian Kamm{\"{u}}ller}, editor = {Giovanni Livraga and Vicen{\c{c}} Torra and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Isabelle Modelchecking for Insider Threats}, booktitle = {Data Privacy Management and Security Assurance - 11th International Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9963}, pages = {196--210}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47072-6\_13}, doi = {10.1007/978-3-319-47072-6\_13}, timestamp = {Sat, 30 Sep 2023 09:40:25 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Kammuller16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Kammuller16a, author = {Florian Kamm{\"{u}}ller}, editor = {Giovanni Livraga and Vicen{\c{c}} Torra and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Refactoring Preserves Security}, booktitle = {Data Privacy Management and Security Assurance - 11th International Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9963}, pages = {238--245}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47072-6\_17}, doi = {10.1007/978-3-319-47072-6\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Kammuller16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/KammullerNP16, author = {Florian Kamm{\"{u}}ller and Jason R. C. Nurse and Christian W. Probst}, editor = {Theo Tryfonas}, title = {Attack Tree Analysis for Insider Threats on the IoT Using Isabelle}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - 4th International Conference, {HAS} 2016, Held as Part of {HCI} International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9750}, pages = {234--246}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39381-0\_21}, doi = {10.1007/978-3-319-39381-0\_21}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/hci/KammullerNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KammullerK16, author = {Florian Kamm{\"{u}}ller and Manfred Kerber}, title = {Investigating Airplane Safety and Security Against Insider Threats Using Logical Modeling}, booktitle = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {304--313}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SPW.2016.47}, doi = {10.1109/SPW.2016.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KammullerK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/IvanovaPHK15, author = {Marieta Georgieva Ivanova and Christian W. Probst and Ren{\'{e}} Rydhof Hansen and Florian Kamm{\"{u}}ller}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {Transforming Graphical System Models to Graphical Attack Models}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {82--96}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_6}, doi = {10.1007/978-3-319-29968-6\_6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/IvanovaPHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HelkeKP15, author = {Steffen Helke and Florian Kamm{\"{u}}ller and Christian W. Probst}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Secure Refactoring with Java Information Flow}, booktitle = {Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9481}, pages = {264--272}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29883-2\_19}, doi = {10.1007/978-3-319-29883-2\_19}, timestamp = {Sun, 25 Oct 2020 22:34:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/HelkeKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/ChenKNP15, author = {Taolue Chen and Florian Kamm{\"{u}}ller and Ibrahim Nemli and Christian W. Probst}, editor = {Theo Tryfonas and Ioannis G. Askoxylakis}, title = {A Probabilistic Analysis Framework for Malicious Insider Threats}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - Third International Conference, {HAS} 2015, Held as Part of {HCI} International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9190}, pages = {178--189}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20376-8\_16}, doi = {10.1007/978-3-319-20376-8\_16}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/hci/ChenKNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/IvanovaPHK15, author = {Marieta Georgieva Ivanova and Christian W. Probst and Ren{\'{e}} Rydhof Hansen and Florian Kamm{\"{u}}ller}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Attack Tree Generation by Policy Invalidation}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {249--259}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_16}, doi = {10.1007/978-3-319-24018-3\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/IvanovaPHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/BoenderKN15, author = {Jaap Boender and Florian Kamm{\"{u}}ller and Rajagopal Nagarajan}, editor = {Chris Heunen and Peter Selinger and Jamie Vicary}, title = {Formalization of Quantum Protocols using Coq}, booktitle = {Proceedings 12th International Workshop on Quantum Physics and Logic, {QPL} 2015, Oxford, UK, July 15-17, 2015}, series = {{EPTCS}}, volume = {195}, pages = {71--83}, year = {2015}, url = {https://doi.org/10.4204/EPTCS.195.6}, doi = {10.4204/EPTCS.195.6}, timestamp = {Wed, 14 Nov 2018 10:31:26 +0100}, biburl = {https://dblp.org/rec/journals/corr/BoenderKN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KammullerP14, author = {Florian Kamm{\"{u}}ller and Christian W. Probst}, title = {Invalidating Policies using Structural Information}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {2}, pages = {59--79}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.06.31.059}, doi = {10.22667/JOWUA.2014.06.31.059}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KammullerP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict/Kammuller14, author = {Florian Kamm{\"{u}}ller}, title = {Verification of DNSsec Delegation Signatures}, booktitle = {21st International Conference on Telecommunications, {ICT} 2014, Lisbon, Portugal, 4-7 May, 2014}, pages = {298--392}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICT.2014.6845127}, doi = {10.1109/ICT.2014.6845127}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ict/Kammuller14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KammullerP14, author = {Florian Kamm{\"{u}}ller and Christian W. Probst}, title = {Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis}, booktitle = {35. {IEEE} Security and Privacy Workshops, {SPW} 2014, San Jose, CA, USA, May 17-18, 2014}, pages = {229--235}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SPW.2014.45}, doi = {10.1109/SPW.2014.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KammullerP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/BoenderIKP14, author = {Jaap Boender and Marieta Georgieva Ivanova and Florian Kamm{\"{u}}ller and Giuseppe Primiero}, editor = {Giampaolo Bella and Gabriele Lenzini}, title = {Modeling Human Behaviour with Higher Order Logic: Insider Threats}, booktitle = {2014 Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2014, Vienna, Austria, July 18, 2014}, pages = {31--39}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/STAST.2014.13}, doi = {10.1109/STAST.2014.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stast/BoenderIKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kammueller14, author = {Florian Kammueller}, title = {Confinement for Active Objects}, journal = {CoRR}, volume = {abs/1405.0867}, year = {2014}, url = {http://arxiv.org/abs/1405.0867}, eprinttype = {arXiv}, eprint = {1405.0867}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kammueller14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/IvanovaPHK13, author = {Marieta Georgieva Ivanova and Christian W. Probst and Ren{\'{e}} Rydhof Hansen and Florian Kamm{\"{u}}ller}, title = {Externalizing Behaviour for Analysing System Models}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {52--62}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.052}, doi = {10.22667/JISIS.2013.11.31.052}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/IvanovaPHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KammullerP13, author = {Florian Kamm{\"{u}}ller and S{\"{o}}ren Preibusch}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Georgios V. Lioudakis and Nora Cuppens{-}Boulahia and Simon N. Foley and William M. Fitzgerald}, title = {Privacy Analysis of a Hidden Friendship Protocol}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, {DPM} 2013, and 6th International Workshop, {SETOP} 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8247}, pages = {83--99}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-54568-9\_6}, doi = {10.1007/978-3-642-54568-9\_6}, timestamp = {Sun, 25 Oct 2020 22:34:56 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KammullerP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/AlghothamiK13, author = {Alwaleed Alghothami and Florian Kamm{\"{u}}ller}, title = {Network Information Flow Control: Proof of Concept}, booktitle = {{IEEE} International Conference on Systems, Man, and Cybernetics, Manchester, {SMC} 2013, United Kingdom, October 13-16, 2013}, pages = {2957--2962}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SMC.2013.504}, doi = {10.1109/SMC.2013.504}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/AlghothamiK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/KammullerKC13, author = {Florian Kamm{\"{u}}ller and Yoney Kirsal Ever and Xiaochun Cheng}, title = {DNSsec in Isabelle - Replay Attack and Origin Authentication}, booktitle = {{IEEE} International Conference on Systems, Man, and Cybernetics, Manchester, {SMC} 2013, United Kingdom, October 13-16, 2013}, pages = {4772--4777}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SMC.2013.812}, doi = {10.1109/SMC.2013.812}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smc/KammullerKC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KammullerP13, author = {Florian Kamm{\"{u}}ller and Christian W. Probst}, title = {Invalidating Policies using Structural Information}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {76--81}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.36}, doi = {10.1109/SPW.2013.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KammullerP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/HenrioKL12, author = {Ludovic Henrio and Florian Kamm{\"{u}}ller and Bianca Lutz}, title = {ASP\({}_{\mbox{fun}}\) : {A} typed functional active object calculus}, journal = {Sci. Comput. Program.}, volume = {77}, number = {7-8}, pages = {823--847}, year = {2012}, url = {https://doi.org/10.1016/j.scico.2010.12.008}, doi = {10.1016/J.SCICO.2010.12.008}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/HenrioKL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Kammuller12, author = {Florian Kamm{\"{u}}ller}, editor = {Roberto Di Pietro and Javier Herranz and Ernesto Damiani and Radu State}, title = {A Semi-lattice Model for Multi-lateral Security}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security, 7th International Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7731}, pages = {118--132}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35890-6\_9}, doi = {10.1007/978-3-642-35890-6\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Kammuller12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/adntiic/2011, editor = {Francisco V. Cipolla Ficarra and Kim H. Veltman and Domen Verber and Miguel Cipolla{-}Ficarra and Florian Kamm{\"{u}}ller}, title = {Advances in New Technologies, Interactive Interfaces and Communicability - Second International Conference, {ADNTIIC} 2011, Huerta Grande, Argentina, December 5-7, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7547}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34010-9}, doi = {10.1007/978-3-642-34010-9}, isbn = {978-3-642-34009-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/adntiic/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Kammuller11, author = {Florian Kamm{\"{u}}ller}, title = {Mechanical Analysis of Finite Idempotent Relations}, journal = {Fundam. Informaticae}, volume = {107}, number = {1}, pages = {43--65}, year = {2011}, url = {https://doi.org/10.3233/FI-2011-392}, doi = {10.3233/FI-2011-392}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Kammuller11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgidis/Kammueller11, author = {Florian Kammueller}, editor = {Francisco V. Cipolla Ficarra and Kim H. Veltman and Miguel Cipolla{-}Ficarra and Andreas Kratky}, title = {A Security Model for Functional Active Objects}, booktitle = {Communicability, Computer Graphics and Innovative Design for Interactive Systems - First International Symposium, {CCGIDIS} 2011, C{\'{o}}rdoba, Spain, June 28-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7545}, pages = {42--50}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33760-4\_4}, doi = {10.1007/978-3-642-33760-4\_4}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/ccgidis/Kammueller11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/afp/HelkeK10, author = {Steffen Helke and Florian Kamm{\"{u}}ller}, title = {Formalizing Statecharts using Hierarchical Automata}, journal = {Arch. Formal Proofs}, volume = {2010}, year = {2010}, url = {https://www.isa-afp.org/entries/Statecharts.shtml}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/HelkeK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/afp/HenrioKLS10, author = {Ludovic Henrio and Florian Kamm{\"{u}}ller and Bianca Lutz and Henry Sudhof}, title = {Locally Nameless Sigma Calculus}, journal = {Arch. Formal Proofs}, volume = {2010}, year = {2010}, url = {https://www.isa-afp.org/entries/Locally-Nameless-Sigma.shtml}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/HenrioKLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Kammuller10, author = {Florian Kamm{\"{u}}ller}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Ana R. Cavalli and Jean Leneutre}, title = {Privacy Enforcement and Analysis for Functional Active Objects}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, {DPM} 2010 and 3rd International Workshop, {SETOP} 2010, Athens, Greece, September 23, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6514}, pages = {93--107}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19348-4\_8}, doi = {10.1007/978-3-642-19348-4\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Kammuller10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/KammullerRR10, author = {Florian Kamm{\"{u}}ller and Alexander Rein and Mark{-}Oliver Reiser}, editor = {Julia Rubin and Goetz Botterweck and Mira Mezini and Itay Maman and Andreas Pleuss}, title = {Feature link propagation across variability representations with Isabelle/HOL}, booktitle = {Proceedings of the 2010 {ICSE} Workshop on Product Line Approaches in Software Engineering, {PLEASE} 2010, Cape Town, South Africa, May 2, 2010}, pages = {48--53}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1808937.1808944}, doi = {10.1145/1808937.1808944}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/KammullerRR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmco/HenrioKK09, author = {Ludovic Henrio and Florian Kamm{\"{u}}ller and Muhammad Uzair Khan}, editor = {Frank S. de Boer and Marcello M. Bonsangue and Stefan Hallerstede and Michael Leuschel}, title = {A Framework for Reasoning on Component Composition}, booktitle = {Formal Methods for Components and Objects - 8th International Symposium, {FMCO} 2009, Eindhoven, The Netherlands, November 4-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6286}, pages = {1--20}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-17071-3\_1}, doi = {10.1007/978-3-642-17071-3\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/fmco/HenrioKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/HenrioK09, author = {Ludovic Henrio and Florian Kamm{\"{u}}ller}, editor = {Gwen Sala{\"{u}}n and Marjan Sirjani}, title = {Functional Active Objects: Typing and Formalisation}, booktitle = {Proceedings of the 8th International Workshop on the Foundations of Coordination Languages and Software Architectures, {FOCLASA} 2009, Rhodes, Greece, July 11, 2009}, series = {Electronic Notes in Theoretical Computer Science}, volume = {255}, pages = {83--101}, publisher = {Elsevier}, year = {2009}, url = {https://doi.org/10.1016/j.entcs.2009.10.026}, doi = {10.1016/J.ENTCS.2009.10.026}, timestamp = {Tue, 06 Dec 2022 12:48:24 +0100}, biburl = {https://dblp.org/rec/journals/entcs/HenrioK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/Kammuller08, author = {Florian Kamm{\"{u}}ller}, title = {Formalizing non-interference for a simple bytecode language in Coq}, journal = {Formal Aspects Comput.}, volume = {20}, number = {3}, pages = {259--275}, year = {2008}, url = {https://doi.org/10.1007/s00165-007-0055-2}, doi = {10.1007/S00165-007-0055-2}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/Kammuller08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ife/KammullerP08, author = {Florian Kamm{\"{u}}ller and S{\"{o}}ren Preibusch}, title = {An industrial application of symbolic model checking}, journal = {Inform. Forsch. Entwickl.}, volume = {22}, number = {2}, pages = {95--108}, year = {2008}, url = {https://doi.org/10.1007/s00450-007-0032-2}, doi = {10.1007/S00450-007-0032-2}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ife/KammullerP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmco/HenrioKR08, author = {Ludovic Henrio and Florian Kamm{\"{u}}ller and Marcela Rivera}, editor = {Frank S. de Boer and Marcello M. Bonsangue and Eric Madelaine}, title = {An Asynchronous Distributed Component Model and Its Semantics}, booktitle = {Formal Methods for Components and Objects, 7th International Symposium, {FMCO} 2008, Sophia Antipolis, France, October 21-23, 2008, Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {5751}, pages = {159--179}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04167-9\_9}, doi = {10.1007/978-3-642-04167-9\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/fmco/HenrioKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jtb/KammullerS08, author = {Florian Kamm{\"{u}}ller and Henry Sudhof}, editor = {Bernd Mahr and Huanye Sheng}, title = {Compositionality of Aspect Weaving}, booktitle = {Autonomous Systems - Self-Organization, Management, and Control, Proceedings of the 8th International Workshop held at Shanghai Jiao Tong University, Shanghai, China, October 6-7, 2008}, pages = {87--95}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-1-4020-8889-6\_10}, doi = {10.1007/978-1-4020-8889-6\_10}, timestamp = {Tue, 12 Jan 2021 12:26:52 +0100}, biburl = {https://dblp.org/rec/conf/jtb/KammullerS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soco/KammullerS08, author = {Florian Kamm{\"{u}}ller and Henry Sudhof}, editor = {Cesare Pautasso and {\'{E}}ric Tanter}, title = {Composing Safely - {A} Type System for Aspects}, booktitle = {Software Composition - 7th International Symposium, SC@ETAPS 2008, Budapest, Hungary, March 29-30, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4954}, pages = {231--247}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78789-1\_18}, doi = {10.1007/978-3-540-78789-1\_18}, timestamp = {Thu, 25 Jun 2020 18:19:16 +0200}, biburl = {https://dblp.org/rec/conf/soco/KammullerS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmics/PreibuschK07, author = {S{\"{o}}ren Preibusch and Florian Kamm{\"{u}}ller}, editor = {Stefan Leue and Pedro Merino}, title = {Checking the {TWIN} Elevator System by Translating Object-Z to {SMV}}, booktitle = {Formal Methods for Industrial Critical Systems, 12th International Workshop, {FMICS} 2007, Berlin, Germany, July 1-2, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4916}, pages = {38--55}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79707-4\_5}, doi = {10.1007/978-3-540-79707-4\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fmics/PreibuschK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmoods/HenrioK07, author = {Ludovic Henrio and Florian Kamm{\"{u}}ller}, editor = {Marcello M. Bonsangue and Einar Broch Johnsen}, title = {A Mechanized Model of the Theory of Objects}, booktitle = {Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4468}, pages = {190--205}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72952-5\_12}, doi = {10.1007/978-3-540-72952-5\_12}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/fmoods/HenrioK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/HelkeK05, author = {Steffen Helke and Florian Kamm{\"{u}}ller}, editor = {Farn Wang}, title = {Structure Preserving Data Abstractions for Statecharts}, booktitle = {Formal Techniques for Networked and Distributed Systems - {FORTE} 2005, 25th {IFIP} {WG} 6.1 International Conference, Taipei, Taiwan, October 2-5, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3731}, pages = {305--319}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11562436\_23}, doi = {10.1007/11562436\_23}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/forte/HelkeK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictac/KammullerS04, author = {Florian Kamm{\"{u}}ller and Jeff W. Sanders}, editor = {Zhiming Liu and Keijiro Araki}, title = {Idempotent Relations in Isabelle/HOL}, booktitle = {Theoretical Aspects of Computing - {ICTAC} 2004, First International Colloquium, Guiyang, China, September 20-24, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3407}, pages = {310--324}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31862-0\_23}, doi = {10.1007/978-3-540-31862-0\_23}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/ictac/KammullerS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sefm/KammullerS04, author = {Florian Kamm{\"{u}}ller and Jeff W. Sanders}, title = {Heuristics for Refinement Relations}, booktitle = {2nd International Conference on Software Engineering and Formal Methods {(SEFM} 2004), 28-30 September 2004, Beijing, China}, pages = {292--299}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.ieeecomputersociety.org/10.1109/SEFM.2004.24}, doi = {10.1109/SEFM.2004.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sefm/KammullerS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/memocode/BittnerK03, author = {Margot Bittner and Florian Kamm{\"{u}}ller}, title = {Translating Fusion/UML to Object-Z}, booktitle = {1st {ACM} {\&} {IEEE} International Conference on Formal Methods and Models for Co-Design {(MEMOCODE} 2003), 24-26 June 2003, Mont Saint-Michel, France, Proceedings}, pages = {49--50}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/MEMCOD.2003.1210087}, doi = {10.1109/MEMCOD.2003.1210087}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/memocode/BittnerK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/stvr/Kammuller02, author = {Florian Kamm{\"{u}}ller}, title = {Book Reviews}, journal = {Softw. Test. Verification Reliab.}, volume = {12}, number = {3}, pages = {188--189}, year = {2002}, url = {https://doi.org/10.1002/stvr.250}, doi = {10.1002/STVR.250}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/stvr/Kammuller02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/zum/SmithKS02, author = {Graeme Smith and Florian Kamm{\"{u}}ller and Thomas Santen}, editor = {Didier Bert and Jonathan P. Bowen and Martin C. Henson and Ken Robinson}, title = {Encoding Object-Z in Isabelle/HOL}, booktitle = {{ZB} 2002: Formal Specification and Development in {Z} and B, 2nd International Conference of {B} and {Z} Users, Grenoble, France, January 23-25, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2272}, pages = {82--99}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45648-1\_5}, doi = {10.1007/3-540-45648-1\_5}, timestamp = {Thu, 07 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/zum/SmithKS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BurghardtKS01, author = {Jochen Burghardt and Florian Kamm{\"{u}}ller and Jeff W. Sanders}, title = {On the antisymmetry of Galois embeddings}, journal = {Inf. Process. Lett.}, volume = {79}, number = {2}, pages = {57--63}, year = {2001}, url = {https://doi.org/10.1016/S0020-0190(00)00176-9}, doi = {10.1016/S0020-0190(00)00176-9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BurghardtKS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tphol/HelkeK01, author = {Steffen Helke and Florian Kamm{\"{u}}ller}, editor = {Richard J. Boulton and Paul B. Jackson}, title = {Representing Hierarchical Automata in Interactive Theorem Provers}, booktitle = {Theorem Proving in Higher Order Logics, 14th International Conference, TPHOLs 2001, Edinburgh, Scotland, UK, September 3-6, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2152}, pages = {233--248}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44755-5\_17}, doi = {10.1007/3-540-44755-5\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/tphol/HelkeK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/Kammuller00, author = {Florian Kamm{\"{u}}ller}, editor = {David A. McAllester}, title = {Modular Reasoning in Isabelle}, booktitle = {Automated Deduction - CADE-17, 17th International Conference on Automated Deduction, Pittsburgh, PA, USA, June 17-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1831}, pages = {99--114}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10721959\_7}, doi = {10.1007/10721959\_7}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/Kammuller00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Kammuller99, author = {Florian Kamm{\"{u}}ller}, title = {Modular reasoning in Isabelle}, school = {University of Cambridge, {UK}}, year = {1999}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.624446}, timestamp = {Mon, 22 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Kammuller99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/KammullerP99, author = {Florian Kamm{\"{u}}ller and Lawrence C. Paulson}, title = {A Formal Proof of Sylow's Theorem}, journal = {J. Autom. Reason.}, volume = {23}, number = {3-4}, pages = {235--264}, year = {1999}, url = {https://doi.org/10.1023/A:1006269330992}, doi = {10.1023/A:1006269330992}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/KammullerP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tphol/KammullerWP99, author = {Florian Kamm{\"{u}}ller and Markus Wenzel and Lawrence C. Paulson}, editor = {Yves Bertot and Gilles Dowek and Andr{\'{e}} Hirschowitz and Christine Paulin{-}Mohring and Laurent Th{\'{e}}ry}, title = {Locales - {A} Sectioning Concept for Isabelle}, booktitle = {Theorem Proving in Higher Order Logics, 12th International Conference, TPHOLs'99, Nice, France, September, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1690}, pages = {149--166}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48256-3\_11}, doi = {10.1007/3-540-48256-3\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/tphol/KammullerWP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/types/Kammuller98, author = {Florian Kamm{\"{u}}ller}, editor = {Thorsten Altenkirch and Wolfgang Naraschewski and Bernhard Reus}, title = {Modular Structures as Dependent Types in Isabelle}, booktitle = {Types for Proofs and Programs, International Workshop {TYPES} '98, Kloster Irsee, Germany, March 27-31, 1998, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {1657}, pages = {121--132}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48167-2\_9}, doi = {10.1007/3-540-48167-2\_9}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/types/Kammuller98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/korso/SantenKJB95, author = {Thomas Santen and Florian Kamm{\"{u}}ller and Stefan J{\"{a}}hnichen and Martin Beyer}, editor = {Manfred Broy and Stefan J{\"{a}}hnichen}, title = {Formalization of Algebraic Specification in the Development Language {DEVA}}, booktitle = {{KORSO} - Methods, Languages, and Tools for the Construction of Correct Software}, series = {Lecture Notes in Computer Science}, volume = {1009}, pages = {223--238}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0015464}, doi = {10.1007/BFB0015464}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/korso/SantenKJB95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.