Appendix 2: CV & publications - KTH
Appendix 2: CV & publications - KTH
Appendix 2: CV & publications - KTH
- No tags were found...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Publication List 2006-2011 of M. F. Dam<br />
1<br />
According to the instructions, <strong>publications</strong> marked with "*" is a result of ACCESS<br />
collaboration (ACCESS Faculty or Postdoc)<br />
A. Peer-reviewed articles<br />
[MFD-1] M. Dam, B. Jacobs, A. Lundblad, F. Piessens "Security Monitor Inlining and<br />
Certification for Multithreaded Java," to appear in Mathematical Structures in<br />
Computer Science (MSCS), Cambridge University Press<br />
[MFD-2] M. Dam, B. Jacobs, A. Lundblad, F. Piessens: “Provably Correct Inline Monitoring<br />
for Multi-threaded Java-like Programs”, Journal of Computer Security vol 18, number<br />
1, pp. 37-59, 2010.<br />
[MFD-3] F. Wuhib, M. Dam, R. Stadler, "A Gossiping Protocol for Detecting Global<br />
Threshold Crossings", IEEE Transactions on Network and Service Management<br />
(TNSM), Vol. 7, No. 1, March 2010, DOI 10.1109/T-WC.2008.I9P0329 *<br />
[MFD-4] I. Aktug, M. Dam, D. Gurov: “Provably Correct Runtime Monitoring”, Journal of<br />
Logic and Algebraic Programming. Volume 78, Issue 5, Pages 304-339 (May-June<br />
2009).<br />
[MFD-5] F. Wuhib, M. Dam, R. Stadler, A. Clemm "Robust Monitoring of Network-wide<br />
Aggregates through Gossiping," IEEE Transactions on Network and Service<br />
Management (TNSM), Vol. 6, No. 2, June 2009. *<br />
[MFD-6] M. Cohen, M. Dam: “A Completeness result for BAN logic”, To appear in Journal<br />
of Logic, Language, and Information.<br />
[MFD-7] F. Wuhib, M. Dam, R. Stadler, A. Clemm. “Decentralized Detection of Global<br />
Threshold Crossings Using Aggregation Trees.” Computer Networks 52 (2008) 1745–<br />
1761 *<br />
B. Peer-reviewed conference <strong>publications</strong>:<br />
[MFD-8] D. Guerev, M. Dam: "An epistemic predicate CTL* for finite control pi-processes"<br />
Proc. LAMAS 2011, to appear in Springer Lecture Notes in Computer Science, 2011<br />
[MFD-9] M. Balliu and M. Dam and G. Le Guernic. Epistemic Temporal Logic for<br />
Information Flow Security . In the Proc.of ACM SIGPLAN Programming Languages<br />
and Analysis for Security (PLAS '11 ). San Jose, CA, USA. June 5, 2011<br />
[MFD-10] G. Kreitz, D. Wikström, M. Dam: "Practical Private Information Aggregation in<br />
Large Networks" Proc. NordSec 2010, to appear in Springer Lecture Notes in<br />
Computer Science *<br />
[MFD-11] K. Palmskog, A.G. Prieto, C. Meirosu, R. Stadler, M. Dam: "Scalable Metadata-<br />
Directed Search in a Network of Information", in Proc. of the Future Network and<br />
Mobile Summit, Florence, Italy, June 2010. *<br />
[MFD-12] K. Jónsson, M. Dam: "Towards Flexible and Secure Distributed Aggregation", in<br />
Mechanisms for Autonomous Management of Networks and Services, Proc. AIMS'10,