Logic in Computer Science: Modelling and reasoning about systems M Huth, M Ryan Cambridge university press, 2004 | 2599 | 2004 |
Modal transition systems: A foundation for three-valued program analysis M Huth, R Jagadeesan, D Schmidt Programming Languages and Systems: 10th European Symposium on Programming …, 2001 | 288 | 2001 |
Abstraction-based model checking using modal transition systems P Godefroid, M Huth, R Jagadeesan International conference on concurrency theory, 426-440, 2001 | 219 | 2001 |
Quantitative analysis and model checking M Huth, M Kwiatkowska Proceedings of Twelfth Annual IEEE Symposium on Logic in Computer Science …, 1997 | 178 | 1997 |
Assume-guarantee model checking of software: A comparative case study CS Păsăreanu, MB Dwyer, M Huth International SPIN Workshop on Model Checking of Software, 168-183, 1999 | 141 | 1999 |
Relationship-based access control: its expression and enforcement through hybrid logic G Bruns, PWL Fong, I Siahaan, M Huth Proceedings of the second ACM conference on Data and Application Security …, 2012 | 117 | 2012 |
A simple and expressive semantic framework for policy composition in access control G Bruns, DS Dantas, M Huth Proceedings of the 2007 ACM workshop on Formal methods in security …, 2007 | 76 | 2007 |
Access control via Belnap logic: Intuitive, expressive, and analyzable policy composition G Bruns, M Huth ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-27, 2011 | 69 | 2011 |
20 years of modal and mixed specifications A Antonik, M Huth, KG Larsen, U Nyman, A Wasowski Bulletin of the European Association for Theoretical Computer Science, 2008 | 64 | 2008 |
Access-control policies via Belnap logic: Effective and efficient composition and analysis G Bruns, M Huth 2008 21st IEEE Computer Security Foundations Symposium, 163-176, 2008 | 58 | 2008 |
Model checking vs. generalized model checking: Semantic minimizations for temporal logics P Godefroid, M Huth 20th Annual IEEE Symposium on Logic in Computer Science (LICS'05), 158-167, 2005 | 44 | 2005 |
Towards an access-control framework for countering insider threats J Crampton, M Huth Insider Threats in Cyber Security, 173-195, 2010 | 42 | 2010 |
Complexity of decision problems for mixed and modal specifications A Antonik, M Huth, KG Larsen, U Nyman, A Wąsowski Foundations of Software Science and Computational Structures: 11th …, 2008 | 40 | 2008 |
On finite-state approximants for probabilistic computation tree logic M Huth Theoretical Computer Science 346 (1), 113-134, 2005 | 39 | 2005 |
A domain equation for refinement of partial systems MRA Huth, R Jagadeesan, DA Schmidt Mathematical Structures in Computer Science 14 (4), 469-505, 2004 | 37 | 2004 |
On model checking multiple hybrid views A Hussain, M Huth Theoretical computer science 404 (3), 186-201, 2008 | 32 | 2008 |
An authorization framework resilient to policy evaluation failures J Crampton, M Huth Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 31 | 2010 |
Model checking modal transition systems using Kripke structures M Huth International Workshop on Verification, Model Checking, and Abstract …, 2002 | 28 | 2002 |
Secure communicating systems: design, analysis, and implementation M Huth Cambridge University Press, 2001 | 28 | 2001 |
Linear domains and linear maps M Huth International Conference on Mathematical Foundations of Programming …, 1993 | 28 | 1993 |