David von Oheimb

According to our database1, David von Oheimb authored at least 28 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Lightweight Certificate Management Protocol (CMP) Profile.
RFC, November, 2023

Certificate Management Protocol (CMP) Updates.
RFC, November, 2023

2012
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

IT Security Architecture Approaches for Smart Metering and Smart Grid.
Proceedings of the Smart Grid Security - First International Workshop, 2012

2010
A Case Study in Decentralized, Dynamic, Policy-Based, Authorization and Trust Management - Automated Software Distribution for Airplanes.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

ASLan++ - A Formal Security Specification Language for Distributed Systems.
Proceedings of the Formal Methods for Components and Objects - 9th International Symposium, 2010

2008
Formal Security Analysis of Electronic Software Distribution Systems.
Proceedings of the Computer Safety, 2008

2007
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety.
Proceedings of the Computer Safety, 2007

2006
Designing and Verifying Core Protocols for Location Privacy.
Proceedings of the Information Security, 9th International Conference, 2006

Formal Security Analysis in Industry, at the Example of Electronic Distribution of Aircraft Software (EDS).
Proceedings of the Leveraging Applications of Formal Methods, 2006

Formal Methods in the Security Business: Exotic Flowers Thriving in an Expanding Niche.
Proceedings of the FM 2006: Formal Methods, 2006

2005
Analyzing SLE 88 memory management security using Interacting State Machines.
Int. J. Inf. Sec., 2005

The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005

2004
Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage.
Proceedings of the Computer Security, 2004

2003
Generic Interacting State Machines and Their Instantiation with Dynamic Features.
Proceedings of the Formal Methods and Software Engineering, 2003

Interacting State Machines for Mobility.
Proceedings of the FME 2003: Formal Methods, 2003

A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment.
Proceedings of the Computer Security, 2003

2002
Hoare Logic for NanoJava: Auxiliary Variables, Side Effects, and Virtual Methods Revisited.
Proceedings of the FME 2002: Formal Methods, 2002

Interacting State Machines: A Stateful Approach to Proving Security.
Proceedings of the Formal Aspects of Security, First International Conference, 2002

Formal Security Analysis with Interacting State Machines.
Proceedings of the Computer Security, 2002

2001
Analyzing Java in Isabelle-HOL: formalization, type safety and Hoare logic.
PhD thesis, 2001

Hoare logic for Java in Isabelle/HOL.
Concurr. Comput. Pract. Exp., 2001

1999
HOLCF=HOL+LCF.
J. Funct. Program., 1999

Machine-Checking the Java Specification: Proving Type-Safety.
Proceedings of the Formal Syntax and Semantics of Java, 1999

Hoare Logic for Mutual Recursion and Local Variables.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1999

1998
Java<i><sub>light</sub></i> is Type-Safe - Definitely.
Proceedings of the POPL '98, 1998

Java - formal fundiert.
Proceedings of the JIT '98, 1998

1997
RALL: Machine-Supported Proofs for Relation Algebra.
Proceedings of the Automated Deduction, 1997


  Loading...