Flemming Nielson

According to our database1, Flemming Nielson
  • authored at least 211 papers between 1982 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
Effect-driven QuickChecking of compilers.
PACMPL, 2017

Content dependent information flow control.
J. Log. Algebr. Meth. Program., 2017

Atomistic Galois insertions for flow sensitive integrity.
Computer Languages, Systems & Structures, 2017

Modelling and Verifying Communication Failure of Hybrid Systems in HCSP.
Comput. J., 2017

Time Dependent Policy-Based Access Control.
Proceedings of the 24th International Symposium on Temporal Representation and Reasoning, 2017

Model Checking Exact Cost for Attack Scenarios.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

Information Flow for Timed Automata.
Proceedings of the Models, Algorithms, Logics and Tools, 2017

2016
Discovering, quantifying, and displaying attacks.
Logical Methods in Computer Science, 2016

A Theory of Available-by-Design Communicating Systems.
CoRR, 2016

A Coordination Language for Databases.
Logical Methods in Computer Science, 2016

A Parametric Abstract Domain for Lattice-Valued Regular Expressions.
Proceedings of the Static Analysis - 23rd International Symposium, 2016

Iterated process analysis over lattice-valued regular expressions.
Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, 2016

Towards Static Analysis of Policy-Based Self-adaptive Computing Systems.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, 2016

Enforcing Availability in Failure-Aware Communicating Systems.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2016

Quantitative Verification and Synthesis of Attack-Defence Scenarios.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2015
A calculus of quality for robustness against unreliable communication.
J. Log. Algebr. Meth. Program., 2015

Disjunctive Information Flow for Communicating Processes.
Proceedings of the Trustworthy Global Computing - 10th International Symposium, 2015

How to Trust the Re-use of Data.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Pareto Efficient Solutions of Attack-Defence Trees.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

Factorization of Behavioral Integrity.
Proceedings of the Computer Security - ESORICS 2015, 2015

Set-Pi: Set Membership p-Calculus.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Klaim-DB: A Modeling Language for Distributed Database Applications.
Proceedings of the Coordination Models and Languages, 2015

Modelling and Analysing Socio-Technical Systems.
Proceedings of the 1st International Workshop on Socio-Technical Perspective in IS Development (STPIS'15) co-located with the 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015

Stochastic Model Checking of the Stochastic Quality Calculus.
Proceedings of the Software, 2015

Hoare Logic for Disjunctive Information Flow.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

Discretionary Information Flow Control for Interaction-Oriented Specifications.
Proceedings of the Logic, Rewriting, and Concurrency, 2015

2014
Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study.
STTT, 2014

The logic of XACML.
Sci. Comput. Program., 2014

A Framework for Hybrid Systems with Denial-of-Service Security Attack.
CoRR, 2014

Trust-Based Enforcement of Security Policies.
Proceedings of the Trustworthy Global Computing - 9th International Symposium, 2014

The Guided System Development Framework: Modeling and Verifying Communication Systems.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications, 2014

Formal Security Analysis of the MaCAN Protocol.
Proceedings of the Integrated Formal Methods - 11th International Conference, 2014

Denial-of-Service Security Attack in the Continuous-Time World.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2014

Uniform Protection for Multi-exposed Targets.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2014

Automated Generation of Attack Trees.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

The Stochastic Quality Calculus.
Proceedings of the Coordination Models and Languages, 2014

2013
Predictive access control for distributed computation.
Sci. Comput. Program., 2013

Reachability for Finite-State Process Algebras using Horn Clauses.
Int. J. Found. Comput. Sci., 2013

Design-Efficiency in Security
CoRR, 2013

Pushdown Systems for Monotone Frameworks.
CoRR, 2013

Lazy Mobile Intruders.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Broadcast, Denial-of-Service, and Secure Communication.
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013

Probabilistic Analysis of the Quality Calculus.
Proceedings of the Formal Techniques for Distributed Systems, 2013

ICT-powered Health Care Processes - (Position Paper).
Proceedings of the Foundations of Health Information Engineering and Systems, 2013

Safety versus Security in the Quality Calculus.
Proceedings of the Theories of Programming and Formal Methods, 2013

2012
Static Analysis of IMC.
J. Log. Algebr. Program., 2012

Flow Logic for Process Calculi.
ACM Comput. Surv., 2012

Roadmap Document on Stochastic Analysis
CoRR, 2012

Lattice based Least Fixed Point Logic
CoRR, 2012

XACML 3.0 in Answer Set Programming
CoRR, 2012

Optimizing ZigBee Security using Stochastic Model Checking
CoRR, 2012

Modelling Chinese Smart Grid: A Stochastic Model Checking Case Study
CoRR, 2012

Layered Fixed Point Logic
CoRR, 2012

Secondary use of data in EHR systems
CoRR, 2012

Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

Layered fixed point logic.
Proceedings of the Principles and Practice of Declarative Programming, 2012

A generic approach for security policies composition: position paper.
Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, 2012

Belief Bisimulation for Hidden Markov Models - Logical Characterisation and Decision Algorithm.
Proceedings of the NASA Formal Methods, 2012

XACML 3.0 in Answer Set Programming.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2012

LBTool: A stochastic toolkit for leave-based key updates.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Key Update Assistant for resource-constrained networks.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Model Checking as Static Analysis: Revisited.
Proceedings of the Integrated Formal Methods - 9th International Conference, 2012

A Calculus for Quality.
Proceedings of the Formal Aspects of Component Software, 9th International Symposium, 2012

Recursive Advice for Coordination.
Proceedings of the Coordination Models and Languages - 14th International Conference, 2012

2011
Modal abstractions of concurrent behavior.
ACM Trans. Comput. Log., 2011

CaPiTo: protocol stacks for services.
Formal Asp. Comput., 2011

Designing, Capturing and Validating History-Sensitive Security Policies for Distributed Systems.
Sci. Ann. Comp. Sci., 2011

The Logic of XACML - Extended
CoRR, 2011

A Stochastic Broadcast Pi-Calculus
Proceedings of the Proceedings Ninth Workshop on Quantitative Aspects of Programming Languages, 2011

Automata-Based CSL Model Checking
Logical Methods in Computer Science, 2011

A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks.
Comput. J., 2011

Reachability for Finite-State Process Algebras Using Static Analysis.
Proceedings of the Reachability Problems - 5th International Workshop, 2011

Controlling Modelling Artifacts.
Proceedings of the Eighth International Conference on Quantitative Evaluation of Systems, 2011

Resilience analysis of key update strategies for resource-constrained networks.
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011

Automata-Based CSL Model Checking.
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011

Galois Connections for Flow Algebras.
Proceedings of the Formal Techniques for Distributed Systems, 2011

The Logic of XACML.
Proceedings of the Formal Aspects of Component Software - 8th International Symposium, 2011

Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces.
Proceedings of the Coordination Models and Languages - 13th International Conference, 2011

From Explicit to Symbolic Types for Communication Protocols in CCS.
Proceedings of the Formal Modeling: Actors, Open Systems, Biological Systems, 2011

Analysing Protocol Stacks for Services.
Proceedings of the Rigorous Software Engineering for Service-Oriented Systems, 2011

2010
From Flow Logic to static type systems for coordination languages.
Sci. Comput. Program., 2010

Static analysis of topology-dependent broadcast networks.
Inf. Comput., 2010

Explicit Versus Symbolic Algorithms for Solving ALFP Constraints.
Electr. Notes Theor. Comput. Sci., 2010

History-sensitive versus future-sensitive approaches to security in distributed systems
Proceedings of the Proceedings Third Interaction and Concurrency Experience: Guaranteed Interaction, 2010

Probabilistic Aspects: Checking Security in an Imperfect World.
Proceedings of the Trustworthly Global Computing - 5th International Symposium, 2010

Model Checking Multivariate State Rewards.
Proceedings of the QEST 2010, 2010

The CaPiTo Approach to Protocol Validation - (Invited Talk).
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Model Checking Is Static Analysis of Modal Logic.
Proceedings of the Foundations of Software Science and Computational Structures, 2010

2009
A monotone framework for CCS.
Computer Languages, Systems & Structures, 2009

A secure key establishment protocol for zigbee wireless sensor networks.
Proceedings of the 24th International Symposium on Computer and Information Sciences, 2009

Advice from Belnap Policies.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

2008
Pathway analysis for BioAmbients.
J. Log. Algebr. Program., 2008

Modal Abstractions of Concurrent Behaviour.
Proceedings of the Static Analysis, 15th International Symposium, 2008

Relational Analysis of Correlation.
Proceedings of the Static Analysis, 15th International Symposium, 2008

From generic to specific: off-line optimization for a general constraint solver.
Proceedings of the Generative Programming and Component Engineering, 2008

Iterative Specialisation of Horn Clauses.
Proceedings of the Programming Languages and Systems, 2008

From Flow Logic to Static Type Systems for Coordination Languages.
Proceedings of the Coordination Models and Languages, 10th International Conference, 2008

Advice for Coordination.
Proceedings of the Coordination Models and Languages, 10th International Conference, 2008

Static Validation of Licence Conformance Policies.
Proceedings of the The Third International Conference on Availability, 2008

2007
Semantics with Applications: An Appetizer.
Undergraduate Topics in Computer Science, Springer, ISBN: 978-1-84628-692-6, 2007

What is a free name in a process algebra?
Inf. Process. Lett., 2007

Active Evaluation Contexts for Reaction Semantics.
Electr. Notes Theor. Comput. Sci., 2007

Control Flow Analysis for BioAmbients.
Electr. Notes Theor. Comput. Sci., 2007

Heuristics for Safety and Security Constraints.
Electr. Notes Theor. Comput. Sci., 2007

Cryptographic Pattern Matching.
Electr. Notes Theor. Comput. Sci., 2007

Relational Analysis for Delivery of Services.
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007

A Scalable Inclusion Constraint Solver Using Unification.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2007

A flow-sensitive analysis of privacy properties.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

Topology-Dependent Abstractions of Broadcast Networks.
Proceedings of the CONCUR 2007 - Concurrency Theory, 18th International Conference, 2007

2006
Locality-Based Security Policies.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

Where Can an Insider Attack?
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

Context Dependent Analysis of BioAmbients.
Proceedings of the Simulation and Verification of Dynamic Systems, 17.04. - 22.04.2006, 2006

Static Analysis of a Model of the LDL Degradation Pathway.
Proceedings of the Simulation and Verification of Dynamic Systems, 17.04. - 22.04.2006, 2006

06161 Working Groups' Report: The Challlenge of Combining Simulation and Verification.
Proceedings of the Simulation and Verification of Dynamic Systems, 17.04. - 22.04.2006, 2006

Data Flow Analysis for CCS.
Proceedings of the Program Analysis and Compilation, 2006

Types from Control Flow Analysis.
Proceedings of the Program Analysis and Compilation, 2006

Sandboxing in myKlaim.
Proceedings of the The First International Conference on Availability, 2006

2005
Static validation of security protocols.
Journal of Computer Security, 2005

Securing Statically-verified Communications Protocols Against Timing Attacks.
Electr. Notes Theor. Comput. Sci., 2005

Performance Evaluation of Security Protocols Specified in LySa.
Electr. Notes Theor. Comput. Sci., 2005

Information Flow Analysis for VHDL.
Proceedings of the Parallel Computing Technologies, 2005

On Evaluating the Performance of Security Protocols.
Proceedings of the Parallel Computing Technologies, 2005

2004
A calculus for control flow analysis of security protocols.
Int. J. Inf. Sec., 2004

The Succinct Solver Suite.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2004

Spatial Analysis of BioAmbients.
Proceedings of the Static Analysis, 11th International Symposium, 2004

2003
Abstract interpretation of mobile ambients.
Sci. Comput. Program., 2003

Automatic Validation of Protocol Narration.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

2002
Validating firewalls using flow logics.
Theor. Comput. Sci., 2002

A Succinct Solver for ALFP.
Nord. J. Comput., 2002

Flow logic for Dolev-Yao secrecy in cryptographic processes.
Future Generation Comp. Syst., 2002

Normalizable Horn Clauses, Strongly Recognizable Relations, and Spi.
Proceedings of the Static Analysis, 9th International Symposium, 2002

Security for Mobility.
Proceedings of the Foundations of Security Analysis and Design II, 2002

Automatic Complexity Analysis.
Proceedings of the Programming Languages and Systems, 2002

Flow Logic: A Multi-paradigmatic Approach to Static Analysis.
Proceedings of the Essence of Computation, Complexity, Analysis, 2002

2001
Succinct Solvers
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2001

Shape Analysis for Mobile Ambients.
Nord. J. Comput., 2001

Kleene's Logic with Equality.
Inf. Process. Lett., 2001

Static Analysis for the pi-Calculus with Applications to Security.
Inf. Comput., 2001

Cryptographic Analysis in Cubic Time.
Electr. Notes Theor. Comput. Sci., 2001

Static Analysis for Secrecy and Non-interference in Networks of Processes.
Proceedings of the Parallel Computing Technologies, 2001

Control-Flow Analysis in Cubic Time.
Proceedings of the Programming Languages and Systems, 2001

Security Analysis Using Flow Logics.
Current Trends in Theoretical Computer Science, 2001

2000
Security Analysis using Flow Logics.
Bulletin of the EATCS, 2000

Shape Analysis for Mobile Ambients.
Proceedings of the POPL 2000, 2000

A Kleene Analysis of Mobile Ambients.
Proceedings of the Programming Languages and Systems, 2000

1999
Abstract Interpretation of Mobile Ambients.
Proceedings of the Static Analysis, 6th International Symposium, 1999

Static Analysis of Processes for No and Read-Up nad No Write-Down.
Proceedings of the Foundations of Software Science and Computation Structure, 1999

Interprocedural Control Flow Analysis.
Proceedings of the Programming Languages and Systems, 1999

Validating Firewalls in Mobile Ambients.
Proceedings of the CONCUR '99: Concurrency Theory, 1999

Type and Effect Systems.
Proceedings of the Correct System Design, 1999

Principles of program analysis.
Springer, ISBN: 978-3-540-65410-0, 1999

Type and effect systems - behaviours for concurrency.
Imperial College Press, ISBN: 978-1-86094-154-2, 1999

1998
Behavior Analysis for Validating Communication Patterns.
STTT, 1998

Strictness and Totality Analysis.
Sci. Comput. Program., 1998

Flow Logic for Imperative Objects.
Proceedings of the Mathematical Foundations of Computer Science 1998, 1998

Behaviour Analysis and Safety Conditions: A Case Study in CML.
FASE, 1998

Control Flow Analysis for the pi-calculus.
Proceedings of the CONCUR '98: Concurrency Theory, 1998

Flow Logics for Constraint Based Analysis.
Proceedings of the Compiler Construction, 7th International Conference, 1998

1997
Perspectives on Program Analysis.
SIGPLAN Notices, 1997

Type and Behaviour Reconstruction for Higher-Order Concurrent Programs.
J. Funct. Program., 1997

Flow Logic and Operational Semantics.
Electr. Notes Theor. Comput. Sci., 1997

Infinitary Control Flow Analysis: a Collecting Semantics for Closure Analysis.
Proceedings of the Conference Record of POPL'97: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1997

Prescriptive Frameworks for Multi-Level Lambda-Calculi.
Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM '97), 1997

Systematic Realisation of Control Flow Analyses for CML.
Proceedings of the 1997 ACM SIGPLAN International Conference on Functional Programming (ICFP '97), 1997

1996
From CML to its Process Algebra.
Theor. Comput. Sci., 1996

Operational Semantics of Termination Types.
Nord. J. Comput., 1996

Perspectives on Program Analysis.
ACM Comput. Surv., 1996

Annotated Type and Effect Systems.
ACM Comput. Surv., 1996

Semantics-Directed Program Analysis: A Tool-Maker's Perspective.
Proceedings of the Static Analysis, Third International Symposium, 1996

Polymorphic Subtyping for Effect Analysis: The Algorithm.
Proceedings of the Analysis and Verification of Multiple-Agent Languages, 1996

Polymorphic Subtyping for Effect Analysis: The Static Semantics.
Proceedings of the Analysis and Verification of Multiple-Agent Languages, 1996

Logical and Operational Methods in the Analysis of Programs and Systems.
Proceedings of the Analysis and Verification of Multiple-Agent Languages, 1996

Polymorphic Subtyping for Effect Analysis: The Dynamic Semantics.
Proceedings of the Analysis and Verification of Multiple-Agent Languages, 1996

Multi-Level Lambda-Calculi: An Algebraic Description.
Proceedings of the Partial Evaluation, International Seminar, 1996

1995
Static and Dynamic Processor Allocation for Higher-Order Concurrent Languages.
Proceedings of the TAPSOFT'95: Theory and Practice of Software Development, 1995

1994
The Tensor Product in Wadler's Analysis of Lists.
Sci. Comput. Program., 1994

Higher-Order Concurrent Programs with Finite Communication Topology.
Proceedings of the Conference Record of POPL'94: 21st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1994

Constraints for Polymorphic Behaviours of Concurrent ML.
Proceedings of the Constraints in Computational Logics, First International Conference, 1994

1993
Finiteness Conditions for Strictness Analysis.
Proceedings of the Static Analysis, Third International Workshop, 1993

From CML to Process Algebras (Extended Abstract).
Proceedings of the CONCUR '93, 1993

1992
Bounded Fixed-Point Iteration.
J. Log. Comput., 1992

Forced transformation of Occam programs.
Information & Software Technology, 1992

Inference Systems for Binding Time Analysis.
Proceedings of the Actes WSA'92 Workshop on Static Analysis (Bordeaux), 1992

Layered Predicates.
Proceedings of the Sematics: Foundations and Applications, 1992

Bounded Fixed Point Iteration.
Proceedings of the Conference Record of the Nineteenth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1992

Finiteness Conditions for Fixed Point Iteration.
LISP and Functional Programming, 1992

The Tensor Product in Wadler's Analysis of Lists.
Proceedings of the ESOP '92, 1992

Semantics with applications - a formal introduction.
Wiley professional computing, Wiley, ISBN: 978-0-471-92980-2, 1992

1991
Using Transformations in the Implementations of Higher-Order Functions.
J. Funct. Program., 1991

1990
Functional Completeness of the Mixed lambda-Calculus and Combinatory Logic.
Theor. Comput. Sci., 1990

Context Information for Lazy Code Generation.
LISP and Functional Programming, 1990

Eureka Definitions for Free! or Disagreement Points for Fold/Unford Transformations.
Proceedings of the ESOP'90, 1990

1989
Two-Level Semantics and Abstract Interpretation.
Theor. Comput. Sci., 1989

The Typed lambda-Calculus with First-Class Processes.
Proceedings of the PARLE '89: Parallel Architectures and Languages Europe, 1989

Transformations on Higher-Order Functions.
Proceedings of the fourth international conference on Functional programming languages and computer architecture, 1989

1988
Strictness Analysis and Denotational Abstract Interpretation
Inf. Comput., January, 1988

Two-Level Semantics and Code Generation.
Theor. Comput. Sci., 1988

Automatic Binding Time Analysis for a Typed lambda-Calculus.
Sci. Comput. Program., 1988

Automatic Binding Time Analysis for a Typed Lambda-Calculus.
Proceedings of the Conference Record of the Fifteenth Annual ACM Symposium on Principles of Programming Languages, 1988

2-level lambda-lifting.
Proceedings of the ESOP '88, 1988

1987
Strictness Analysis and Denotational Abstract Interpretation.
Proceedings of the Conference Record of the Fourteenth Annual ACM Symposium on Principles of Programming Languages, 1987

1986
Abstract Interpretation of Denotational Definions (A Survey).
Proceedings of the STACS 86, 1986

Semantics Directed Compiling for Functional Languages.
LISP and Functional Programming, 1986

Pragmatic Aspects of Two-Level Denotational Meta-Languages.
Proceedings of the ESOP 86, 1986

Correctness of Code Generation from a Two-Level Meta-Language.
Proceedings of the ESOP 86, 1986

1985
Program Transformations in a Denotational Setting.
ACM Trans. Program. Lang. Syst., 1985

Code generation from two-level denotational meta-languages.
Proceedings of the Programs as Data Objects, 1985

Expected forms of data flow analyses.
Proceedings of the Programs as Data Objects, 1985

1984
Abstract interpretation using domain theory.
PhD thesis, 1984

1983
Strong Abstract Interpretation Using Power Domains (Extended Abstract).
Proceedings of the Automata, 1983

1982
A Denotational Framework for Data Flow Analysis.
Acta Inf., 1982


  Loading...