ResearchPublicationsFormal Methods for Trustworthy Systems

Formal Methods for Trustworthy Systems

  1. Using architecture to reason about information security. S. Chong and R. van der Meyden, ACM Transactions on Information and System Security. Volume 18 Issue 2, December 2015.
  2. What, indeed, is intransitive noninterference?, R. van der Meyden, Journal of Computer Security 23(2): 197-228, 2015. (An earlier version appears in Proc. European Symposium on Research in Computer Security, Sept 2007.)
  3. Information Flow in Systems with Schedulers (Part II:Refinement) , R. van der Meyden, C. Zhang, Theoretical Computer Science, Vol 484, pp. 70-92, 2013.
  4. Information Flow in Systems with Schedulers (Part I:Definitions) , R. van der Meyden, C. Zhang, Theoretical Computer Science, Vol. 467, Jan 2013, pp. 68-88. (An earlier version of this papers appeared in IEEE Symposium on Computer Security Foundations, 2008).
  5. Architectural refinement and notions of intransitive noninterference, R. van der Meyden, Formal Aspects of Computing, 24(4-6): 769-792, 2012.
  6. Intransitive Noninterference in Nondeterministic Systems, K. Engelhardt, R. van der Meyden and C. Zhang, ACM CCS, pp. 869-880, 2012.
  7. Abstraction for Epistemic Model Checking of Dining-Cryptographers based Protocols, O. Al-Bataineh and R. van der Meyden, Proc. 13th Conf. on Theoretical Aspects of Knowledge and Rationality, TARK 2011, Gronigen, Jul 2011, pp. 247-256.
  8. The Complexity of Intransitive Noninterference, S. Eggert, R. van der Meyden, H. Schnoor, T. Wilke, IEEE Symp. on Security & Privacy, Oakland, May 2011.
  9. Symbolic Model Checking of Probabilistic Knowledge, X. Huang, C. Luo and R. van der Meyden, Proc. 13th Conf. on Theoretical Aspects of Knowledge and Rationality, TARK 2011, Gronigen, Jul 2011, pp. 177-186.
  10. Epistemic Model Checking for Knowledge-Based Program Implementation: an Application to Anonymous Broadcast, O. Al-Bataineh and R. van der Meyden, SecureComm'10, 6th International ICST Conference on Security and Privacy in Communication Networks, Singapore, Sept 7-9 2010.
  11. A Comparison of Semantic Models for Noninterference, R. van der Meyden and C. Zhang, Theoretical Computer Science, Vol. 411, Issue 47, Oct 2010, pp. 4123-4147.
  12. The Complexity of Synchronous Notions of Information Flow Security, F. Cassez, R. van der Meyden and C. Zhang, FoSSaCS 2010, 13th International Conference on Foundations of Software Science and Computation Structures, March 20 - 28, 2010, Paphos, Cyprus.
  13. Deriving Epistemic Conclusions from Agent Architecture, S. Chong and R. van der Meyden, Theoretical Aspects of Rationality and Knowledge, TARK 2009, pp 61-70.
  14. Architectural refinement and notions of intransitive noninterference, R. van der Meyden, Formal Aspects of Computing. (An earlier version of this paper appeared in International Symposium on Engineering Secure Software and Systems, 2009)
  15. Access Control and Information Flow in Transactional Memory, A. Cohen, R. van der Meyden and L. Zuck, Workshop on Formal Aspects of Security and Trust, Malaga, Spain, Oct 9-10, 2008, Spinger LNCS No. 5491, pp. 316-330, 2009.
  16. On notions of causality and distributed knowledge, R. van der Meyden, KR 2008: Eleventh International Conference on Principles of Knowledge Representation and Reasoning, Sydney, Australia, September 16-19, 2008, pp. 209-219.
  17. Two applications of epistemic logic in computer security, R. van der Meyden, in Logic at the Crossroads, A Gupta et al (eds), Allied Publishers, New Delhi, 2007, pp. 207-222.
  18. Preservation of Epistemic Properties in Security Protocol Implementations, R. van der Meyden and T. Wilke, in Proc. Conf on Theoretical Aspects of Rationality and Knowledge, Brussels, July 2007.
  19. Algorithmic Verification of Noninterference Properties, R. van der Meyden and C. Zhang, Views on Designing Complex Architectures, Bertinoro, Italy, Sept 16-17, 2006, in Electronic Notes in Theoretical Computer Science 168: 61-75 (2007).
  20. Symbolic Model Checking the Knowledge of the Dining Cryptographers R. van der Meyden and K. Su, 17th IEEE Computer Security Foundations Workshop, Asilomar, June 2004, pp. 280-291.
  21. A logical reconstruction of SPKI, J.Y. Halpern and R. van der Meyden, Journal of Computer Security, Volume 11, Issue 4, 2003,. pp 581-614. (A special issue of Journal of Computer Security containing selected papers from CSFW'01.)
  22. A logic for SDSI's Linked Local Name Spaces , J. Y. Halpern and R. van der Meyden, Journal of Computer Security, vol. 9, number 1,2, pp. 75 - 104, 2001. (A special issue of the Journal of Computer Security containing selected papers from CSFW 99.)
  23. A Clausal Logic for Deontic Action Specification, R. van der Meyden, Proceedings of the International Logic Programming Symposium, San Diego, October 1991, pp. 221-238. MIT Press.
  24. The Dynamic Logic of Permission, R. van der Meyden, Journal of Logic and Computation, Vol 6, No. 3 pp. 465-479, 1996. A version of this paper appeared at the IEEE Symposium on Logic in Computer Science, Philadelphia, 1990.

 

CYBER SECURITY AND PRIVACY LABORATORY
SCHOOL OF COMPUTER SCIENCE AND ENGINEERING
UNSW SYDNEY NSW 2052 AUSTRALIA TELEPHONE +61 2 9385 4329