Michael Huth
Michael Huth
Professor of Computer Science, Computing, Imperial College London
Verified email at imperial.ac.uk
Title
Cited by
Cited by
Year
Logic in Computer Science: Modelling and reasoning about systems
M Huth, M Ryan
Cambridge university press, 2004
21702004
Modal transition systems: A foundation for three-valued program analysis
M Huth, R Jagadeesan, D Schmidt
European Symposium on Programming, 155-169, 2001
2672001
Abstraction-based model checking using modal transition systems
P Godefroid, M Huth, R Jagadeesan
International Conference on Concurrency Theory, 426-440, 2001
2072001
Quantitative analysis and model checking
M Huth, M Kwiatkowska
Proceedings of Twelfth Annual IEEE Symposium on Logic in Computer Science …, 1997
1491997
Assume-guarantee model checking of software: A comparative case study
CS Păsăreanu, MB Dwyer, M Huth
International SPIN Workshop on Model Checking of Software, 168-183, 1999
1301999
Relationship-based access control: its expression and enforcement through hybrid logic
G Bruns, PWL Fong, I Siahaan, M Huth
Proceedings of the second ACM conference on Data and Application Security …, 2012
882012
A simple and expressive semantic framework for policy composition in access control
G Bruns, DS Dantas, M Huth
Proceedings of the 2007 ACM workshop on Formal methods in security …, 2007
742007
Access control via Belnap logic: Intuitive, expressive, and analyzable policy composition
G Bruns, M Huth
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-27, 2011
632011
20 years of modal and mixed specifications
A Antonik, M Huth, KG Larsen, U Nyman, A Wąsowski
Bull. Eur. Assoc. Theor. Comput. Sci. EATCS, 2008
602008
Access-control policies via Belnap logic: Effective and efficient composition and analysis
G Bruns, M Huth
2008 21st IEEE Computer Security Foundations Symposium, 163-176, 2008
552008
Complexity of decision problems for mixed and modal specifications
A Antonik, M Huth, KG Larsen, U Nyman, A Wąsowski
International Conference on Foundations of Software Science and …, 2008
412008
Model checking vs. generalized model checking: Semantic minimizations for temporal logics
P Godefroid, M Huth
20th Annual IEEE Symposium on Logic in Computer Science (LICS'05), 158-167, 2005
412005
Towards an access-control framework for countering insider threats
J Crampton, M Huth
Insider Threats in Cyber Security, 173-195, 2010
402010
On finite-state approximants for probabilistic computation tree logic
M Huth
Theoretical Computer Science 346 (1), 113-134, 2005
362005
A domain equation for refinement of partial systems
MRA Huth, R Jagadeesan, DA Schmidt
362004
An authorization framework resilient to policy evaluation failures
J Crampton, M Huth
European Symposium on Research in Computer Security, 472-487, 2010
312010
On model checking multiple hybrid views
A Hussain, M Huth
Proceedings of 1st international symposium on leveraging applications of …, 2004
302004
Secure communicating systems: design, analysis, and implementation
M Huth, MRA Huth
Cambridge University Press, 2001
292001
Linear domains and linear maps
M Huth
International Conference on Mathematical Foundations of Programming …, 1993
281993
Model checking modal transition systems using Kripke structures
M Huth
International Workshop on Verification, Model Checking, and Abstract …, 2002
272002
The system can't perform the operation now. Try again later.
Articles 1–20