


default search action
David J. Pym
Person information
- affiliation: University College London, Department of Computer Science
- affiliation: University of Aberdeen, Scotland, UK
- affiliation: Hewlett-Packard Laboratories, Bristol, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j51]Alexander V. Gheorghiu, David J. Pym:
Defining logical systems via algebraic constraints on proofs. J. Log. Comput. 35(1): 95-146 (2025) - [j50]David J. Pym
, Eike Ritter, Edmund Robinson
:
Categorical Proof-theoretic Semantics. Stud Logica 113(1): 125-162 (2025) - 2024
- [j49]Albesë Demjaha
, David J. Pym, Tristan Caulfield
, Simon Parkin
:
'The trivial tickets build the trust': a co-design approach to understanding security support interactions in a large university. J. Cybersecur. 10(1) (2024) - [i23]Timo Eckhardt, David J. Pym:
Base-extension Semantics for Modal Logic. CoRR abs/2401.13597 (2024) - [i22]Didier Galmiche, Timo Lang, David J. Pym:
Minimalistic System Modelling: Behaviours, Interfaces, and Local Reasoning. CoRR abs/2401.16109 (2024) - [i21]Alexander V. Gheorghiu, Tao Gu, David J. Pym:
Inferentialist Resource Semantics. CoRR abs/2402.09217 (2024) - [i20]Alexander V. Gheorghiu, Tao Gu, David J. Pym:
A Note on the Practice of Logical Inferentialism. CoRR abs/2403.10546 (2024) - [i19]Alexander V. Gheorghiu, Tao Gu, David J. Pym:
A Note on an Inferentialist Approach to Resource Semantics. CoRR abs/2405.06491 (2024) - [i18]Marius-Constantin Ilau, Tristan Caulfield, David J. Pym:
Co-designing heterogeneous models: a distributed systems approach. CoRR abs/2407.07656 (2024) - [i17]Alexander V. Gheorghiu, David J. Pym:
Semantic Foundations of Reductive Reasoning. CoRR abs/2412.14758 (2024) - 2023
- [j48]Alexander V. Gheorghiu
, David J. Pym:
Semantical Analysis of the Logic of Bunched Implications. Stud Logica 111(4): 525-571 (2023) - [c64]Manuela-Luminita Bujorianu, Tristan Caulfield
, David J. Pym, Rafael Wisniewski:
From MDP to POMDP and Back: Safety and Compositionality. ECC 2023: 1-6 - [c63]Alexander V. Gheorghiu
, Tao Gu
, David J. Pym
:
Proof-Theoretic Semantics for Intuitionistic Multiplicative Linear Logic. TABLEAUX 2023: 367-385 - [i16]Alexander V. Gheorghiu, David J. Pym:
Defining Logical Systems via Algebraic Constraints on Proofs. CoRR abs/2301.02125 (2023) - [i15]Alexander V. Gheorghiu, David J. Pym:
Proof-theoretic Semantics and Tactical Proof. CoRR abs/2301.02302 (2023) - [i14]Henry R. K. Skeoch, David J. Pym:
Pricing cyber-insurance for systems via maturity models. CoRR abs/2302.04734 (2023) - [i13]David J. Pym, Eike Ritter, Edmund Robinson:
Categorical Proof-Theoretic Semantics. CoRR abs/2302.09031 (2023) - [i12]Alexander V. Gheorghiu, Tao Gu, David J. Pym:
Proof-theoretic Semantics for Intuitionistic Multiplicative Linear Logic. CoRR abs/2306.05106 (2023) - [i11]Tao Gu, Alexander V. Gheorghiu, David J. Pym:
Proof-theoretic Semantics for the Logic of Bunched Implications. CoRR abs/2311.16719 (2023) - 2022
- [j47]Albesë Demjaha, Simon Parkin, David J. Pym:
The boundedly rational employee: Security economics for behaviour intervention support in organizations. J. Comput. Secur. 30(3): 435-464 (2022) - [i10]Alexander V. Gheorghiu, David J. Pym:
Negation-as-Failure in the Base-extension Semantics for Intuitionistic Propositional Logic. CoRR abs/2210.05336 (2022) - [i9]Alexander V. Gheorghiu, David J. Pym:
From Proof-theoretic Validity to Base-extension Semantics for Intuitionistic Propositional Logic. CoRR abs/2210.05344 (2022) - [i8]Alexander V. Gheorghiu, David J. Pym:
Semantical Analysis of the Logic of Bunched Implications. CoRR abs/2210.05348 (2022) - 2021
- [c62]Tristan Caulfield
, Marius-Constantin Ilau
, David J. Pym:
Engineering Ecosystem Models: Semantics and Pragmatics. SimuTools 2021: 236-258 - [c61]Tristan Caulfield
, Marius-Constantin Ilau
, David J. Pym:
Meta-modelling for Ecosystems Security. SimuTools 2021: 259-283 - [c60]Adrian Baldwin, Tristan Caulfield
, Marius-Constantin Ilau
, David J. Pym:
Modelling Organizational Recovery. SimuTools 2021: 284-314 - [c59]Albesë Demjaha, David J. Pym, Tristan Caulfield
:
Found in Translation: Co-design for Security Modelling. STAST 2021: 108-128 - 2020
- [c58]Paul Brunet
, David J. Pym
:
Pomsets with Boxes: Protection, Separation, and Locality in Concurrent Kleene Algebra. FSCD 2020: 8:1-8:16 - [c57]David J. Pym, Will Venters:
Modelling Interfaces and Things Within the Decentralized Ecosystems of the Internet of Things. ICIS 2020
2010 – 2019
- 2019
- [j46]Christos Ioannidis
, David J. Pym, Julian Williams, Iffat Gheyas
:
Resilience in information stewardship. Eur. J. Oper. Res. 274(2): 638-653 (2019) - [j45]Simon Docherty, David J. Pym:
Stone-Type Dualities for Separation Logics. Log. Methods Comput. Sci. 15(1) (2019) - [j44]Didier Galmiche, Pierre Kimmel, David J. Pym:
A substructural epistemic resource logic: theory and modelling applications. J. Log. Comput. 29(8): 1251-1287 (2019) - [j43]David J. Pym:
Resource semantics: logic as a modelling technology. ACM SIGLOG News 6(2): 5-41 (2019) - [c56]Albese Demjaha, Tristan Caulfield
, M. Angela Sasse, David J. Pym:
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes. EuroS&P Workshops 2019: 192-201 - [c55]Thomas Cattermole, Simon Docherty, David J. Pym, M. Angela Sasse:
Asset-Oriented Access Control: Towards a New IoT Framework. IOT 2019: 31:1-31:4 - [c54]Albesë Demjaha, Simon Parkin, David J. Pym:
You've Left Me No Choices: Security Economics to Inform Behaviour Intervention Support in Organizations. STAST 2019: 66-86 - [e1]George Cybenko, David J. Pym, Barbara Fila:
5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11086, Springer 2019, ISBN 978-3-030-15464-6 [contents] - [i7]Didier Galmiche, Pierre Kimmel, David J. Pym:
A Substructural Epistemic Resource Logic: Theory and Modelling Applications. CoRR abs/1909.07296 (2019) - [i6]Paul Brunet
, David J. Pym:
Pomsets with Boxes: Protection, Separation, and Locality in Concurrent Kleene Algebra. CoRR abs/1910.14384 (2019) - 2018
- [j42]Simon Docherty, David J. Pym:
Intuitionistic Layered Graph Logic: Semantics and Proof Theory. Log. Methods Comput. Sci. 14(4) (2018) - [j41]Didier Galmiche, David J. Pym:
Preface. J. Log. Comput. 28(4): 629-630 (2018) - [j40]Gabrielle Anderson, David J. Pym:
Trust domains in system models: algebra, logic, utility, and combinators. J. Log. Comput. 28(4): 665-703 (2018) - [c53]Simon Docherty, David J. Pym:
Modular Tableaux Calculi for Separation Theories. FoSSaCS 2018: 441-458 - [c52]Jonathan M. Spring
, David J. Pym:
Towards Scientific Incident Response. GameSec 2018: 398-417 - [c51]Simon Docherty, David J. Pym:
A Stone-type Duality Theorem for Separation Logic Via its Underlying Bunched Logics. MFPS 2018: 101-118 - 2017
- [j39]Fredrik Dahlqvist
, David J. Pym:
Coalgebraic completeness-via-canonicity for distributive substructural logics. J. Log. Algebraic Methods Program. 93: 1-22 (2017) - [j38]Adrian Baldwin, Iffat Gheyas
, Christos Ioannidis, David J. Pym, Julian Williams:
Contagion in cyber security attacks. J. Oper. Res. Soc. 68(7): 780-791 (2017) - [j37]Matthew Collinson, Kevin McDonald, David J. Pym:
Layered graph logic as an assertion language for access control policy models. J. Log. Comput. 27(1): 41-80 (2017) - [j36]Matthew Collinson, Kevin McDonald, Simon Docherty, David J. Pym:
Erratum to: A substructural logic for layered graphs. J. Log. Comput. 27(1): 413-414 (2017) - [j35]Gabrielle Anderson, David J. Pym:
A Substructural Modal Logic of Utility. J. Log. Comput. 27(5): 1421-1464 (2017) - [c50]Tristan Caulfield
, Christos Ioannidis, David J. Pym:
The U.S. Vulnerabilities Equities Process: An Economic Perspective. GameSec 2017: 131-150 - [c49]Didier Galmiche, Pierre Kimmel, David J. Pym:
A Substructural Epistemic Resource Logic. ICLA 2017: 106-122 - [c48]Simon Docherty, David J. Pym:
Intuitionistic Layered Graph Logic. IJCAI 2017: 4816-4820 - [c47]Jonathan M. Spring
, Tyler Moore
, David J. Pym:
Practicing a Science of Security: A Philosophy of Science Perspective. NSPW 2017: 1-18 - [i5]Simon Docherty, David J. Pym:
Intuitionistic Layered Graph Logic: Semantics and Proof Theory. CoRR abs/1702.05795 (2017) - [i4]Simon Docherty, David J. Pym:
Stone-Type Dualities for Separation Logics. CoRR abs/1710.03021 (2017) - 2016
- [j34]Tyler Moore, David J. Pym, Michel van Eeten:
Introduction. J. Cybersecur. 2(1): 1-2 (2016) - [j33]Tyler Moore
, David J. Pym:
Editorial. J. Cybersecur. 2(2): 119-120 (2016) - [j32]Gabrielle Anderson, David J. Pym:
A calculus and logic of bunched resources and processes. Theor. Comput. Sci. 614: 63-96 (2016) - [j31]Jean-René Courtault, Didier Galmiche, David J. Pym:
A logic of separating modalities. Theor. Comput. Sci. 637: 30-58 (2016) - [c46]Simon Docherty, David J. Pym:
Intuitionistic Layered Graph Logic. IJCAR 2016: 469-486 - [c45]Tristan Caulfield
, Christos Ioannidis, David J. Pym:
Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper). Financial Cryptography 2016: 271-279 - [c44]Tristan Caulfield
, Christos Ioannidis, David J. Pym:
On the Adoption of Privacy-enhancing Technologies. GameSec 2016: 175-194 - [c43]Gabrielle Anderson, Guy McCusker
, David J. Pym:
A Logic for the Compliance Budget. GameSec 2016: 370-381 - 2015
- [j30]Tyler Moore
, David J. Pym:
Welcome from the Editors-in-Chief. J. Cybersecur. 1(1): 1-2 (2015) - [j29]Tristan Caulfield
, David J. Pym:
Improving Security Policy Decisions with Models. IEEE Secur. Priv. 13(5): 34-41 (2015) - [c42]Fredrik Dahlqvist, David J. Pym:
Completeness via Canonicity for Distributive Substructural Logics: A Coalgebraic Perspective. RAMiCS 2015: 119-135 - [c41]Tristan Caulfield
, David J. Pym:
Modelling and simulating systems security policy. SimuTools 2015: 9-18 - [i3]Fredrik Dahlqvist, David J. Pym:
Completeness via canonicity for distributive substructural logics: a coalgebraic perspective. CoRR abs/1508.04940 (2015) - 2014
- [j28]David J. Pym, Eike Ritter, Edmund Robinson:
A proof-theoretic analysis of the classical propositional matrix method. J. Log. Comput. 24(1): 283-301 (2014) - [j27]Matthew Collinson, Kevin McDonald, David J. Pym:
A substructural logic for layered graphs. J. Log. Comput. 24(4): 953-988 (2014) - [c40]Tristan Caulfield
, David J. Pym, Julian Williams:
Compositional Security Modelling - Structure, Economics, and Behaviour. HCI (24) 2014: 233-245 - 2013
- [c39]Bob Duncan
, David J. Pym, Mark Whittington:
Developing a Conceptual Framework for Cloud Security Assurance. CloudCom (2) 2013: 120-125 - [c38]Gabrielle Anderson, Matthew Collinson, David J. Pym:
Utility-based Decision-making in Distributed Systems Modelling. TARK 2013 - [c37]Gabrielle Anderson, Matthew Collinson, David J. Pym:
Trust Domains: An Algebraic, Logical, and Utility-Theoretic Approach. TRUST 2013: 232-249 - [i2]Gabrielle Anderson, Matthew Collinson, David J. Pym:
Utility-based Decision-making in Distributed Systems Modelling. CoRR abs/1310.6405 (2013) - 2012
- [j26]Christos Ioannidis, David J. Pym, Julian Williams:
Information security trade-offs and optimal patching policies. Eur. J. Oper. Res. 216(2): 434-444 (2012) - [c36]Matthew Collinson, David J. Pym, Barry Taylor:
A Framework for Modelling Security Architectures in Services Ecosystems. ESOCC 2012: 64-79 - [c35]Adrian Baldwin, Iffat Gheyas, Christos Ioannidis, David J. Pym, Julian Williams:
Contagion in Cybersecurity Attacks. WEIS 2012 - 2011
- [c34]Adrian Baldwin, David J. Pym, Martin Sadler, Simon Shiu:
Information Stewardship in Cloud Ecosystems: Towards Models, Economics, and Delivery. CloudCom 2011: 784-791 - [c33]Christos Ioannidis, David J. Pym, Julian Williams:
Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach. WEIS 2011 - [c32]Christos Ioannidis, David J. Pym, Julian Williams:
Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach. WEIS (Springer Volume) 2011: 171-191 - 2010
- [j25]Matthew Collinson, David J. Pym:
Algebra and logic for access control. Formal Aspects Comput. 22(2): 83-104 (2010) - [j24]Matthew Collinson, David J. Pym:
Erratum to: Algebra and logic for access control. Formal Aspects Comput. 22(3-4): 483-484 (2010) - [j23]David J. Pym, Martin Sadler:
Information Stewardship in Cloud Computing. Int. J. Serv. Sci. Manag. Eng. Technol. 1(1): 50-67 (2010) - [c31]David J. Pym:
Modal Location-Resource-Process Logic for Access Control. LAM@LICS 2010: 2 - [c30]Matthew Collinson, Brian Monahan, David J. Pym:
Semantics for structured systems modelling and simulation. SimuTools 2010: 34 - [c29]Adam Beautement, David J. Pym:
Structured Systems Economics for Security Management. WEIS 2010
2000 – 2009
- 2009
- [j22]Matthew Collinson, Brian Monahan, David J. Pym:
A Logical and Computational Theory of Located Resource. J. Log. Comput. 19(6): 1207-1244 (2009) - [j21]Matthew Collinson, David J. Pym:
Algebra and logic for resource-based systems modelling. Math. Struct. Comput. Sci. 19(5): 959-1027 (2009) - [c28]Christos Ioannidis, David J. Pym, Julian Williams:
Investments and Trade-offs in the Economics of Information Security. Financial Cryptography 2009: 148-166 - [p1]Adam Beautement, Robert Coles, Jonathan Griffin, Christos Ioannidis, Brian Monahan, David J. Pym, M. Angela Sasse, Mike Wonham:
Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security. Managing Information Risk and the Economics of Security 2009: 141-163 - 2008
- [j20]Matthew Collinson, David J. Pym, Edmund Robinson:
Bunched polymorphism. Math. Struct. Comput. Sci. 18(6): 1091-1132 (2008) - [c27]Adam Beautement, Robert Coles, Jonathan Griffin, Christos Ioannidis, Brian Monahan, David J. Pym, M. Angela Sasse, Mike Wonham:
Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security. WEIS 2008 - 2007
- [j19]Matthew Collinson, David J. Pym, Chris M. N. Tofts:
Errata for Formal Aspects of Computing (2006) 18: 495-517 and their consequences. Formal Aspects Comput. 19(4): 551-554 (2007) - [j18]Carsten Führmann, David J. Pym:
On categorical models of classical logic and the Geometry of Interaction. Math. Struct. Comput. Sci. 17(5): 957-1027 (2007) - [c26]Guy McCusker
, David J. Pym:
A Games Model of Bunched Implications. CSL 2007: 573-588 - [c25]Jean Paul Degabriele, David J. Pym:
Economic aspects of a utility computing service. GridNets 2007: 27 - [c24]Jonathan Griffin, Brian Monahan, David J. Pym, Mike Wonham, Mike Yearworth:
Assessing the Value of Investments in Network Security Operations: A Systems Analytics Approach. WEIS 2007 - [c23]David J. Pym, Chris M. N. Tofts:
Systems Modelling via Resources and Processes: Philosophy, Calculus, Semantics, and Logic. Computation, Meaning, and Logic 2007: 545-587 - 2006
- [j17]David J. Pym, Chris M. N. Tofts:
A Calculus and logic of resources and processes. Formal Aspects Comput. 18(4): 495-517 (2006) - [j16]David J. Pym:
Editorial. J. Log. Comput. 16(1): 1-3 (2006) - [c22]Matthew Collinson, David J. Pym:
Bunching for Regions and Locations. MFPS 2006: 171-197 - 2005
- [j15]David J. Pym:
Editorial. J. Log. Comput. 15(6): 819 (2005) - [j14]Didier Galmiche, Daniel Méry, David J. Pym:
The semantics of BI and resource tableaux. Math. Struct. Comput. Sci. 15(6): 1033-1088 (2005) - [c21]Matthew Collinson, David J. Pym, Edmund Robinson:
On Bunched Polymorphism. CSL 2005: 36-50 - [c20]David J. Pym, Eike Ritter:
A games semantics for reductive logic and proof-search. GALOP@ETAPS 2005: 107-123 - 2004
- [b2]David J. Pym, Eike Ritter:
Reductive logic and proof-search - proof theory, semantics, and control. Oxford logic guides 45, Oxford University Press 2004, ISBN 978-0-19-852633-9, pp. I-XV, 1-208 - [j13]David J. Pym, Peter W. O'Hearn, Hongseok Yang:
Possible worlds and resources: the semantics of BI. Theor. Comput. Sci. 315(1): 257-305 (2004) - [c19]Carsten Führmann, David J. Pym:
On the Geometry of Interaction for Classical Logic. LICS 2004: 211-220 - 2003
- [j12]David J. Pym:
Editorial. J. Log. Comput. 13(5): 633-638 (2003) - [j11]David J. Pym:
Forthcoming Papers. J. Log. Comput. 13(5): 799-800 (2003) - [j10]James Harland
, David J. Pym:
Resource-distribution via Boolean constraints. ACM Trans. Comput. Log. 4(1): 56-90 (2003) - 2002
- [b1]David J. Pym:
The semantics and proof theory of the logic of bunched implications. Applied logic series 26, Kluwer 2002, ISBN 978-1-4020-0745-3, pp. I-XLIX, 1-287 - [j9]Samin S. Ishtiaq, David J. Pym:
Kripke Resource Models of a Dependently-typed, Bunched λ-calculus. J. Log. Comput. 12(6): 1061-1104 (2002) - [c18]Didier Galmiche, Daniel Méry, David J. Pym:
Resource Tableaux. CSL 2002: 183-199 - 2001
- [c17]Pablo A. Armelín, David J. Pym:
Bunched Logic Programming. IJCAR 2001: 289-304 - 2000
- [j8]Eike Ritter, David J. Pym, Lincoln A. Wallen:
Proof-terms for classical and intuitionistic resolution. J. Log. Comput. 10(2): 173-207 (2000) - [j7]Didier Galmiche, David J. Pym:
Proof-search in type-theoretic languages: an introduction. Theor. Comput. Sci. 232(1-2): 5-53 (2000) - [j6]Eike Ritter, David J. Pym, Lincoln A. Wallen:
On the intuitionistic force of classical search. Theor. Comput. Sci. 232(1-2): 299-333 (2000) - [c16]James Harland, David J. Pym, Michael Winikoff:
Forward and Backward Chaining in Linear Logic. ARW 2000 - [c15]James Harland, David J. Pym, Michael Winikoff:
Forward and Backward Chaining in Linear Logic. Workshop on Type-Theoretic Languages: Proof Search and Semantics 2000: 1-16 - [c14]David J. Pym:
Notes Towards a Semantics for Proof-search. Workshop on Type-Theoretic Languages: Proof Search and Semantics 2000: 1-18 - [i1]James Harland, David J. Pym:
Resource-distribution via Boolean constraints. CoRR cs.LO/0012018 (2000)
1990 – 1999
- 1999
- [j5]Peter W. O'Hearn, David J. Pym:
The logic of bunched implications. Bull. Symb. Log. 5(2): 215-244 (1999) - [c13]Samin S. Ishtiaq, David J. Pym:
Kripke Resource Models of a Dependently-Typed, Bunched lambda-Calculus. CSL 1999: 235-249 - [c12]