Florian Kammüller

Orcid: 0000-0001-5839-5488

Affiliations:
  • Middlesex University, Department of Computer Science, London
  • TU Berlin, Institute of Software Engineering and Theoretical Computer Science, Germany


According to our database1, Florian Kammüller authored at least 83 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Transparency vs Explanation of Machine Learning Algorithms: Perspectives from Recent Legal Proceedings.
Proceedings of the Progress in Artificial Intelligence, 2024

Analyzing Air-traffic Security using GIS-"blur' with Information Flow Control in the IIIf.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Explanation of Student Attendance AI Prediction with the Isabelle Infrastructure Framework.
Inf., 2023

Higher Order Model Checking in Isabelle for Human Centric Infrastructure Security.
CoRR, 2023

Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems.
Comput. Intell., 2022

Exploring Rationality of Self Awareness in Social Networking for Logical Modeling of Unintentional Insiders.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022

Explanation by Automated Reasoning Using the Isabelle Infrastructure Framework.
Proceedings of the HCI International 2022 - Late Breaking Papers: Interacting with eXtended Reality and Artificial Intelligence, 2022

Explanation of Black Box AI for GDPR Related Privacy Using Isabelle.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

2021
Masterminding change by combining secure system design with security risk assessment.
Int. J. Softw. Tools Technol. Transf., 2021

Applying the Isabelle Insider framework to airplane security.
Sci. Comput. Program., 2021

Dependability Engineering in Isabelle.
CoRR, 2021

2020
A Formal Development Cycle for Security Engineering in Isabelle.
CoRR, 2020

Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems.
Arch. Formal Proofs, 2020

Describing and Simulating Concurrent Quantum Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2020

Modeling and Analyzing the Corona-Virus Warning App with the Isabelle Infrastructure Framework.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

Inter-Blockchain Protocols with the Isabelle Infrastructure Framework.
Proceedings of the 2nd Workshop on Formal Methods for Blockchains, 2020

2019
QKD in Isabelle - Bayesian Calculation.
CoRR, 2019

Designing Data Protection for GDPR Compliance into IoT Healthcare Systems.
CoRR, 2019

Attack trees in Isabelle extended with probabilities for quantum cryptography.
Comput. Secur., 2019

Combining Secure System Design with Risk Assessment for IoT Healthcare Systems.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

2018
Attack Trees in Isabelle - CTL semantics, correctness and completeness.
CoRR, 2018

Formalization and Analysis of a Resource Allocation Security Protocol for Secure Service Migration.
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018

Formal Modeling and Analysis of Data Protection for GDPR Compliance of IoT Healthcare Systems.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Attack Trees in Isabelle.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Modeling and Verification of Insider Threats Using Logical Analysis.
IEEE Syst. J., 2017

Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

Formal Modeling and Analysis with Humans in Infrastructures for IoT Health Care Systems.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

A Proof Calculus for Attack Trees in Isabelle.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Human Centric Security and Privacy for the IoT Using Formal Techniques.
Proceedings of the Advances in Human Factors in Cybersecurity, 2017

2016
Investigating Airplane Safety and Security Against Insider Threats Using Logical Modeling.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Attack Tree Analysis for Insider Threats on the IoT Using Isabelle.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

Refactoring Preserves Security.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Isabelle Modelchecking for Insider Threats.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Model based analysis of insider threats.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

Towards Formal Analysis of Insider Threats for Auctions.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

Formal Modelling and Analysis of Socio-Technical Systems.
Proceedings of the Semantics, Logics, and Calculi, 2016

2015
Formalization of Quantum Protocols using Coq.
Proceedings of the Proceedings 12th International Workshop on Quantum Physics and Logic, 2015

Attack Tree Generation by Policy Invalidation.
Proceedings of the Information Security Theory and Practice, 2015

A Probabilistic Analysis Framework for Malicious Insider Threats.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Secure Refactoring with Java Information Flow.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Transforming Graphical System Models to Graphical Attack Models.
Proceedings of the Graphical Models for Security - Second International Workshop, 2015

2014
Invalidating Policies using Structural Information.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Confinement for Active Objects.
CoRR, 2014

Modeling Human Behaviour with Higher Order Logic: Insider Threats.
Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014

Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Verification of DNSsec Delegation Signatures.
Proceedings of the 21st International Conference on Telecommunications, 2014

2013
Externalizing Behaviour for Analysing System Models.
J. Internet Serv. Inf. Secur., 2013

DNSsec in Isabelle - Replay Attack and Origin Authentication.
Proceedings of the IEEE International Conference on Systems, 2013

Network Information Flow Control: Proof of Concept.
Proceedings of the IEEE International Conference on Systems, 2013

Privacy Analysis of a Hidden Friendship Protocol.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

2012
ASP<sub>fun</sub> : A typed functional active object calculus.
Sci. Comput. Program., 2012

A Semi-lattice Model for Multi-lateral Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2011
Mechanical Analysis of Finite Idempotent Relations.
Fundam. Informaticae, 2011

A Security Model for Functional Active Objects.
Proceedings of the Communicability, Computer Graphics and Innovative Design for Interactive Systems, 2011

2010
Locally Nameless Sigma Calculus.
Arch. Formal Proofs, 2010

Formalizing Statecharts using Hierarchical Automata.
Arch. Formal Proofs, 2010

Feature link propagation across variability representations with Isabelle/HOL.
Proceedings of the 2010 ICSE Workshop on Product Line Approaches in Software Engineering, 2010

Privacy Enforcement and Analysis for Functional Active Objects.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

2009
Functional Active Objects: Typing and Formalisation.
Proceedings of the 8th International Workshop on the Foundations of Coordination Languages and Software Architectures, 2009

A Framework for Reasoning on Component Composition.
Proceedings of the Formal Methods for Components and Objects - 8th International Symposium, 2009

2008
An industrial application of symbolic model checking.
Inform. Forsch. Entwickl., 2008

Formalizing non-interference for a simple bytecode language in Coq.
Formal Aspects Comput., 2008

Composing Safely - A Type System for Aspects.
Proceedings of the Software Composition - 7th International Symposium, 2008

Compositionality of Aspect Weaving.
Proceedings of the Autonomous Systems, 2008

An Asynchronous Distributed Component Model and Its Semantics.
Proceedings of the Formal Methods for Components and Objects, 7th International Symposium, 2008

2007
A Mechanized Model of the Theory of Objects.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2007

Checking the TWIN Elevator System by Translating Object-Z to SMV.
Proceedings of the Formal Methods for Industrial Critical Systems, 2007

2005
Structure Preserving Data Abstractions for Statecharts.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2005

2004
Heuristics for Refinement Relations.
Proceedings of the 2nd International Conference on Software Engineering and Formal Methods (SEFM 2004), 2004

Idempotent Relations in Isabelle/HOL.
Proceedings of the Theoretical Aspects of Computing, 2004

2003
Translating Fusion/UML to Object-Z.
Proceedings of the 1st ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2003), 2003

2002
Book Reviews.
Softw. Test. Verification Reliab., 2002

Encoding Object-Z in Isabelle/HOL.
Proceedings of the ZB 2002: Formal Specification and Development in Z and B, 2002

2001
On the antisymmetry of Galois embeddings.
Inf. Process. Lett., 2001

Representing Hierarchical Automata in Interactive Theorem Provers.
Proceedings of the Theorem Proving in Higher Order Logics, 14th International Conference, 2001

2000
Modular Reasoning in Isabelle.
Proceedings of the Automated Deduction, 2000

1999
Modular reasoning in Isabelle
PhD thesis, 1999

A Formal Proof of Sylow's Theorem.
J. Autom. Reason., 1999

Locales - A Sectioning Concept for Isabelle.
Proceedings of the Theorem Proving in Higher Order Logics, 12th International Conference, 1999

1998
Modular Structures as Dependent Types in Isabelle.
Proceedings of the Types for Proofs and Programs, 1998

1995
Formalization of Algebraic Specification in the Development Language DEVA.
Proceedings of the KORSO, 1995


  Loading...