Michael Huth
According to our database^{1},
Michael Huth
authored at least 114 papers
between 1991 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Online presence:

on orcid.org

on doc.ic.ac.uk

on dl.acm.org
On csauthors.net:
Bibliography
2020
Protecting Private Inputs: Bounded Distortion Guarantees With Randomised Approximations.
Proc. Priv. Enhancing Technol., 2020
CoRR, 2020
Effective Detection of Credential Thefts from Windows Memory: Learning Access Behaviours to Local Security Authority Subsystem Service.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
2019
Proceedings of the Computing and Software Science  State of the Art and Perspectives, 2019
IEEE Trans. Inf. Theory, 2019
A reference architecture for integrating the Industrial Internet of Things in the Industry 4.0.
CoRR, 2019
Pseudonym Management Through Blockchain: CostEfficient Privacy Preservation on Intelligent Transportation Systems.
IEEE Access, 2019
OwnerCentric Sharing of Physical Resources, Data, and DataDriven Insights in Digital Ecosystems.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Decision Support for Smart Grid: Using Reasoning to Contextualize Complex Decision Making.
Proceedings of the 7th Workshop on Modeling and Simulation of CyberPhysical Energy Systems, 2019
2018
J. Inf. Technol., 2018
CoRR, 2018
CoRR, 2018
Comput. Ind., 2018
Comput. Chem. Eng., 2018
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018
Proceedings of the Business Information Systems Workshops, 2018
Proceedings of the Models, Mindsets, 2018
Springer, ISBN: 9783319683966, 2018
2017
Manyopt: An Extensible Tool for Mixed, NonLinear Optimization Through SMT Solving.
CoRR, 2017
CoRR, 2017
Proceedings of the Principles of Security and Trust  6th International Conference, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
Proceedings of the Models, Algorithms, Logics and Tools, 2017
2016
CoRR, 2016
Proceedings of the Seventh International Symposium on Games, 2016
Proceedings of the Semantics, Logics, and Calculi, 2016
2015
Inf. Comput., 2015
Confidence Analysis for Nuclear Arms Control: SMT Abstractions of Bayesian Belief Networks.
Proceedings of the Computer Security  ESORICS 2015, 2015
2014
Authorized workflow schemas: deciding realizability through $$\mathsf{LTL }(\mathsf{F })$$ model checking.
Int. J. Softw. Tools Technol. Transf., 2014
CoRR, 2014
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
2013
Dagstuhl Reports, 2013
Proceedings of the Proceedings Fourth International Symposium on Games, 2013
Proceedings of the Trust and Trustworthy Computing  6th International Conference, 2013
Towards Usable Generation and Enforcement of Trust Evidence from Programmers' Intent.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
Proceedings of the Foundations of Software Science and Computation Structures, 2013
2012
Perform. Evaluation, 2012
Relationshipbased access control: its expression and enforcement through hybrid logic.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Authorization Enforcement in Workflows: Maintaining Realizability Via Automated Reasoning.
Proceedings of the Third Workshop on Practical Aspects of Automated Reasoning, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Access control via belnap logic: Intuitive, expressive, and analyzable policy composition.
ACM Trans. Inf. Syst. Secur., 2011
Perform. Evaluation, 2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Proceedings of the Hardware and Software: Verification and Testing, 2011
Proceedings of the Hardware and Software: Verification and Testing, 2011
On the Modeling and Verification of SecurityAware and ProcessAware Information Systems.
Proceedings of the Business Process Management Workshops, 2011
2010
Proceedings of the Insider Threats in Cyber Security, 2010
Sensors, 2010
PCTL model checking of Markov chains: Truth and falsity as winning strategies in games.
Perform. Evaluation, 2010
Math. Struct. Comput. Sci., 2010
A Framework for the Modular Specification and Orchestration of Authorization Policies.
Proceedings of the Information Security Technology for Applications, 2010
Proceedings of the Computer Security, 2010
2009
Special section on advances in reachability analysis and decision procedures: contributions to abstractionbased system verification.
Int. J. Softw. Tools Technol. Transf., 2009
Electron. Notes Theor. Comput. Sci., 2009
Electron. Notes Theor. Comput. Sci., 2009
Electron. Notes Theor. Comput. Sci., 2009
A workbench for preprocessor design and evaluation: toward benchmarks for parity games.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2009
ThreeValued Abstractions of Markov Chains: Completeness for a Sizeable Fragment of PCTL.
Proceedings of the Fundamentals of Computation Theory, 17th International Symposium, 2009
2008
Theor. Comput. Sci., 2008
Electron. Notes Theor. Comput. Sci., 2008
Proceedings of the 15th Workshop on Expressiveness in Concurrency, 2008
20 Years of Modal and Mixed Specifications.
Bull. EATCS, 2008
Proceedings of the Verification, 2008
Proceedings of the Fifth International Conference on the Quantitative Evaluaiton of Systems (QEST 2008), 2008
Proceedings of the Foundations of Software Science and Computational Structures, 2008
AccessControl Policies via Belnap Logic: Effective and Efficient Composition and Analysis.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
2007
Int. J. Softw. Tools Technol. Transf., 2007
Proceedings of the Verification, 2007
A simple and expressive semantic framework for policy composition in access control.
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007
Proceedings of the Computer Aided Verification, 19th International Conference, 2007
2006
Electron. Notes Theor. Comput. Sci., 2006
Efficient Patterns for Model Checking Partial State Spaces in CTL <i>intersection</i> LTL.
Proceedings of the 22nd Annual Conference on Mathematical Foundations of Programming Semantics, 2006
Ranked Predicate Abstraction for Branching Time: Complete, Incremental, and Precise.
Proceedings of the Automated Technology for Verification and Analysis, 2006
2005
Theor. Comput. Sci., 2005
Log. Methods Comput. Sci., 2005
Formal Aspects Comput., 2005
Electron. Notes Theor. Comput. Sci., 2005
Electron. Notes Theor. Comput. Sci., 2005
Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics, 2005
Model Checking Vs. Generalized Model Checking: Semantic Minimizations for Temporal Logics.
Proceedings of the 20th IEEE Symposium on Logic in Computer Science (LICS 2005), 2005
2004
ACM SIGCSE Bull., 2004
Math. Struct. Comput. Sci., 2004
Electron. Notes Theor. Comput. Sci., 2004
Proceedings of the Validation of Stochastic Systems  A Guide to Current Research, 2004
Proceedings of the 19th IEEE Symposium on Logic in Computer Science (LICS 2004), 2004
Logic in computer science  modelling and reasoning about systems (2. ed.).
Cambridge University Press, 2004
2002
Proceedings of the Verification, 2002
Proceedings of the Process Algebra and Probabilistic Methods, 2002
2001
A Comment on the Shape of the Solution Set for Systems of Interval Linear Equations with Dependent Coefficients.
Reliab. Comput., 2001
Proceedings of the Seventeenth Conference on the Mathematical Foundations of Programming Semantics, 2001
Proceedings of the Programming Languages and Systems, 2001
Proceedings of the CONCUR 2001, 2001
Secure communicating systems  design, analysis, and implementation.
Cambridge University Press, ISBN: 9780521807319, 2001
2000
Math. Struct. Comput. Sci., 2000
Logic in computer science  modelling and reasoning about systems.
Cambridge University Press, ISBN: 9780521656023, 2000
1999
Electron. Notes Theor. Comput. Sci., 1999
Appl. Categorical Struct., 1999
Proceedings of the Theoretical and Practical Aspects of SPIN Model Checking, 1999
A Unifying Framework for Model Checking Labeled Kripke Structures, Modal Transition Systems and Interval Transition Systems.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1999
1998
Electron. Notes Theor. Comput. Sci., 1998
Comparing CTL and PCTL on labeled Markov chains.
Proceedings of the Programming Concepts and Methods, 1998
1997
Proceedings of the Thirteenth Annual Conference on Mathematical Foundations of Progamming Semantics, 1997
Proceedings of the Proceedings, 12th Annual IEEE Symposium on Logic in Computer Science, Warsaw, Poland, June 29, 1997
Proceedings of the Computer Science Logic, 11th International Workshop, 1997
1995
Inf. Comput., January, 1995
1994
Theor. Comput. Sci., 1994
Proceedings of the Ninth Annual Symposium on Logic in Computer Science (LICS '94), 1994
Interaction Orders as Games.
Proceedings of the Proceedings for the Second Imperial College Department of Computing Workshop on Theory and Formal Methods, 1994
1993
Proceedings of the Mathematical Foundations of Programming Semantics, 1993
On the Equivalence of StateTransition Systems.
Proceedings of the Theory and Formal Methods 1993, 1993
1991
Proceedings of the Mathematical Foundations of Programming Semantics, 1991