Ross Horne

Orcid: 0000-0003-0162-1901

Affiliations:
  • University of Luxembourg


According to our database1, Ross Horne authored at least 51 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
XACML2mCRL2: Automatic transformation of XACML policies into mCRL2 specifications.
Sci. Comput. Program., January, 2024

2023
When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied <i>π</i>-calculus.
Theor. Comput. Sci., May, 2023

Anomaly Detection Using Deep Learning Respecting the Resources on Board a CubeSat.
J. Aerosp. Inf. Syst., 2023

Assessing the Solid Protocol in Relation to Security and Privacy Obligations.
Inf., 2023

A Logical Account of Subtyping for Session Types.
Proceedings of the Proceedings 14th Workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software, 2023

Provably Unlinkable Smart Card-based Payments.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Theories of life and computation: Special issue on the occasion of the 65th birthday of Professor Gabriel Ciobanu.
Theor. Comput. Sci., 2022

An Analytic Propositional Proof System on Graphs.
Log. Methods Comput. Sci., 2022

Assessing the Solid Protocol in Relation to Security & Privacy Obligations.
CoRR, 2022

Bisimulations Respecting Duration and Causality for the Non-interleaving Applied π-Calculus.
Proceedings of the Proceedings Combined 29th International Workshop on Expressiveness in Concurrency and 19th Workshop on Structural Operational Semantics, 2022

A Graphical Proof Theory of Logical Time.
Proceedings of the 7th International Conference on Formal Structures for Computation and Deduction, 2022

Process Algebra Can Save Lives: Static Analysis of XACML Access Control Policies Using mCRL2.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2022

Is Eve nearby? Analysing protocols under the distant-attacker assumption.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

Diamonds for Security: A Non-Interleaving Operational Semantics for the Applied Pi-Calculus.
Proceedings of the 33rd International Conference on Concurrency Theory, 2022

2021
Discovering ePassport Vulnerabilities using Bisimilarity.
Log. Methods Comput. Sci., 2021

A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic.
Log. Methods Comput. Sci., 2021

Breaking and Fixing Unlinkability of the Key Agreement Protocol for 2nd Gen EMV Payments.
CoRR, 2021

Assuming Just Enough Fairness to make Session Types Complete for Lock-freedom.
Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science, 2021

Compositional Analysis of Protocol Equivalence in the Applied π-Calculus Using Quasi-open Bisimilarity.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2021, 2021

2020
Global types with internal delegation.
Theor. Comput. Sci., 2020

Logic Beyond Formulas: A Proof System on Graphs.
Proceedings of the LICS '20: 35th Annual ACM/IEEE Symposium on Logic in Computer Science, 2020

Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020

Session Subtyping and Multiparty Compatibility Using Circular Sequents.
Proceedings of the 31st International Conference on Concurrency Theory, 2020

2019
De Morgan Dual Nominal Quantifiers Modelling Private Names in Non-Commutative Logic.
ACM Trans. Comput. Log., 2019

Constructing weak simulations from linear implications for processes with private names.
Math. Struct. Comput. Sci., 2019

The Sub-Additives: A Proof Theory for Probabilistic Choice extending Linear Logic.
Proceedings of the 4th International Conference on Formal Structures for Computation and Deduction, 2019

Breaking Unlinkability of the ICAO 9303 Standard for e-Passports Using Bisimilarity.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
A Bisimilarity Congruence for the Applied pi-Calculus Sufficiently Coarse to Verify Privacy Properties.
CoRR, 2018

Quasi-Open Bisimilarity with Mismatch is Intuitionistic.
Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, 2018

The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement.
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018

2017
Semantics for Specialising Attack Trees based on Linear Logic.
Fundam. Informaticae, 2017

Generating Witness of Non-Bisimilarity for the pi-Calculus.
CoRR, 2017

A Characterisation of Open Bisimulation using an Intuitionistic Modal Logic.
CoRR, 2017

2016
A descriptive type foundation for RDF Schema.
J. Log. Algebraic Methods Program., 2016

Private Names in Non-Commutative Logic.
Proceedings of the 27th International Conference on Concurrency Theory, 2016

SPEC: An Equivalence Checker for Security Protocols.
Proceedings of the Programming Languages and Systems - 14th Asian Symposium, 2016

2015
Minimal type inference for Linked Data consumers.
J. Log. Algebraic Methods Program., 2015

The Consistency and Complexity of Multiplicative Additive System Virtual.
Sci. Ann. Comput. Sci., 2015

Behavioural Analysis of Sessions Using the Calculus of Structures.
Proceedings of the Perspectives of System Informatics, 2015

2014
A verified algebra for read-write Linked Data.
Sci. Comput. Program., 2014

Extracting Threshold Conceptual Structures from Web Documents.
Proceedings of the Graph-Based Representation and Reasoning, 2014

Descriptive Types for Linked Data Resources.
Proceedings of the Perspectives of System Informatics, 2014

2013
Local Type Checking for Linked Data Consumers.
Proceedings of the Proceedings 9th International Workshop on Automated Specification and Verification of Web Systems, 2013

Non-interleaving Operational Semantics for Geographically Replicated Databases.
Proceedings of the 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2013

Ensuring Faultless Communication Behaviour in A Commercial Cloud.
Proceedings of the Software Engineering and Formal Methods, 2013

2012
Tracing where and who provenance in Linked Data: A calculus.
Theor. Comput. Sci., 2012

A Provenance Tracking Model for Data Updates
Proceedings of the Proceedings 11th International Workshop on Foundations of Coordination Languages and Self Adaptation, 2012

2011
Programming languages and principles for read-write linked data.
PhD thesis, 2011

A Verified Algebra for Linked Data
Proceedings of the Proceedings 10th International Workshop on the Foundations of Coordination Languages and Software Architectures, 2011

Operational Semantics for SPARQL Update.
Proceedings of the Semantic Web - Joint International Semantic Technology Conference, 2011


  Loading...