default search action
David von Oheimb
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i2]Hendrik Brockhaus, David von Oheimb, John Gray:
Certificate Management Protocol (CMP) Updates. RFC 9480: 1-55 (2023) - [i1]Hendrik Brockhaus, David von Oheimb, Steffen Fries:
Lightweight Certificate Management Protocol (CMP) Profile. RFC 9483: 1-83 (2023)
2010 – 2019
- 2012
- [c22]David von Oheimb:
IT Security Architecture Approaches for Smart Metering and Smart Grid. SmartGridSec 2012: 1-25 - [c21]Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, Alessandro Cappai, Roberto Carbone, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Gabriel Erzse, Simone Frau, Marius Minea, Sebastian Mödersheim, David von Oheimb, Giancarlo Pellegrino, Serena Elisa Ponta, Marco Rocchetto, Michaël Rusinowitch, Mohammad Torabi Dashti, Mathieu Turuani, Luca Viganò:
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures. TACAS 2012: 267-282 - 2010
- [c20]David von Oheimb, Sebastian Mödersheim:
ASLan++ - A Formal Security Specification Language for Distributed Systems. FMCO 2010: 1-22 - [c19]Peter Hartmann, Monika Maidl, David von Oheimb, Richard Robinson:
A Case Study in Decentralized, Dynamic, Policy-Based, Authorization and Trust Management - Automated Software Distribution for Airplanes. STM 2010: 68-83
2000 – 2009
- 2008
- [c18]Monika Maidl, David von Oheimb, Peter Hartmann, Richard Robinson:
Formal Security Analysis of Electronic Software Distribution Systems. SAFECOMP 2008: 415-428 - 2007
- [c17]Richard Robinson, Mingyan Li, Scott Lintelman, Krishna Sampigethaya, Radha Poovendran, David von Oheimb, Jens-Uwe Bußer, Jorge Cuéllar:
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety. SAFECOMP 2007: 28-39 - 2006
- [c16]David von Oheimb:
Formal Methods in the Security Business: Exotic Flowers Thriving in an Expanding Niche. FM 2006: 592-597 - [c15]David von Oheimb:
Formal Security Analysis in Industry, at the Example of Electronic Distribution of Aircraft Software (EDS). ISoLA 2006: 5 - [c14]David von Oheimb, Jorge Cuéllar:
Designing and Verifying Core Protocols for Location Privacy. ISC 2006: 502-516 - 2005
- [j3]David von Oheimb, Volkmar Lotz, Georg Walter:
Analyzing SLE 88 memory management security using Interacting State Machines. Int. J. Inf. Sec. 4(3): 155-171 (2005) - [c13]Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. CAV 2005: 281-285 - 2004
- [c12]David von Oheimb:
Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage. ESORICS 2004: 225-243 - 2003
- [c11]David von Oheimb, Georg Walter, Volkmar Lotz:
A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment. ESORICS 2003: 217-234 - [c10]Thomas A. Kuhn, David von Oheimb:
Interacting State Machines for Mobility. FME 2003: 698-718 - [c9]David von Oheimb, Volkmar Lotz:
Generic Interacting State Machines and Their Instantiation with Dynamic Features. ICFEM 2003: 144-166 - 2002
- [c8]David von Oheimb, Volkmar Lotz:
Formal Security Analysis with Interacting State Machines. ESORICS 2002: 212-228 - [c7]David von Oheimb:
Interacting State Machines: A Stateful Approach to Proving Security. FASec 2002: 15-32 - [c6]David von Oheimb, Tobias Nipkow:
Hoare Logic for NanoJava: Auxiliary Variables, Side Effects, and Virtual Methods Revisited. FME 2002: 89-105 - 2001
- [b1]David von Oheimb:
Analyzing Java in Isabelle-HOL: formalization, type safety and Hoare logic. Technical University Munich, Germany, 2001, pp. 1-177 - [j2]David von Oheimb:
Hoare logic for Java in Isabelle/HOL. Concurr. Comput. Pract. Exp. 13(13): 1173-1214 (2001)
1990 – 1999
- 1999
- [j1]Olaf Müller, Tobias Nipkow, David von Oheimb, Oscar Slotosch:
HOLCF=HOL+LCF. J. Funct. Program. 9(2): 191-223 (1999) - [c5]David von Oheimb:
Hoare Logic for Mutual Recursion and Local Variables. FSTTCS 1999: 168-180 - [c4]David von Oheimb, Tobias Nipkow:
Machine-Checking the Java Specification: Proving Type-Safety. Formal Syntax and Semantics of Java 1999: 119-156 - 1998
- [c3]David von Oheimb, Cornelia Pusch:
Java - formal fundiert. Java-Informations-Tage 1998: 77-86 - [c2]Tobias Nipkow, David von Oheimb:
Javalight is Type-Safe - Definitely. POPL 1998: 161-170 - 1997
- [c1]David von Oheimb, Thomas F. Gritzner:
RALL: Machine-Supported Proofs for Relation Algebra. CADE 1997: 380-394
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint