D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 61 Citations 14,613 381 World Ranking 1961 National Ranking 50

Research.com Recognitions

Awards & Achievements

2018 - ACM Fellow For contributions to Information Security and Formal Methods

Overview

What is he best known for?

The fields of study he is best known for:

  • Programming language
  • Operating system
  • Computer network

David Basin spends much of his time researching Computer security, Theoretical computer science, Cryptographic protocol, Access control and Temporal logic. His Computer security study combines topics in areas such as Control, Computer network and Mobile telephony. He works mostly in the field of Theoretical computer science, limiting it down to topics relating to Cryptography and, in certain cases, Measure and Formal verification.

His Cryptographic protocol research is multidisciplinary, incorporating perspectives in Model checking, Formal methods, State and Exponentiation. The various areas that David Basin examines in his Access control study include Domain, Unified Modeling Language, Applications of UML and Modeling language. David Basin has researched Temporal logic in several fields, including Security policy, Fragment, Specification language and Metric.

His most cited work include:

  • The AVISPA tool for the automated validation of internet security protocols and applications (891 citations)
  • SecureUML: A UML-Based Modeling Language for Model-Driven Security (646 citations)
  • Model driven security: From UML models to access control infrastructures (434 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Theoretical computer science, Computer security, Cryptographic protocol, Programming language and Algorithm. David Basin focuses mostly in the field of Theoretical computer science, narrowing it down to matters related to Mathematical proof and, in some cases, Automated theorem proving. His work on Computer security deals in particular with Authentication, Access control, Authentication protocol and Key.

His Access control study focuses on Role-based access control in particular. David Basin combines subjects such as Distributed computing and Computer security model with his study of Cryptographic protocol. His Temporal logic research is multidisciplinary, incorporating elements of Runtime verification and Metric.

He most often published in these fields:

  • Theoretical computer science (24.26%)
  • Computer security (20.05%)
  • Cryptographic protocol (17.08%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer security (20.05%)
  • Theoretical computer science (24.26%)
  • Cryptographic protocol (17.08%)

In recent papers he was focusing on the following fields of study:

David Basin mainly focuses on Computer security, Theoretical computer science, Cryptographic protocol, Algorithm and Temporal logic. His work on Access control and XACML as part of general Computer security study is frequently linked to Ballot, therefore connecting diverse disciplines of science. His Theoretical computer science study combines topics from a wide range of disciplines, such as Mathematical proof, Private information retrieval, Multiset, Correctness and Cardinality.

Parametricity is closely connected to Programming language in his research, which is encompassed under the umbrella topic of Mathematical proof. His Cryptographic protocol research is under the purview of Cryptography. His research in Temporal logic intersects with topics in Linear temporal logic and Runtime verification.

Between 2015 and 2021, his most popular works were:

  • Decentralized Privacy-Preserving Proximity Tracing (80 citations)
  • A Formal Analysis of 5G Authentication (78 citations)
  • On purpose and by necessity: Compliance under the GDPR (39 citations)

In his most recent research, the most cited papers focused on:

  • Programming language
  • Operating system
  • The Internet

David Basin mainly investigates Computer security, Theoretical computer science, Cryptographic protocol, Correctness and Temporal logic. His Computer security study incorporates themes from Tracing and Upload. The concepts of his Theoretical computer science study are interwoven with issues in Cardinality and Differential privacy.

David Basin has included themes like Authentication protocol, Authentication, Standardization and Prime in his Cryptographic protocol study. His work deals with themes such as Entropy, If and only if, Authorization and Anonymity, which intersect with Correctness. His Temporal logic research incorporates themes from Linear temporal logic, Soundness, Information technology and Metric.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

The AVISPA tool for the automated validation of internet security protocols and applications

A. Armando;D. Basin;Y. Boichut;Y. Chevalier.
computer aided verification (2005)

1338 Citations

SecureUML: A UML-Based Modeling Language for Model-Driven Security

Torsten Lodderstedt;David A. Basin;Jürgen Doser.
Lecture Notes in Computer Science (2002)

1117 Citations

Model driven security: From UML models to access control infrastructures

David Basin;Jürgen Doser;Torsten Lodderstedt.
ACM Transactions on Software Engineering and Methodology (2006)

700 Citations

OFMC: A symbolic model checker for security protocols

David Basin;Sebastian Mödersheim;Luca Viganò.
International Journal of Information Security (2005)

624 Citations

The TAMARIN prover for the symbolic analysis of security protocols

Simon Meier;Benedikt Schmidt;Cas Cremers;David Basin.
computer aided verification (2013)

512 Citations

An information-theoretic model for adaptive side-channel attacks

Boris Köpf;David Basin.
computer and communications security (2007)

450 Citations

Distributed usage control

Alexander Pretschner;Manuel Hilty;David Basin.
Communications of The ACM (2006)

328 Citations

Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties

B. Schmidt;S. Meier;C. Cremers;D. Basin.
ieee computer security foundations symposium (2012)

259 Citations

An on-the-fly model-checker for security protocol analysis

David Basin;Sebastian Mödersheim;Luca Vigano.
Lecture Notes in Computer Science (2003)

251 Citations

A Formal Analysis of 5G Authentication

David Basin;Jannik Dreier;Lucca Hirschi;Saša Radomirovic.
computer and communications security (2018)

248 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing David Basin

José Meseguer

José Meseguer

University of Illinois at Urbana-Champaign

Publications: 66

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 62

Alan Bundy

Alan Bundy

University of Edinburgh

Publications: 45

Alexander Pretschner

Alexander Pretschner

Technical University of Munich

Publications: 42

Eduardo Fernández-Medina

Eduardo Fernández-Medina

University of Castilla-La Mancha

Publications: 40

Cas Cremers

Cas Cremers

University of Oxford

Publications: 39

Ruth BREU

Ruth BREU

University of Innsbruck

Publications: 30

Jan Jürjens

Jan Jürjens

University of Koblenz and Landau

Publications: 29

Catuscia Palamidessi

Catuscia Palamidessi

French Institute for Research in Computer Science and Automation - INRIA

Publications: 29

Klaus Havelund

Klaus Havelund

Jet Propulsion Lab

Publications: 28

Catherine Meadows

Catherine Meadows

United States Naval Research Laboratory

Publications: 28

Fabio Massacci

Fabio Massacci

Vrije Universiteit Amsterdam

Publications: 27

Gregory Gutin

Gregory Gutin

Royal Holloway University of London

Publications: 25

Frédéric Cuppens

Frédéric Cuppens

Polytechnique Montréal

Publications: 23

Mario Piattini

Mario Piattini

University of Castilla-La Mancha

Publications: 23

Anupam Datta

Anupam Datta

Carnegie Mellon University

Publications: 22

Trending Scientists

Janak H. Patel

Janak H. Patel

University of Illinois at Urbana-Champaign

Michael S. Hsiao

Michael S. Hsiao

Virginia Tech

Brian Parshall

Brian Parshall

University of Virginia

Atif Shamim

Atif Shamim

King Abdullah University of Science and Technology

Ana Jonas

Ana Jonas

University of Illinois at Urbana-Champaign

Ali Maleki

Ali Maleki

Iran University of Science and Technology

Susan A. Bernal

Susan A. Bernal

University of Leeds

Javier Bezos

Javier Bezos

Complutense University of Madrid

Nava Dekel

Nava Dekel

Weizmann Institute of Science

Tom Ross

Tom Ross

University of Tasmania

C H Heldin

C H Heldin

Ludwig Cancer Research

Gerd Pluschke

Gerd Pluschke

Swiss Tropical and Public Health Institute

Song Guo Zheng

Song Guo Zheng

Pennsylvania State University

Peter R. Finn

Peter R. Finn

Indiana University

Norma M. Riccucci

Norma M. Riccucci

Rutgers, The State University of New Jersey

R. M. Rich

R. M. Rich

University of California, Los Angeles

Something went wrong. Please try again later.