2018 - ACM Fellow For contributions to Information Security and Formal Methods
David Basin spends much of his time researching Computer security, Theoretical computer science, Cryptographic protocol, Access control and Temporal logic. His Computer security study combines topics in areas such as Control, Computer network and Mobile telephony. He works mostly in the field of Theoretical computer science, limiting it down to topics relating to Cryptography and, in certain cases, Measure and Formal verification.
His Cryptographic protocol research is multidisciplinary, incorporating perspectives in Model checking, Formal methods, State and Exponentiation. The various areas that David Basin examines in his Access control study include Domain, Unified Modeling Language, Applications of UML and Modeling language. David Basin has researched Temporal logic in several fields, including Security policy, Fragment, Specification language and Metric.
His primary areas of study are Theoretical computer science, Computer security, Cryptographic protocol, Programming language and Algorithm. David Basin focuses mostly in the field of Theoretical computer science, narrowing it down to matters related to Mathematical proof and, in some cases, Automated theorem proving. His work on Computer security deals in particular with Authentication, Access control, Authentication protocol and Key.
His Access control study focuses on Role-based access control in particular. David Basin combines subjects such as Distributed computing and Computer security model with his study of Cryptographic protocol. His Temporal logic research is multidisciplinary, incorporating elements of Runtime verification and Metric.
David Basin mainly focuses on Computer security, Theoretical computer science, Cryptographic protocol, Algorithm and Temporal logic. His work on Access control and XACML as part of general Computer security study is frequently linked to Ballot, therefore connecting diverse disciplines of science. His Theoretical computer science study combines topics from a wide range of disciplines, such as Mathematical proof, Private information retrieval, Multiset, Correctness and Cardinality.
Parametricity is closely connected to Programming language in his research, which is encompassed under the umbrella topic of Mathematical proof. His Cryptographic protocol research is under the purview of Cryptography. His research in Temporal logic intersects with topics in Linear temporal logic and Runtime verification.
David Basin mainly investigates Computer security, Theoretical computer science, Cryptographic protocol, Correctness and Temporal logic. His Computer security study incorporates themes from Tracing and Upload. The concepts of his Theoretical computer science study are interwoven with issues in Cardinality and Differential privacy.
David Basin has included themes like Authentication protocol, Authentication, Standardization and Prime in his Cryptographic protocol study. His work deals with themes such as Entropy, If and only if, Authorization and Anonymity, which intersect with Correctness. His Temporal logic research incorporates themes from Linear temporal logic, Soundness, Information technology and Metric.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
The AVISPA tool for the automated validation of internet security protocols and applications
A. Armando;D. Basin;Y. Boichut;Y. Chevalier.
computer aided verification (2005)
SecureUML: A UML-Based Modeling Language for Model-Driven Security
Torsten Lodderstedt;David A. Basin;Jürgen Doser.
Lecture Notes in Computer Science (2002)
Model driven security: From UML models to access control infrastructures
David Basin;Jürgen Doser;Torsten Lodderstedt.
ACM Transactions on Software Engineering and Methodology (2006)
OFMC: A symbolic model checker for security protocols
David Basin;Sebastian Mödersheim;Luca Viganò.
International Journal of Information Security (2005)
The TAMARIN prover for the symbolic analysis of security protocols
Simon Meier;Benedikt Schmidt;Cas Cremers;David Basin.
computer aided verification (2013)
An information-theoretic model for adaptive side-channel attacks
Boris Köpf;David Basin.
computer and communications security (2007)
Distributed usage control
Alexander Pretschner;Manuel Hilty;David Basin.
Communications of The ACM (2006)
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties
B. Schmidt;S. Meier;C. Cremers;D. Basin.
ieee computer security foundations symposium (2012)
An on-the-fly model-checker for security protocol analysis
David Basin;Sebastian Mödersheim;Luca Vigano.
Lecture Notes in Computer Science (2003)
A Formal Analysis of 5G Authentication
David Basin;Jannik Dreier;Lucca Hirschi;Saša Radomirovic.
computer and communications security (2018)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Edinburgh
ETH Zurich
University of Oxford
Commonwealth Scientific and Industrial Research Organisation
ETH Zurich
ETH Zurich
Technical University of Darmstadt
National Institute of Advanced Industrial Science and Technology
Technical University of Munich
IBM (United States)
French Institute for Research in Computer Science and Automation - INRIA
Publications: 29
University of Illinois at Urbana-Champaign
Virginia Tech
University of Virginia
King Abdullah University of Science and Technology
University of Illinois at Urbana-Champaign
Iran University of Science and Technology
University of Leeds
Complutense University of Madrid
Weizmann Institute of Science
University of Tasmania
Ludwig Cancer Research
Swiss Tropical and Public Health Institute
Pennsylvania State University
Indiana University
Rutgers, The State University of New Jersey
University of California, Los Angeles