2018 - ACM Fellow For contributions to Information Security and Formal Methods
David Basin spends much of his time researching Computer security, Theoretical computer science, Cryptographic protocol, Access control and Temporal logic. His Computer security study combines topics in areas such as Control, Computer network and Mobile telephony. He works mostly in the field of Theoretical computer science, limiting it down to topics relating to Cryptography and, in certain cases, Measure and Formal verification.
His Cryptographic protocol research is multidisciplinary, incorporating perspectives in Model checking, Formal methods, State and Exponentiation. The various areas that David Basin examines in his Access control study include Domain, Unified Modeling Language, Applications of UML and Modeling language. David Basin has researched Temporal logic in several fields, including Security policy, Fragment, Specification language and Metric.
His primary areas of study are Theoretical computer science, Computer security, Cryptographic protocol, Programming language and Algorithm. David Basin focuses mostly in the field of Theoretical computer science, narrowing it down to matters related to Mathematical proof and, in some cases, Automated theorem proving. His work on Computer security deals in particular with Authentication, Access control, Authentication protocol and Key.
His Access control study focuses on Role-based access control in particular. David Basin combines subjects such as Distributed computing and Computer security model with his study of Cryptographic protocol. His Temporal logic research is multidisciplinary, incorporating elements of Runtime verification and Metric.
David Basin mainly focuses on Computer security, Theoretical computer science, Cryptographic protocol, Algorithm and Temporal logic. His work on Access control and XACML as part of general Computer security study is frequently linked to Ballot, therefore connecting diverse disciplines of science. His Theoretical computer science study combines topics from a wide range of disciplines, such as Mathematical proof, Private information retrieval, Multiset, Correctness and Cardinality.
Parametricity is closely connected to Programming language in his research, which is encompassed under the umbrella topic of Mathematical proof. His Cryptographic protocol research is under the purview of Cryptography. His research in Temporal logic intersects with topics in Linear temporal logic and Runtime verification.
David Basin mainly investigates Computer security, Theoretical computer science, Cryptographic protocol, Correctness and Temporal logic. His Computer security study incorporates themes from Tracing and Upload. The concepts of his Theoretical computer science study are interwoven with issues in Cardinality and Differential privacy.
David Basin has included themes like Authentication protocol, Authentication, Standardization and Prime in his Cryptographic protocol study. His work deals with themes such as Entropy, If and only if, Authorization and Anonymity, which intersect with Correctness. His Temporal logic research incorporates themes from Linear temporal logic, Soundness, Information technology and Metric.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
The AVISPA tool for the automated validation of internet security protocols and applications
A. Armando;D. Basin;Y. Boichut;Y. Chevalier.
computer aided verification (2005)
SecureUML: A UML-Based Modeling Language for Model-Driven Security
Torsten Lodderstedt;David A. Basin;Jürgen Doser.
Lecture Notes in Computer Science (2002)
Model driven security: From UML models to access control infrastructures
David Basin;Jürgen Doser;Torsten Lodderstedt.
ACM Transactions on Software Engineering and Methodology (2006)
OFMC: A symbolic model checker for security protocols
David Basin;Sebastian Mödersheim;Luca Viganò.
International Journal of Information Security (2005)
An information-theoretic model for adaptive side-channel attacks
Boris Köpf;David Basin.
computer and communications security (2007)
The TAMARIN prover for the symbolic analysis of security protocols
Simon Meier;Benedikt Schmidt;Cas Cremers;David Basin.
computer aided verification (2013)
Distributed usage control
Alexander Pretschner;Manuel Hilty;David Basin.
Communications of The ACM (2006)
An on-the-fly model-checker for security protocol analysis
David Basin;Sebastian Mödersheim;Luca Vigano.
european symposium on research in computer security (2003)
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties
B. Schmidt;S. Meier;C. Cremers;D. Basin.
ieee computer security foundations symposium (2012)
A policy language for distributed usage control
M. Hilty;A. Pretschner;D. Basin;C. Schaefer.
european symposium on research in computer security (2007)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
University of Edinburgh
ETH Zurich
University of Oxford
Commonwealth Scientific and Industrial Research Organisation
ETH Zurich
ETH Zurich
TU Darmstadt
Technical University of Munich
National Institute of Advanced Industrial Science and Technology
IBM (United States)
French Institute for Research in Computer Science and Automation - INRIA
Publications: 29
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: