עקוב אחר
Michael Huth
Michael Huth
Professor of Computer Science, Computing, Imperial College London
כתובת אימייל מאומתת בדומיין imperial.ac.uk
כותרת
צוטט על ידי
צוטט על ידי
שנה
Logic in Computer Science: Modelling and reasoning about systems
M Huth, M Ryan
Cambridge university press, 2004
24432004
Modal transition systems: A foundation for three-valued program analysis
M Huth, R Jagadeesan, D Schmidt
Programming Languages and Systems: 10th European Symposium on Programming …, 2001
2852001
Abstraction-based model checking using modal transition systems
P Godefroid, M Huth, R Jagadeesan
International conference on concurrency theory, 426-440, 2001
2172001
Quantitative analysis and model checking
M Huth, M Kwiatkowska
Proceedings of Twelfth Annual IEEE Symposium on Logic in Computer Science …, 1997
1751997
Assume-guarantee model checking of software: A comparative case study
CS Păsăreanu, MB Dwyer, M Huth
International SPIN Workshop on Model Checking of Software, 168-183, 1999
1441999
Relationship-based access control: its expression and enforcement through hybrid logic
G Bruns, PWL Fong, I Siahaan, M Huth
Proceedings of the second ACM conference on Data and Application Security …, 2012
1122012
A simple and expressive semantic framework for policy composition in access control
G Bruns, DS Dantas, M Huth
Proceedings of the 2007 ACM workshop on Formal methods in security …, 2007
782007
Access control via Belnap logic: Intuitive, expressive, and analyzable policy composition
G Bruns, M Huth
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-27, 2011
702011
20 years of modal and mixed specifications
A Antonik, M Huth, KG Larsen, U Nyman, A Wasowski
Bulletin of the European Association for Theoretical Computer Science, 2008
612008
Access-control policies via Belnap logic: Effective and efficient composition and analysis
G Bruns, M Huth
2008 21st IEEE Computer Security Foundations Symposium, 163-176, 2008
582008
Model checking vs. generalized model checking: Semantic minimizations for temporal logics
P Godefroid, M Huth
20th Annual IEEE Symposium on Logic in Computer Science (LICS'05), 158-167, 2005
442005
Towards an access-control framework for countering insider threats
J Crampton, M Huth
Insider Threats in Cyber Security, 173-195, 2010
412010
Complexity of decision problems for mixed and modal specifications
A Antonik, M Huth, KG Larsen, U Nyman, A Wąsowski
Foundations of Software Science and Computational Structures: 11th …, 2008
402008
On finite-state approximants for probabilistic computation tree logic
M Huth
Theoretical Computer Science 346 (1), 113-134, 2005
392005
A domain equation for refinement of partial systems
MRA Huth, R Jagadeesan, DA Schmidt
Mathematical Structures in Computer Science 14 (4), 469-505, 2004
382004
On model checking multiple hybrid views
A Hussain, M Huth
Theoretical computer science 404 (3), 186-201, 2008
322008
An authorization framework resilient to policy evaluation failures
J Crampton, M Huth
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
312010
Model checking modal transition systems using Kripke structures
M Huth
International Workshop on Verification, Model Checking, and Abstract …, 2002
282002
Linear domains and linear maps
M Huth
International Conference on Mathematical Foundations of Programming …, 1993
281993
Secure communicating systems: design, analysis, and implementation
M Huth
Cambridge University Press, 2001
272001
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20