Jorge Cuéllar

Orcid: 0000-0002-2364-359X

According to our database1, Jorge Cuéllar authored at least 47 papers between 1989 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021

Three Branches of Accountability.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
Ranking Secure Coding Guidelines for Software Developer Awareness Training in the Industry.
Proceedings of the First International Computer Programming Education Conference, 2020

Enforcing a Cross-Organizational Workflow: An Experience Report.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2020

2019
Guest Editorial Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures.
IEEE Internet Things J., 2019

2018
Securing Emergent IoT Applications.
Proceedings of the Engineering Trustworthy Software Systems - 4th International School, 2018

Securing the Integrity of Workflows in IoT.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018

Workflow-Aware Security of Integrated Mobility Services.
Proceedings of the Computer Security, 2018

2016
SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel Verification of Active and Resilient Systems: Practical or Utopian?
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016

Location Privacy in Wireless Sensor Networks.
CRC Press / Taylor & Francis, ISBN: 9781498776332, 2016

2015
Probabilistic receiver-location privacy protection in wireless sensor networks.
Inf. Sci., 2015

Idea: Unwinding Based Model-Checking and Testing for Non-Interference on EFSMs.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

2014
Guest editorial to the Special Issue on Component-Based Software Engineering and Software Architecture.
Sci. Comput. Program., 2014

Preserving Receiver-Location Privacy in Wireless Sensor Networks.
Proceedings of the Information Security Practice and Experience, 2014

2013
Geolocation Policy: A Document Format for Expressing Privacy Preferences for Location Information.
RFC, January, 2013

Toward a Statistical Framework for Source Anonymity in Sensor Networks.
IEEE Trans. Mob. Comput., 2013

An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations.
Comput. Secur., 2013

Location Privacy in WSNs: Solutions, Challenges, and Future Trends.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

2012
Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification.
IEEE Trans. Parallel Distributed Syst., 2012

Preface.
J. Comput. Secur., 2012

Non-interference on UML State-Charts.
Proceedings of the Objects, Models, Components, Patterns - 50th International Conference, 2012

The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

Indistinguishable regions in geographic privacy.
Proceedings of the ACM Symposium on Applied Computing, 2012

Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

2010
Statistical Framework for Source Anonymity in Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2008
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008

2007
Common Policy: A Document Format for Expressing Privacy Preferences.
RFC, February, 2007

SoSyM Special Section on Software Engineering and Formal Methods.
Softw. Syst. Model., 2007

Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety.
Proceedings of the Computer Safety, 2007

2006
Automated Reasoning for Security Protocol Analysis.
J. Autom. Reason., 2006

Designing and Verifying Core Protocols for Location Privacy.
Proceedings of the Information Security, 9th International Conference, 2006

2005
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005

2004
Geopriv Requirements.
RFC, February, 2004

2000
Foreword.
Sci. Comput. Program., 2000

1998
Software Engineering Education: Rôles of Formal Specification and Design Calculi.
Ann. Softw. Eng., 1998

Formal Methods in an Industrial Environment.
Proceedings of the Computer Aided Verification, 10th International Conference, 1998

1996
Rapid Prototyping for an Assertional Specification language.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1996

1995
Development of Safety-Critical Real-Time Systems.
Proceedings of the SOFSEM '95, 22nd Seminar on Current Trends in Theory and Practice of Informatics, Milovy, Czech Republic, November 23, 1995

Proceedings of the Formal Development of Reactive Systems - Case Study Production Cell, 1995

The Real-Time Behavior of the Steam Boiler.
Proceedings of the Formal Methods for Industrial Applications, 1995

The Steam-Boiler Problem - A TLT Solution.
Proceedings of the Formal Methods for Industrial Applications, 1995

1994
Combining the Design of Industrial Systems with Effective Verification Techniques.
Proceedings of the FME '94: Industrial Benefit of Formal Methods, 1994

A Solution Relying on the Model Checking of Boolean Transition Systems.
Proceedings of the Formal Systems Specification, 1994

1993
Neural Discriminant Analysis.
Proceedings of the Algorithmic Learning Theory, 4th International Workshop, 1993

1992
The Performance of an Expanded Storage System for High Volume Transaction Processing.
Proceedings of the Eurosim 1992, Simulation Congress, Proceedings of the 1992 EUROSIM Conference, Capri, Italy, September 28, 1992

1989
Lockperformance in Betriebssystemen.
Proceedings of the Messung, 1989


  Loading...