Author Publications

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item Type
Jump to: 2007 | 2006 | 2005 | 2004 | 2000 | 1996
Number of items: 15.

2007

Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den and Lenzini, G. (2007) Audit-based compliance control. International Journal of Information Security, 6 (2-3). pp. 133-151. ISSN 1615-5262

Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2007) Extended Privilege Inheritance in RBAC. In: 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, March 20-22, 2007, Singapore, Thailand (pp. pp. 383-385).

2006

Cederquist, J.G. and Corin, R. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den and Lenzini, G. (2006) The Audit Logic: Policy Compliance in Distributed Systems. [Report]

Cederquist, Jan and Dashti, Muhammad Torabi (2006) An intruder model for verifying liveness in security protocols. In: Fourth ACM Workshop on Formal Methods in Security, FMSE '06, November 3, 2006, Alexandria, Virginia, USA (pp. pp. 23-32).

Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. [Report]

2005

Cederquist, J. and Corin, R. and Dashti, M. Torabi (2005) On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. In: 7th International Conference on Information and Communications Security, ICICS 2005, December 10-13, 2005, Beijing, China (pp. pp. 27-37).

Cederquist, J.G. and Corin, R. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den (2005) An audit logic for accountability. [Report]

Cederquist, J.G. and Corin, R. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den (2005) An Audit Logic for Accountability. In: Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2005, 6-8 June 2005, Stockholm, Sweden (pp. pp. 34-43).

Cederquist, Jan and Corin, Ricardo and Dashti, Muhammad Torabi (2005) On the quest for impartiality: design and analysis of a fair non-repudiation protocol. [Report]

Cederquist, Jan and Dashti, M.T. (2005) An intruder model for verifying termination in security protocols. [Report]

Cederquist, Jan and Dashti, Muhammad Torabi (2005) Formal Analysis of a Fair Payment Protocol. In: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France (pp. pp. 41-54).

2004

Barthe, Gilles and Cederquist, Jan and Tarento, Sabrina (2004) A Machine-Checked Formalization of the Generic Model and the Random Oracle Model. In: 2nd International Joint Conference on Automated Reasoning, IJCAR 2004, July 4-8, 2004, Cork, Ireland (pp. pp. 385-399).

Cederquist, J.G. and Dashti, M.T. (2004) Formal Analysis of a Fair Payment Protocol. [Report]

2000

Cederquist, Jan and Coquand, Thierry (2000) Entailment relations and distributive lattices. In: Logic Colloquium 1998, August 9-15, 1998, Prague, Czech Republic (pp. pp. 110-123).

1996

Cederquist, Jan and Negri, Sara (1996) A constructive proof of the Heine-Borel covering theorem for formal reals. In: International Workshop on Types for Proofs and Programs, TYPES 1995, June 5-8, 1995, Torino, Italy (pp. pp. 62-75).

This list was generated on Sun Nov 23 05:32:43 2014 CET.