Michael Huth
Orcid: 0000-0001-9229-3055Affiliations:
- Imperial College London, UK
According to our database1,
Michael Huth
authored at least 119 papers
between 1991 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on doc.ic.ac.uk
-
on dl.acm.org
On csauthors.net:
Bibliography
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
Digital twins: artificial intelligence and the IoT cyber-physical systems in Industry 4.0.
Int. J. Intell. Robotics Appl., 2022
Extreme compression of sentence-transformer ranker models: faster inference, longer battery life, and less storage on edge devices.
CoRR, 2022
2021
CoRR, 2021
CCF Trans. Pervasive Comput. Interact., 2021
2020
Protecting Private Inputs: Bounded Distortion Guarantees With Randomised Approximations.
Proc. Priv. Enhancing Technol., 2020
Effective Detection of Credential Thefts from Windows Memory: Learning Access Behaviours to Local Security Authority Subsystem Service.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
2019
Proceedings of the Computing and Software Science - State of the Art and Perspectives, 2019
IEEE Trans. Inf. Theory, 2019
A reference architecture for integrating the Industrial Internet of Things in the Industry 4.0.
CoRR, 2019
Pseudonym Management Through Blockchain: Cost-Efficient Privacy Preservation on Intelligent Transportation Systems.
IEEE Access, 2019
Owner-Centric Sharing of Physical Resources, Data, and Data-Driven Insights in Digital Ecosystems.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Decision Support for Smart Grid: Using Reasoning to Contextualize Complex Decision Making.
Proceedings of the 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2019
2018
CoRR, 2018
Comput. Ind., 2018
Comput. Chem. Eng., 2018
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018
Proceedings of the Business Information Systems Workshops, 2018
Proceedings of the Models, Mindsets, 2018
Springer, ISBN: 978-3-319-68396-6, 2018
2017
CoRR, 2017
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
Proceedings of the Models, Algorithms, Logics and Tools, 2017
2016
Proceedings of the Seventh International Symposium on Games, 2016
Proceedings of the Semantics, Logics, and Calculi, 2016
2015
Inf. Comput., 2015
Confidence Analysis for Nuclear Arms Control: SMT Abstractions of Bayesian Belief Networks.
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
Authorized workflow schemas: deciding realizability through $$\mathsf{LTL }(\mathsf{F })$$ model checking.
Int. J. Softw. Tools Technol. Transf., 2014
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
2013
Dagstuhl Reports, 2013
Proceedings of the Proceedings Fourth International Symposium on Games, 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Towards Usable Generation and Enforcement of Trust Evidence from Programmers' Intent.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
Proceedings of the Foundations of Software Science and Computation Structures, 2013
2012
Perform. Evaluation, 2012
Relationship-based access control: its expression and enforcement through hybrid logic.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Authorization Enforcement in Workflows: Maintaining Realizability Via Automated Reasoning.
Proceedings of the Third Workshop on Practical Aspects of Automated Reasoning, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Access control via belnap logic: Intuitive, expressive, and analyzable policy composition.
ACM Trans. Inf. Syst. Secur., 2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Proceedings of the Hardware and Software: Verification and Testing, 2011
Proceedings of the Hardware and Software: Verification and Testing, 2011
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems.
Proceedings of the Business Process Management Workshops, 2011
2010
Proceedings of the Insider Threats in Cyber Security, 2010
PCTL model checking of Markov chains: Truth and falsity as winning strategies in games.
Perform. Evaluation, 2010
Math. Struct. Comput. Sci., 2010
A Framework for the Modular Specification and Orchestration of Authorization Policies.
Proceedings of the Information Security Technology for Applications, 2010
Proceedings of the Computer Security, 2010
2009
Special section on advances in reachability analysis and decision procedures: contributions to abstraction-based system verification.
Int. J. Softw. Tools Technol. Transf., 2009
A workbench for preprocessor design and evaluation: toward benchmarks for parity games.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2009
Three-Valued Abstractions of Markov Chains: Completeness for a Sizeable Fragment of PCTL.
Proceedings of the Fundamentals of Computation Theory, 17th International Symposium, 2009
2008
Proceedings of the Second Workshop on Reachability Problems in Computational Models, 2008
Proceedings of the 15th Workshop on Expressiveness in Concurrency, 2008
20 Years of Modal and Mixed Specifications.
Bull. EATCS, 2008
Proceedings of the Fifth International Conference on the Quantitative Evaluaiton of Systems (QEST 2008), 2008
Proceedings of the Foundations of Software Science and Computational Structures, 2008
Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
2007
Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, 2007
Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, 2007
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007
Proceedings of the Computer Aided Verification, 19th International Conference, 2007
2006
Efficient Patterns for Model Checking Partial State Spaces in CTL <i>intersection</i> LTL.
Proceedings of the 22nd Annual Conference on Mathematical Foundations of Programming Semantics, 2006
Proceedings of the Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, 2006
Proceedings of the Automated Technology for Verification and Analysis, 2006
2005
Theor. Comput. Sci., 2005
Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics, 2005
Model Checking Vs. Generalized Model Checking: Semantic Minimizations for Temporal Logics.
Proceedings of the 20th IEEE Symposium on Logic in Computer Science (LICS 2005), 2005
2004
Math. Struct. Comput. Sci., 2004
Proceedings of the Third Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, 2004
Proceedings of the Fouth International Workshop on Automated Verification of Critical Systems, 2004
Proceedings of the Second Workshop on Quantitative Aspects of Programming Languages, 2004
Proceedings of the Validation of Stochastic Systems - A Guide to Current Research, 2004
Proceedings of the 19th IEEE Symposium on Logic in Computer Science (LICS 2004), 2004
Logic in computer science - modelling and reasoning about systems (2. ed.).
Cambridge University Press, 2004
2002
Proceedings of the Workshop on Domains VI 2002, Birmingham, UK, September 16-19, 2002, 2002
Proceedings of the Verification, 2002
Proceedings of the Process Algebra and Probabilistic Methods, 2002
2001
A Comment on the Shape of the Solution Set for Systems of Interval Linear Equations with Dependent Coefficients.
Reliab. Comput., 2001
Proceedings of the Seventeenth Conference on the Mathematical Foundations of Programming Semantics, 2001
Proceedings of the Programming Languages and Systems, 2001
Proceedings of the CONCUR 2001, 2001
Secure communicating systems - design, analysis, and implementation.
Cambridge University Press, ISBN: 978-0-521-80731-9, 2001
2000
Logic in computer science - modelling and reasoning about systems.
Cambridge University Press, ISBN: 978-0-521-65602-3, 2000
1999
Proceedings of the Theoretical and Practical Aspects of SPIN Model Checking, 1999
A Unifying Framework for Model Checking Labeled Kripke Structures, Modal Transition Systems and Interval Transition Systems.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1999
1998
Proceedings of the First International Workshop on Probabilistic Methods in Verification, 1998
Comparing CTL and PCTL on labeled Markov chains.
Proceedings of the Programming Concepts and Methods, 1998
1997
Proceedings of the US-Brazil Joint Workshops on the Formal Foundations of Software Systems, 1997
Proceedings of the Thirteenth Annual Conference on Mathematical Foundations of Progamming Semantics, 1997
Proceedings of the Proceedings, 12th Annual IEEE Symposium on Logic in Computer Science, Warsaw, Poland, June 29, 1997
Proceedings of the Computer Science Logic, 11th International Workshop, 1997
1995
Inf. Comput., January, 1995
1994
Proceedings of the Ninth Annual Symposium on Logic in Computer Science (LICS '94), 1994
Interaction Orders as Games.
Proceedings of the Proceedings for the Second Imperial College Department of Computing Workshop on Theory and Formal Methods, 1994
1993
Proceedings of the Mathematical Foundations of Programming Semantics, 1993
On the Equivalence of State-Transition Systems.
Proceedings of the Theory and Formal Methods 1993, 1993
1991
Proceedings of the Mathematical Foundations of Programming Semantics, 1991