default search action
Florian Kammüller
Person information
- affiliation: Middlesex University, Department of Computer Science, London
- affiliation: TU Berlin, Institute of Software Engineering and Theoretical Computer Science, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 1999
- [b1]Florian Kammüller:
Modular reasoning in Isabelle. University of Cambridge, UK, 1999
Journal Articles
- 2023
- [j19]Florian Kammüller, Dimpy Satija:
Explanation of Student Attendance AI Prediction with the Isabelle Infrastructure Framework. Inf. 14(8): 453 (2023) - 2022
- [j18]Gayathri Karthick, Glenford Mapp, Florian Kammueller, Mahdi Aiash:
Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems. Comput. Intell. 38(3): 811-828 (2022) - 2021
- [j17]Florian Kammüller, Manfred Kerber:
Applying the Isabelle Insider framework to airplane security. Sci. Comput. Program. 206: 102623 (2021) - [j16]Florian Kammüller, Axel Legay, Stefano Schivo:
Masterminding change by combining secure system design with security risk assessment. Int. J. Softw. Tools Technol. Transf. 23(1): 69-70 (2021) - 2020
- [j15]Florian Kammueller:
Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems. Arch. Formal Proofs 2020 (2020) - 2019
- [j14]Florian Kammüller:
Attack trees in Isabelle extended with probabilities for quantum cryptography. Comput. Secur. 87 (2019) - 2017
- [j13]Florian Kammüller, Manfred Kerber, Christian W. Probst:
Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(1): 44-78 (2017) - [j12]Florian Kammüller, Christian W. Probst:
Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Syst. J. 11(2): 534-545 (2017) - 2014
- [j11]Florian Kammüller, Christian W. Probst:
Invalidating Policies using Structural Information. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(2): 59-79 (2014) - 2013
- [j10]Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller:
Externalizing Behaviour for Analysing System Models. J. Internet Serv. Inf. Secur. 3(3/4): 52-62 (2013) - 2012
- [j9]Ludovic Henrio, Florian Kammüller, Bianca Lutz:
ASPfun : A typed functional active object calculus. Sci. Comput. Program. 77(7-8): 823-847 (2012) - 2011
- [j8]Florian Kammüller:
Mechanical Analysis of Finite Idempotent Relations. Fundam. Informaticae 107(1): 43-65 (2011) - 2010
- [j7]Steffen Helke, Florian Kammüller:
Formalizing Statecharts using Hierarchical Automata. Arch. Formal Proofs 2010 (2010) - [j6]Ludovic Henrio, Florian Kammüller, Bianca Lutz, Henry Sudhof:
Locally Nameless Sigma Calculus. Arch. Formal Proofs 2010 (2010) - 2008
- [j5]Florian Kammüller:
Formalizing non-interference for a simple bytecode language in Coq. Formal Aspects Comput. 20(3): 259-275 (2008) - [j4]Florian Kammüller, Sören Preibusch:
An industrial application of symbolic model checking. Inform. Forsch. Entwickl. 22(2): 95-108 (2008) - 2002
- [j3]Florian Kammüller:
Book Reviews. Softw. Test. Verification Reliab. 12(3): 188-189 (2002) - 2001
- [j2]Jochen Burghardt, Florian Kammüller, Jeff W. Sanders:
On the antisymmetry of Galois embeddings. Inf. Process. Lett. 79(2): 57-63 (2001) - 1999
- [j1]Florian Kammüller, Lawrence C. Paulson:
A Formal Proof of Sylow's Theorem. J. Autom. Reason. 23(3-4): 235-264 (1999)
Conference and Workshop Papers
- 2024
- [c55]Florian Kammueller:
Analyzing Air-traffic Security using GIS-"blur' with Information Flow Control in the IIIf. ARES 2024: 68:1-68:8 - 2023
- [c54]Florian Kammüller:
Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle. ESORICS Workshops (2) 2023: 330-340 - 2022
- [c53]Florian Kammüller:
Explanation of Black Box AI for GDPR Related Privacy Using Isabelle. DPM/CBT@ESORICS 2022: 69-84 - [c52]Florian Kammüller:
Explanation by Automated Reasoning Using the Isabelle Infrastructure Framework. HCI (43) 2022: 307-318 - [c51]Florian Kammüller, Chelsea Mira Alvarado:
Exploring Rationality of Self Awareness in Social Networking for Logical Modeling of Unintentional Insiders. HCI (32) 2022: 340-357 - 2020
- [c50]Florian Kammüller, Uwe Nestmann:
Inter-Blockchain Protocols with the Isabelle Infrastructure Framework. FMBC@CAV 2020: 11:1-11:12 - [c49]Florian Kammüller, Bianca Lutz:
Modeling and Analyzing the Corona-Virus Warning App with the Isabelle Infrastructure Framework. DPM/CBT@ESORICS 2020: 128-144 - [c48]Richard Bornat, Jaap Boender, Florian Kammueller, Guillaume Poly, Rajagopal Nagarajan:
Describing and Simulating Concurrent Quantum Systems. TACAS (2) 2020: 271-277 - 2019
- [c47]Florian Kammüller:
Combining Secure System Design with Risk Assessment for IoT Healthcare Systems. PerCom Workshops 2019: 961-966 - 2018
- [c46]Florian Kammüller:
Attack Trees in Isabelle. ICICS 2018: 611-628 - [c45]Florian Kammueller:
Formal Modeling and Analysis of Data Protection for GDPR Compliance of IoT Healthcare Systems. SMC 2018: 3319-3324 - [c44]Gayathri Karthick, Glenford Mapp, Florian Kammueller, Mahdi Aiash:
Formalization and Analysis of a Resource Allocation Security Protocol for Secure Service Migration. UCC Companion 2018: 207-212 - 2017
- [c43]Florian Kammüller:
Human Centric Security and Privacy for the IoT Using Formal Techniques. AHFE (9) 2017: 106-116 - [c42]Florian Kammüller:
A Proof Calculus for Attack Trees in Isabelle. DPM/CBT@ESORICS 2017: 3-18 - [c41]Florian Kammüller:
Formal Modeling and Analysis with Humans in Infrastructures for IoT Health Care Systems. HCI (22) 2017: 339-352 - [c40]Florian Kammüller, Juan Carlos Augusto, Simon Jones:
Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle. SERA 2017: 401-406 - 2016
- [c39]Christian W. Probst, Florian Kammüller, René Rydhof Hansen:
Formal Modelling and Analysis of Socio-Technical Systems. Semantics, Logics, and Calculi 2016: 54-73 - [c38]Florian Kammueller, Manfred Kerber, Christian W. Probst:
Towards Formal Analysis of Insider Threats for Auctions. MIST@CCS 2016: 23-34 - [c37]Taolue Chen, Tingting Han, Florian Kammueller, Ibrahim Nemli, Christian W. Probst:
Model based analysis of insider threats. Cyber Security And Protection Of Digital Services 2016: 1-3 - [c36]Florian Kammüller:
Isabelle Modelchecking for Insider Threats. DPM/QASA@ESORICS 2016: 196-210 - [c35]Florian Kammüller:
Refactoring Preserves Security. DPM/QASA@ESORICS 2016: 238-245 - [c34]Florian Kammüller, Jason R. C. Nurse, Christian W. Probst:
Attack Tree Analysis for Insider Threats on the IoT Using Isabelle. HCI (20) 2016: 234-246 - [c33]Florian Kammüller, Manfred Kerber:
Investigating Airplane Safety and Security Against Insider Threats Using Logical Modeling. IEEE Symposium on Security and Privacy Workshops 2016: 304-313 - 2015
- [c32]Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller:
Transforming Graphical System Models to Graphical Attack Models. GraMSec@CSF 2015: 82-96 - [c31]Steffen Helke, Florian Kammüller, Christian W. Probst:
Secure Refactoring with Java Information Flow. DPM/QASA@ESORICS 2015: 264-272 - [c30]Taolue Chen, Florian Kammüller, Ibrahim Nemli, Christian W. Probst:
A Probabilistic Analysis Framework for Malicious Insider Threats. HCI (22) 2015: 178-189 - [c29]Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller:
Attack Tree Generation by Policy Invalidation. WISTP 2015: 249-259 - [c28]Jaap Boender, Florian Kammüller, Rajagopal Nagarajan:
Formalization of Quantum Protocols using Coq. QPL 2015: 71-83 - 2014
- [c27]Florian Kammüller:
Verification of DNSsec Delegation Signatures. ICT 2014: 298-392 - [c26]Florian Kammüller, Christian W. Probst:
Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis. IEEE Symposium on Security and Privacy Workshops 2014: 229-235 - [c25]Jaap Boender, Marieta Georgieva Ivanova, Florian Kammüller, Giuseppe Primiero:
Modeling Human Behaviour with Higher Order Logic: Insider Threats. STAST 2014: 31-39 - 2013
- [c24]Florian Kammüller, Sören Preibusch:
Privacy Analysis of a Hidden Friendship Protocol. DPM/SETOP 2013: 83-99 - [c23]Alwaleed Alghothami, Florian Kammüller:
Network Information Flow Control: Proof of Concept. SMC 2013: 2957-2962 - [c22]Florian Kammüller, Yoney Kirsal Ever, Xiaochun Cheng:
DNSsec in Isabelle - Replay Attack and Origin Authentication. SMC 2013: 4772-4777 - [c21]Florian Kammüller, Christian W. Probst:
Invalidating Policies using Structural Information. IEEE Symposium on Security and Privacy Workshops 2013: 76-81 - 2012
- [c20]Florian Kammüller:
A Semi-lattice Model for Multi-lateral Security. DPM/SETOP 2012: 118-132 - 2011
- [c19]Florian Kammueller:
A Security Model for Functional Active Objects. CCGIDIS 2011: 42-50 - 2010
- [c18]Florian Kammüller:
Privacy Enforcement and Analysis for Functional Active Objects. DPM/SETOP 2010: 93-107 - [c17]Florian Kammüller, Alexander Rein, Mark-Oliver Reiser:
Feature link propagation across variability representations with Isabelle/HOL. PLEASE@ICSE 2010: 48-53 - 2009
- [c16]Ludovic Henrio, Florian Kammüller, Muhammad Uzair Khan:
A Framework for Reasoning on Component Composition. FMCO 2009: 1-20 - [c15]Ludovic Henrio, Florian Kammüller:
Functional Active Objects: Typing and Formalisation. FOCLASA 2009: 83-101 - 2008
- [c14]Ludovic Henrio, Florian Kammüller, Marcela Rivera:
An Asynchronous Distributed Component Model and Its Semantics. FMCO 2008: 159-179 - [c13]Florian Kammüller, Henry Sudhof:
Compositionality of Aspect Weaving. SJTU-TUB Joint Workshop 2008: 87-95 - [c12]Florian Kammüller, Henry Sudhof:
Composing Safely - A Type System for Aspects. SC@ETAPS 2008: 231-247 - 2007
- [c11]Sören Preibusch, Florian Kammüller:
Checking the TWIN Elevator System by Translating Object-Z to SMV. FMICS 2007: 38-55 - [c10]Ludovic Henrio, Florian Kammüller:
A Mechanized Model of the Theory of Objects. FMOODS 2007: 190-205 - 2005
- [c9]Steffen Helke, Florian Kammüller:
Structure Preserving Data Abstractions for Statecharts. FORTE 2005: 305-319 - 2004
- [c8]Florian Kammüller, Jeff W. Sanders:
Idempotent Relations in Isabelle/HOL. ICTAC 2004: 310-324 - [c7]Florian Kammüller, Jeff W. Sanders:
Heuristics for Refinement Relations. SEFM 2004: 292-299 - 2003
- [c6]Margot Bittner, Florian Kammüller:
Translating Fusion/UML to Object-Z. MEMOCODE 2003: 49-50 - 2002
- [c5]Graeme Smith, Florian Kammüller, Thomas Santen:
Encoding Object-Z in Isabelle/HOL. ZB 2002: 82-99 - 2001
- [c4]Steffen Helke, Florian Kammüller:
Representing Hierarchical Automata in Interactive Theorem Provers. TPHOLs 2001: 233-248 - 2000
- [c3]Florian Kammüller:
Modular Reasoning in Isabelle. CADE 2000: 99-114 - 1999
- [c2]Florian Kammüller, Markus Wenzel, Lawrence C. Paulson:
Locales - A Sectioning Concept for Isabelle. TPHOLs 1999: 149-166 - 1998
- [c1]Florian Kammüller:
Modular Structures as Dependent Types in Isabelle. TYPES 1998: 121-132
Parts in Books or Collections
- 1995
- [p1]Thomas Santen, Florian Kammüller, Stefan Jähnichen, Martin Beyer:
Formalization of Algebraic Specification in the Development Language DEVA. KORSO Book 1995: 223-238
Editorship
- 2012
- [e1]Francisco V. Cipolla Ficarra, Kim H. Veltman, Domen Verber, Miguel Cipolla-Ficarra, Florian Kammüller:
Advances in New Technologies, Interactive Interfaces and Communicability - Second International Conference, ADNTIIC 2011, Huerta Grande, Argentina, December 5-7, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7547, Springer 2012, ISBN 978-3-642-34009-3 [contents]
Informal and Other Publications
- 2023
- [i10]Florian Kammüller:
Higher Order Model Checking in Isabelle for Human Centric Infrastructure Security. CoRR abs/2312.17555 (2023) - 2021
- [i9]Florian Kammüller, Chelsea Mira Alvarado:
Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders. CoRR abs/2111.15425 (2021) - [i8]Florian Kammüller:
Dependability Engineering in Isabelle. CoRR abs/2112.04374 (2021) - [i7]Florian Kammüller:
Explanation by Automated Reasoning Using the Isabelle Infrastructure Framework. CoRR abs/2112.14809 (2021) - 2020
- [i6]Florian Kammüller:
A Formal Development Cycle for Security Engineering in Isabelle. CoRR abs/2001.08983 (2020) - [i5]Florian Kammüller, Manfred Kerber:
Applying the Isabelle Insider Framework to Airplane Security. CoRR abs/2003.11838 (2020) - 2019
- [i4]Florian Kammüller, Oladapo O. Ogunyanwo, Christian W. Probst:
Designing Data Protection for GDPR Compliance into IoT Healthcare Systems. CoRR abs/1901.02426 (2019) - [i3]Florian Kammüller:
QKD in Isabelle - Bayesian Calculation. CoRR abs/1905.00325 (2019) - 2018
- [i2]Florian Kammüller:
Attack Trees in Isabelle - CTL semantics, correctness and completeness. CoRR abs/1803.06494 (2018) - 2014
- [i1]Florian Kammueller:
Confinement for Active Objects. CoRR abs/1405.0867 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-04 01:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint