Hanne Riis Nielson

According to our database1, Hanne Riis Nielson
  • authored at least 188 papers between 1981 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
Effect-driven QuickChecking of compilers.
PACMPL, 2017

Content dependent information flow control.
J. Log. Algebr. Meth. Program., 2017

Atomistic Galois insertions for flow sensitive integrity.
Computer Languages, Systems & Structures, 2017

Modelling and Verifying Communication Failure of Hybrid Systems in HCSP.
Comput. J., 2017

Time Dependent Policy-Based Access Control.
Proceedings of the 24th International Symposium on Temporal Representation and Reasoning, 2017

Information Flow for Timed Automata.
Proceedings of the Models, Algorithms, Logics and Tools, 2017

2016
Discovering, quantifying, and displaying attacks.
Logical Methods in Computer Science, 2016

A Theory of Available-by-Design Communicating Systems.
CoRR, 2016

A Coordination Language for Databases.
Logical Methods in Computer Science, 2016

A Parametric Abstract Domain for Lattice-Valued Regular Expressions.
Proceedings of the Static Analysis - 23rd International Symposium, 2016

Iterated process analysis over lattice-valued regular expressions.
Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, 2016

Towards Static Analysis of Policy-Based Self-adaptive Computing Systems.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, 2016

Enforcing Availability in Failure-Aware Communicating Systems.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2016

2015
A calculus of quality for robustness against unreliable communication.
J. Log. Algebr. Meth. Program., 2015

Disjunctive Information Flow for Communicating Processes.
Proceedings of the Trustworthy Global Computing - 10th International Symposium, 2015

A SAT-Based Analysis of a Calculus for Wireless Sensor Networks.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

How to Trust the Re-use of Data.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Factorization of Behavioral Integrity.
Proceedings of the Computer Security - ESORICS 2015, 2015

Set-Pi: Set Membership p-Calculus.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Klaim-DB: A Modeling Language for Distributed Database Applications.
Proceedings of the Coordination Models and Languages, 2015

Stochastic Model Checking of the Stochastic Quality Calculus.
Proceedings of the Software, 2015

Hoare Logic for Disjunctive Information Flow.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

Discretionary Information Flow Control for Interaction-Oriented Specifications.
Proceedings of the Logic, Rewriting, and Concurrency, 2015

2014
Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study.
STTT, 2014

The logic of XACML.
Sci. Comput. Program., 2014

A Framework for Hybrid Systems with Denial-of-Service Security Attack.
CoRR, 2014

Trust-Based Enforcement of Security Policies.
Proceedings of the Trustworthy Global Computing - 9th International Symposium, 2014

Formal Security Analysis of the MaCAN Protocol.
Proceedings of the Integrated Formal Methods - 11th International Conference, 2014

Denial-of-Service Security Attack in the Continuous-Time World.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2014

Uniform Protection for Multi-exposed Targets.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2014

Automated Generation of Attack Trees.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

The Stochastic Quality Calculus.
Proceedings of the Coordination Models and Languages, 2014

2013
Predictive access control for distributed computation.
Sci. Comput. Program., 2013

Design-Efficiency in Security
CoRR, 2013

Pushdown Systems for Monotone Frameworks.
CoRR, 2013

Lazy Mobile Intruders.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Broadcast, Denial-of-Service, and Secure Communication.
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013

Probabilistic Analysis of the Quality Calculus.
Proceedings of the Formal Techniques for Distributed Systems, 2013

ICT-powered Health Care Processes - (Position Paper).
Proceedings of the Foundations of Health Information Engineering and Systems, 2013

Safety versus Security in the Quality Calculus.
Proceedings of the Theories of Programming and Formal Methods, 2013

2012
Flow Logic for Process Calculi.
ACM Comput. Surv., 2012

Lattice based Least Fixed Point Logic
CoRR, 2012

XACML 3.0 in Answer Set Programming
CoRR, 2012

Optimizing ZigBee Security using Stochastic Model Checking
CoRR, 2012

Modelling Chinese Smart Grid: A Stochastic Model Checking Case Study
CoRR, 2012

Layered Fixed Point Logic
CoRR, 2012

Secondary use of data in EHR systems
CoRR, 2012

Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

Layered fixed point logic.
Proceedings of the Principles and Practice of Declarative Programming, 2012

XACML 3.0 in Answer Set Programming.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2012

LBTool: A stochastic toolkit for leave-based key updates.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Key Update Assistant for resource-constrained networks.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Model Checking as Static Analysis: Revisited.
Proceedings of the Integrated Formal Methods - 9th International Conference, 2012

A Calculus for Quality.
Proceedings of the Formal Aspects of Component Software, 9th International Symposium, 2012

Recursive Advice for Coordination.
Proceedings of the Coordination Models and Languages - 14th International Conference, 2012

2011
Modal abstractions of concurrent behavior.
ACM Trans. Comput. Log., 2011

CaPiTo: protocol stacks for services.
Formal Asp. Comput., 2011

Designing, Capturing and Validating History-Sensitive Security Policies for Distributed Systems.
Sci. Ann. Comp. Sci., 2011

The Logic of XACML - Extended
CoRR, 2011

A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks.
Comput. J., 2011

Controlling Modelling Artifacts.
Proceedings of the Eighth International Conference on Quantitative Evaluation of Systems, 2011

Resilience analysis of key update strategies for resource-constrained networks.
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011

Galois Connections for Flow Algebras.
Proceedings of the Formal Techniques for Distributed Systems, 2011

The Logic of XACML.
Proceedings of the Formal Aspects of Component Software - 8th International Symposium, 2011

Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces.
Proceedings of the Coordination Models and Languages - 13th International Conference, 2011

From Explicit to Symbolic Types for Communication Protocols in CCS.
Proceedings of the Formal Modeling: Actors, Open Systems, Biological Systems, 2011

Analysing Protocol Stacks for Services.
Proceedings of the Rigorous Software Engineering for Service-Oriented Systems, 2011

2010
From Flow Logic to static type systems for coordination languages.
Sci. Comput. Program., 2010

Static analysis of topology-dependent broadcast networks.
Inf. Comput., 2010

Explicit Versus Symbolic Algorithms for Solving ALFP Constraints.
Electr. Notes Theor. Comput. Sci., 2010

Probabilistic Aspects: Checking Security in an Imperfect World.
Proceedings of the Trustworthly Global Computing - 5th International Symposium, 2010

Model Checking Multivariate State Rewards.
Proceedings of the QEST 2010, 2010

The CaPiTo Approach to Protocol Validation - (Invited Talk).
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Model Checking Is Static Analysis of Modal Logic.
Proceedings of the Foundations of Software Science and Computational Structures, 2010

2009
A monotone framework for CCS.
Computer Languages, Systems & Structures, 2009

A secure key establishment protocol for zigbee wireless sensor networks.
Proceedings of the 24th International Symposium on Computer and Information Sciences, 2009

Advice from Belnap Policies.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

2008
Pathway analysis for BioAmbients.
J. Log. Algebr. Program., 2008

Modal Abstractions of Concurrent Behaviour.
Proceedings of the Static Analysis, 15th International Symposium, 2008

Relational Analysis of Correlation.
Proceedings of the Static Analysis, 15th International Symposium, 2008

Iterative Specialisation of Horn Clauses.
Proceedings of the Programming Languages and Systems, 2008

08161 Abstracts Collection - Scalable Program Analysis.
Proceedings of the Scalable Program Analysis, 13.04. - 18.04.2008, 2008

From Flow Logic to Static Type Systems for Coordination Languages.
Proceedings of the Coordination Models and Languages, 10th International Conference, 2008

Advice for Coordination.
Proceedings of the Coordination Models and Languages, 10th International Conference, 2008

Static Validation of Licence Conformance Policies.
Proceedings of the The Third International Conference on Availability, 2008

2007
Semantics with Applications: An Appetizer.
Undergraduate Topics in Computer Science, Springer, ISBN: 978-1-84628-692-6, 2007

What is a free name in a process algebra?
Inf. Process. Lett., 2007

Active Evaluation Contexts for Reaction Semantics.
Electr. Notes Theor. Comput. Sci., 2007

Control Flow Analysis for BioAmbients.
Electr. Notes Theor. Comput. Sci., 2007

Heuristics for Safety and Security Constraints.
Electr. Notes Theor. Comput. Sci., 2007

Cryptographic Pattern Matching.
Electr. Notes Theor. Comput. Sci., 2007

Relational Analysis for Delivery of Services.
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007

A flow-sensitive analysis of privacy properties.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

Topology-Dependent Abstractions of Broadcast Networks.
Proceedings of the CONCUR 2007 - Concurrency Theory, 18th International Conference, 2007

A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols.
Proceedings of the Advances in Computer Science, 2007

2006
Static Analysis for Blinding.
Nord. J. Comput., 2006

Context Dependent Analysis of BioAmbients.
Proceedings of the Simulation and Verification of Dynamic Systems, 17.04. - 22.04.2006, 2006

Static Analysis of a Model of the LDL Degradation Pathway.
Proceedings of the Simulation and Verification of Dynamic Systems, 17.04. - 22.04.2006, 2006

06161 Executive Summary -- Simulation and Verification of Dynamic Systems.
Proceedings of the Simulation and Verification of Dynamic Systems, 17.04. - 22.04.2006, 2006

06161 Abstracts Collection -- Simulation and Verification of Dynamic Systems.
Proceedings of the Simulation and Verification of Dynamic Systems, 17.04. - 22.04.2006, 2006

Data Flow Analysis for CCS.
Proceedings of the Program Analysis and Compilation, 2006

Types from Control Flow Analysis.
Proceedings of the Program Analysis and Compilation, 2006

Analyzing Security Protocols in Hierarchical Networks.
Proceedings of the Automated Technology for Verification and Analysis, 2006

Analysis of LYSA-calculus with explicit confidentiality annotations.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Static validation of security protocols.
Journal of Computer Security, 2005

Static Validation of a Voting Protocol.
Electr. Notes Theor. Comput. Sci., 2005

Performance Evaluation of Security Protocols Specified in LySa.
Electr. Notes Theor. Comput. Sci., 2005

Using static analysis to validate the SAML single sign-on protocol.
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005

Information Flow Analysis for VHDL.
Proceedings of the Parallel Computing Technologies, 2005

On Evaluating the Performance of Security Protocols.
Proceedings of the Parallel Computing Technologies, 2005

2004
A calculus for control flow analysis of security protocols.
Int. J. Inf. Sec., 2004

The Succinct Solver Suite.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2004

Spatial Analysis of BioAmbients.
Proceedings of the Static Analysis, 11th International Symposium, 2004

2003
Abstract interpretation of mobile ambients.
Sci. Comput. Program., 2003

Automatic Validation of Protocol Narration.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

2002
Validating firewalls using flow logics.
Theor. Comput. Sci., 2002

A Succinct Solver for ALFP.
Nord. J. Comput., 2002

Flow logic for Dolev-Yao secrecy in cryptographic processes.
Future Generation Comp. Syst., 2002

Normalizable Horn Clauses, Strongly Recognizable Relations, and Spi.
Proceedings of the Static Analysis, 9th International Symposium, 2002

Security for Mobility.
Proceedings of the Foundations of Security Analysis and Design II, 2002

Automatic Complexity Analysis.
Proceedings of the Programming Languages and Systems, 2002

Flow Logic: A Multi-paradigmatic Approach to Static Analysis.
Proceedings of the Essence of Computation, Complexity, Analysis, 2002

2001
Shape Analysis for Mobile Ambients.
Nord. J. Comput., 2001

Kleene's Logic with Equality.
Inf. Process. Lett., 2001

Static Analysis for the pi-Calculus with Applications to Security.
Inf. Comput., 2001

Cryptographic Analysis in Cubic Time.
Electr. Notes Theor. Comput. Sci., 2001

Static Analysis for Secrecy and Non-interference in Networks of Processes.
Proceedings of the Parallel Computing Technologies, 2001

Security Analysis Using Flow Logics.
Current Trends in Theoretical Computer Science, 2001

2000
Security Analysis using Flow Logics.
Bulletin of the EATCS, 2000

Shape Analysis for Mobile Ambients.
Proceedings of the POPL 2000, 2000

A Kleene Analysis of Mobile Ambients.
Proceedings of the Programming Languages and Systems, 2000

1999
Abstract Interpretation of Mobile Ambients.
Proceedings of the Static Analysis, 6th International Symposium, 1999

Static Analysis of Processes for No and Read-Up nad No Write-Down.
Proceedings of the Foundations of Software Science and Computation Structure, 1999

Interprocedural Control Flow Analysis.
Proceedings of the Programming Languages and Systems, 1999

Validating Firewalls in Mobile Ambients.
Proceedings of the CONCUR '99: Concurrency Theory, 1999

Type and Effect Systems.
Proceedings of the Correct System Design, 1999

Principles of program analysis.
Springer, ISBN: 978-3-540-65410-0, 1999

Type and effect systems - behaviours for concurrency.
Imperial College Press, ISBN: 978-1-86094-154-2, 1999

1998
Behavior Analysis for Validating Communication Patterns.
STTT, 1998

Strictness and Totality Analysis.
Sci. Comput. Program., 1998

Flow Logic for Imperative Objects.
Proceedings of the Mathematical Foundations of Computer Science 1998, 1998

Behaviour Analysis and Safety Conditions: A Case Study in CML.
FASE, 1998

Control Flow Analysis for the pi-calculus.
Proceedings of the CONCUR '98: Concurrency Theory, 1998

Flow Logics for Constraint Based Analysis.
Proceedings of the Compiler Construction, 7th International Conference, 1998

1997
Position Statements on Strategic Directions for Research on Programming Languages.
SIGPLAN Notices, 1997

Type and Behaviour Reconstruction for Higher-Order Concurrent Programs.
J. Funct. Program., 1997

Flow Logic and Operational Semantics.
Electr. Notes Theor. Comput. Sci., 1997

Infinitary Control Flow Analysis: a Collecting Semantics for Closure Analysis.
Proceedings of the Conference Record of POPL'97: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1997

Prescriptive Frameworks for Multi-Level Lambda-Calculi.
Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM '97), 1997

Systematic Realisation of Control Flow Analyses for CML.
Proceedings of the 1997 ACM SIGPLAN International Conference on Functional Programming (ICFP '97), 1997

1996
From CML to its Process Algebra.
Theor. Comput. Sci., 1996

Operational Semantics of Termination Types.
Nord. J. Comput., 1996

Strategic Directions in Research on Programming Languages.
ACM Comput. Surv., 1996

Computing Surveys Symposium on Models of Programming Languages and Compuation.
ACM Comput. Surv., 1996

Polymorphic Subtyping for Effect Analysis: The Algorithm.
Proceedings of the Analysis and Verification of Multiple-Agent Languages, 1996

Polymorphic Subtyping for Effect Analysis: The Static Semantics.
Proceedings of the Analysis and Verification of Multiple-Agent Languages, 1996

Polymorphic Subtyping for Effect Analysis: The Dynamic Semantics.
Proceedings of the Analysis and Verification of Multiple-Agent Languages, 1996

Multi-Level Lambda-Calculi: An Algebraic Description.
Proceedings of the Partial Evaluation, International Seminar, 1996

1995
Static and Dynamic Processor Allocation for Higher-Order Concurrent Languages.
Proceedings of the TAPSOFT'95: Theory and Practice of Software Development, 1995

1994
The Tensor Product in Wadler's Analysis of Lists.
Sci. Comput. Program., 1994

Higher-Order Concurrent Programs with Finite Communication Topology.
Proceedings of the Conference Record of POPL'94: 21st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1994

Constraints for Polymorphic Behaviours of Concurrent ML.
Proceedings of the Constraints in Computational Logics, First International Conference, 1994

1993
Finiteness Conditions for Strictness Analysis.
Proceedings of the Static Analysis, Third International Workshop, 1993

From CML to Process Algebras (Extended Abstract).
Proceedings of the CONCUR '93, 1993

1992
Bounded Fixed-Point Iteration.
J. Log. Comput., 1992

Forced transformation of Occam programs.
Information & Software Technology, 1992

Inference Systems for Binding Time Analysis.
Proceedings of the Actes WSA'92 Workshop on Static Analysis (Bordeaux), 1992

Layered Predicates.
Proceedings of the Sematics: Foundations and Applications, 1992

Bounded Fixed Point Iteration.
Proceedings of the Conference Record of the Nineteenth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1992

Finiteness Conditions for Fixed Point Iteration.
LISP and Functional Programming, 1992

The Tensor Product in Wadler's Analysis of Lists.
Proceedings of the ESOP '92, 1992

Semantics with applications - a formal introduction.
Wiley professional computing, Wiley, ISBN: 978-0-471-92980-2, 1992

1991
Using Transformations in the Implementations of Higher-Order Functions.
J. Funct. Program., 1991

1990
Functional Completeness of the Mixed lambda-Calculus and Combinatory Logic.
Theor. Comput. Sci., 1990

Context Information for Lazy Code Generation.
LISP and Functional Programming, 1990

Eureka Definitions for Free! or Disagreement Points for Fold/Unford Transformations.
Proceedings of the ESOP'90, 1990

1989
Transformations on Higher-Order Functions.
Proceedings of the fourth international conference on Functional programming languages and computer architecture, 1989

1988
Two-Level Semantics and Code Generation.
Theor. Comput. Sci., 1988

Automatic Binding Time Analysis for a Typed lambda-Calculus.
Sci. Comput. Program., 1988

Automatic Binding Time Analysis for a Typed Lambda-Calculus.
Proceedings of the Conference Record of the Fifteenth Annual ACM Symposium on Principles of Programming Languages, 1988

2-level lambda-lifting.
Proceedings of the ESOP '88, 1988

1987
A Hoare-Like Proof System for Analysing the Computation Time of Programs.
Sci. Comput. Program., 1987

1986
Semantics Directed Compiling for Functional Languages.
LISP and Functional Programming, 1986

Pragmatic Aspects of Two-Level Denotational Meta-Languages.
Proceedings of the ESOP 86, 1986

1985
Code generation from two-level denotational meta-languages.
Proceedings of the Programs as Data Objects, 1985

1984
Hoare logic's for run-time analysis of programs.
PhD thesis, 1984

1983
Computation Sequences: A Way to Characterize Classes of Attribute Grammars.
Acta Inf., 1983

1981
k-visit Attribute Grammars.
Mathematical Systems Theory, 1981


  Loading...