H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 61 Citations 13,864 277 World Ranking 1479 National Ranking 44

Research.com Recognitions

Awards & Achievements

2018 - ACM Fellow For contributions to Information Security and Formal Methods

Overview

What is he best known for?

The fields of study he is best known for:

  • Programming language
  • Operating system
  • Computer network

David Basin spends much of his time researching Computer security, Theoretical computer science, Cryptographic protocol, Access control and Temporal logic. His Computer security study combines topics in areas such as Control, Computer network and Mobile telephony. He works mostly in the field of Theoretical computer science, limiting it down to topics relating to Cryptography and, in certain cases, Measure and Formal verification.

His Cryptographic protocol research is multidisciplinary, incorporating perspectives in Model checking, Formal methods, State and Exponentiation. The various areas that David Basin examines in his Access control study include Domain, Unified Modeling Language, Applications of UML and Modeling language. David Basin has researched Temporal logic in several fields, including Security policy, Fragment, Specification language and Metric.

His most cited work include:

  • The AVISPA tool for the automated validation of internet security protocols and applications (891 citations)
  • SecureUML: A UML-Based Modeling Language for Model-Driven Security (646 citations)
  • Model driven security: From UML models to access control infrastructures (434 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Theoretical computer science, Computer security, Cryptographic protocol, Programming language and Algorithm. David Basin focuses mostly in the field of Theoretical computer science, narrowing it down to matters related to Mathematical proof and, in some cases, Automated theorem proving. His work on Computer security deals in particular with Authentication, Access control, Authentication protocol and Key.

His Access control study focuses on Role-based access control in particular. David Basin combines subjects such as Distributed computing and Computer security model with his study of Cryptographic protocol. His Temporal logic research is multidisciplinary, incorporating elements of Runtime verification and Metric.

He most often published in these fields:

  • Theoretical computer science (24.26%)
  • Computer security (20.05%)
  • Cryptographic protocol (17.08%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer security (20.05%)
  • Theoretical computer science (24.26%)
  • Cryptographic protocol (17.08%)

In recent papers he was focusing on the following fields of study:

David Basin mainly focuses on Computer security, Theoretical computer science, Cryptographic protocol, Algorithm and Temporal logic. His work on Access control and XACML as part of general Computer security study is frequently linked to Ballot, therefore connecting diverse disciplines of science. His Theoretical computer science study combines topics from a wide range of disciplines, such as Mathematical proof, Private information retrieval, Multiset, Correctness and Cardinality.

Parametricity is closely connected to Programming language in his research, which is encompassed under the umbrella topic of Mathematical proof. His Cryptographic protocol research is under the purview of Cryptography. His research in Temporal logic intersects with topics in Linear temporal logic and Runtime verification.

Between 2015 and 2021, his most popular works were:

  • Decentralized Privacy-Preserving Proximity Tracing (80 citations)
  • A Formal Analysis of 5G Authentication (78 citations)
  • On purpose and by necessity: Compliance under the GDPR (39 citations)

In his most recent research, the most cited papers focused on:

  • Programming language
  • Operating system
  • The Internet

David Basin mainly investigates Computer security, Theoretical computer science, Cryptographic protocol, Correctness and Temporal logic. His Computer security study incorporates themes from Tracing and Upload. The concepts of his Theoretical computer science study are interwoven with issues in Cardinality and Differential privacy.

David Basin has included themes like Authentication protocol, Authentication, Standardization and Prime in his Cryptographic protocol study. His work deals with themes such as Entropy, If and only if, Authorization and Anonymity, which intersect with Correctness. His Temporal logic research incorporates themes from Linear temporal logic, Soundness, Information technology and Metric.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

The AVISPA tool for the automated validation of internet security protocols and applications

A. Armando;D. Basin;Y. Boichut;Y. Chevalier.
computer aided verification (2005)

1211 Citations

SecureUML: A UML-Based Modeling Language for Model-Driven Security

Torsten Lodderstedt;David A. Basin;Jürgen Doser.
Lecture Notes in Computer Science (2002)

1080 Citations

Model driven security: From UML models to access control infrastructures

David Basin;Jürgen Doser;Torsten Lodderstedt.
ACM Transactions on Software Engineering and Methodology (2006)

689 Citations

OFMC: A symbolic model checker for security protocols

David Basin;Sebastian Mödersheim;Luca Viganò.
International Journal of Information Security (2005)

589 Citations

An information-theoretic model for adaptive side-channel attacks

Boris Köpf;David Basin.
computer and communications security (2007)

420 Citations

The TAMARIN prover for the symbolic analysis of security protocols

Simon Meier;Benedikt Schmidt;Cas Cremers;David Basin.
computer aided verification (2013)

407 Citations

Distributed usage control

Alexander Pretschner;Manuel Hilty;David Basin.
Communications of The ACM (2006)

321 Citations

An on-the-fly model-checker for security protocol analysis

David Basin;Sebastian Mödersheim;Luca Vigano.
european symposium on research in computer security (2003)

236 Citations

Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties

B. Schmidt;S. Meier;C. Cremers;D. Basin.
ieee computer security foundations symposium (2012)

232 Citations

A policy language for distributed usage control

M. Hilty;A. Pretschner;D. Basin;C. Schaefer.
european symposium on research in computer security (2007)

204 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing David Basin

José Meseguer

José Meseguer

University of Illinois at Urbana-Champaign

Publications: 66

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 62

Alan Bundy

Alan Bundy

University of Edinburgh

Publications: 45

Alexander Pretschner

Alexander Pretschner

Technical University of Munich

Publications: 42

Eduardo Fernández-Medina

Eduardo Fernández-Medina

University of Castilla-La Mancha

Publications: 40

Cas Cremers

Cas Cremers

University of Oxford

Publications: 39

Ruth BREU

Ruth BREU

University of Innsbruck

Publications: 30

Jan Jürjens

Jan Jürjens

University of Koblenz and Landau

Publications: 29

Catuscia Palamidessi

Catuscia Palamidessi

French Institute for Research in Computer Science and Automation - INRIA

Publications: 29

Klaus Havelund

Klaus Havelund

Jet Propulsion Lab

Publications: 28

Catherine Meadows

Catherine Meadows

United States Naval Research Laboratory

Publications: 28

Fabio Massacci

Fabio Massacci

Vrije Universiteit Amsterdam

Publications: 27

Gregory Gutin

Gregory Gutin

Royal Holloway University of London

Publications: 25

Frédéric Cuppens

Frédéric Cuppens

Polytechnique Montréal

Publications: 23

Mario Piattini

Mario Piattini

aQuantum

Publications: 23

Something went wrong. Please try again later.