14.02.2013 Views

Appendix 2: CV & publications - KTH

Appendix 2: CV & publications - KTH

Appendix 2: CV & publications - KTH

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Publication List 2006-2011 of M. F. Dam<br />

1<br />

According to the instructions, <strong>publications</strong> marked with "*" is a result of ACCESS<br />

collaboration (ACCESS Faculty or Postdoc)<br />

A. Peer-reviewed articles<br />

[MFD-1] M. Dam, B. Jacobs, A. Lundblad, F. Piessens "Security Monitor Inlining and<br />

Certification for Multithreaded Java," to appear in Mathematical Structures in<br />

Computer Science (MSCS), Cambridge University Press<br />

[MFD-2] M. Dam, B. Jacobs, A. Lundblad, F. Piessens: “Provably Correct Inline Monitoring<br />

for Multi-threaded Java-like Programs”, Journal of Computer Security vol 18, number<br />

1, pp. 37-59, 2010.<br />

[MFD-3] F. Wuhib, M. Dam, R. Stadler, "A Gossiping Protocol for Detecting Global<br />

Threshold Crossings", IEEE Transactions on Network and Service Management<br />

(TNSM), Vol. 7, No. 1, March 2010, DOI 10.1109/T-WC.2008.I9P0329 *<br />

[MFD-4] I. Aktug, M. Dam, D. Gurov: “Provably Correct Runtime Monitoring”, Journal of<br />

Logic and Algebraic Programming. Volume 78, Issue 5, Pages 304-339 (May-June<br />

2009).<br />

[MFD-5] F. Wuhib, M. Dam, R. Stadler, A. Clemm "Robust Monitoring of Network-wide<br />

Aggregates through Gossiping," IEEE Transactions on Network and Service<br />

Management (TNSM), Vol. 6, No. 2, June 2009. *<br />

[MFD-6] M. Cohen, M. Dam: “A Completeness result for BAN logic”, To appear in Journal<br />

of Logic, Language, and Information.<br />

[MFD-7] F. Wuhib, M. Dam, R. Stadler, A. Clemm. “Decentralized Detection of Global<br />

Threshold Crossings Using Aggregation Trees.” Computer Networks 52 (2008) 1745–<br />

1761 *<br />

B. Peer-reviewed conference <strong>publications</strong>:<br />

[MFD-8] D. Guerev, M. Dam: "An epistemic predicate CTL* for finite control pi-processes"<br />

Proc. LAMAS 2011, to appear in Springer Lecture Notes in Computer Science, 2011<br />

[MFD-9] M. Balliu and M. Dam and G. Le Guernic. Epistemic Temporal Logic for<br />

Information Flow Security . In the Proc.of ACM SIGPLAN Programming Languages<br />

and Analysis for Security (PLAS '11 ). San Jose, CA, USA. June 5, 2011<br />

[MFD-10] G. Kreitz, D. Wikström, M. Dam: "Practical Private Information Aggregation in<br />

Large Networks" Proc. NordSec 2010, to appear in Springer Lecture Notes in<br />

Computer Science *<br />

[MFD-11] K. Palmskog, A.G. Prieto, C. Meirosu, R. Stadler, M. Dam: "Scalable Metadata-<br />

Directed Search in a Network of Information", in Proc. of the Future Network and<br />

Mobile Summit, Florence, Italy, June 2010. *<br />

[MFD-12] K. Jónsson, M. Dam: "Towards Flexible and Secure Distributed Aggregation", in<br />

Mechanisms for Autonomous Management of Networks and Services, Proc. AIMS'10,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!