Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Mark Ryan
Mark Dermot Ryan
Other persons with the same name
2010 – today
- 2013
[j26]Mark Dermot Ryan: Cloud computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software 86(9): 2263-2268 (2013)
[c68]Myrto Arapinis, Véronique Cortier, Steve Kremer, Mark Ryan: Practical Everlasting Privacy. POST 2013: 21-40
[c67]Gurchetan S. Grewal, Mark Dermot Ryan, Sergiu Bursuc, Peter Y. A. Ryan: Caveat Coercitor: Coercion-Evidence in Electronic Voting. IEEE Symposium on Security and Privacy 2013: 367-381
[c66]Masoud Koleini, Eike Ritter, Mark Ryan: Model Checking Agent Knowledge in Dynamic Access Control Policies. TACAS 2013: 448-462
[e8]Catuscia Palamidessi, Mark Dermot Ryan (Eds.): Trustworthy Global Computing - 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers. Lecture Notes in Computer Science 8191, Springer 2013, ISBN 978-3-642-41156-4- 2012
[c65]Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan, Nico Golde, Kevin Redon, Ravishankar Borgaonkar: New privacy issues in mobile telephony: fix and verification. ACM Conference on Computer and Communications Security 2012: 205-216
[c64]
[c63]Myrto Arapinis, Sergiu Bursuc, Mark Ryan: Privacy Supporting Cloud Computing: ConfiChair, a Case Study. POST 2012: 89-108
[c62]Myrto Arapinis, Sergiu Bursuc, Mark Dermot Ryan: Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity. POST 2012: 169-188
[e7]Mark Dermot Ryan, Ben Smyth, Guilin Wang (Eds.): Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7232, Springer 2012, ISBN 978-3-642-29100-5
[i3]Ben Smyth, Mark Dermot Ryan, Liqun Chen: Formal analysis of privacy in Direct Anonymous Attestation schemes. IACR Cryptology ePrint Archive 2012: 650 (2012)- 2011
[j25]
[c61]Myrto Arapinis, Eike Ritter, Mark Dermot Ryan: StatVerif: Verification of Stateful Processes. CSF 2011: 33-47
[c60]Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel: Formal Analysis of Protocols Based on TPM State Registers. CSF 2011: 66-80
[c59]Masoud Koleini, Mark Ryan: A Knowledge-Based Verification Method for Dynamic Access Control Policies. ICFEM 2011: 243-258
[c58]Ben Smyth, Mark Ryan, Liqun Chen: Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes. Formal Aspects in Security and Trust 2011: 245-262
[c57]Sergiu Bursuc, Gurchetan S. Grewal, Mark Dermot Ryan: Trivitas: Voters Directly Verifying Votes. VOTE-ID 2011: 190-207
[i2]Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan: Formal Analysis of UMTS Privacy. CoRR abs/1109.2066 (2011)- 2010
[j24]Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan: Symbolic bisimulation for the applied pi calculus. Journal of Computer Security 18(2): 317-377 (2010)
[j23]Aybek Mukhamedov, Mark Dermot Ryan: Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus. ACM Trans. Inf. Syst. Secur. 13(4): 41 (2010)
[c56]Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan: Analysing Unlinkability and Anonymity Using the Applied Pi Calculus. CSF 2010: 107-121
[c55]Hasan Qunoo, Mark Ryan: Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems. DBSec 2010: 295-302
[c54]Tien Tuan Anh Dinh, Mark Ryan: Verifying Security Property of Peer-to-Peer Systems Using CSP. ESORICS 2010: 319-339
[c53]Steve Kremer, Mark Ryan, Ben Smyth: Election Verifiability in Electronic Voting Protocols. ESORICS 2010: 389-404
[c52]Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel: A Formal Analysis of Authentication in the TPM. Formal Aspects in Security and Trust 2010: 111-125
[c51]Ben Smyth, Mark Ryan, Steve Kremer, Mounira Kourjieh: Towards Automatic Analysis of Election Verifiability Properties. ARSPA-WITS 2010: 146-163
[c50]
[c49]Stéphanie Delaune, Steve Kremer, Mark Ryan: Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster. Towards Trustworthy Elections 2010: 289-309
2000 – 2009
- 2009
[j22]Myrto Arapinis, Muffy Calder, Louise A. Dennis, Michael Fisher, Philip D. Gray, Savas Konur, Alice Miller, Eike Ritter, Mark Ryan, Sven Schewe, Chris Unsworth, Rehana Yasmin: Towards the Verification of Pervasive Systems. ECEASST 22 (2009)
[j21]Stéphanie Delaune, Steve Kremer, Mark Ryan: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security 17(4): 435-487 (2009)
[c48]Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan: Untraceability in the applied pi-calculus. ICITST 2009: 1-6
[c47]Liqun Chen, Mark Ryan: Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. Formal Aspects in Security and Trust 2009: 201-216
[c46]Serdar Cabuk, Liqun Chen, David Plaquin, Mark Ryan: Trusted Integrity Measurement and Reporting for Virtualized Platforms. INTRUST 2009: 180-196
[c45]Andrew Brown, Mark Ryan: Context-Aware Monitoring of Untrusted Mobile Applications. MobiSec 2009: 83-96
[c44]Tien Tuan Anh Dinh, Tom Chothia, Mark Ryan: A Trusted Infrastructure for P2P-based Marketplaces. Peer-to-Peer Computing 2009: 151-154
[c43]Aybek Mukhamedov, Andrew D. Gordon, Mark Ryan: Towards a Verified Reference Implementation of a Trusted Platform Module. Security Protocols Workshop 2009: 69-81- 2008
[j20]Aybek Mukhamedov, Mark Dermot Ryan: Fair multi-party contract signing using private contract signatures. Inf. Comput. 206(2-4): 272-290 (2008)
[j19]Nan Zhang, Mark Ryan, Dimitar P. Guelev: Synthesising verified access control systems through model checking. Journal of Computer Security 16(1): 1-61 (2008)
[c42]Stéphanie Delaune, Steve Kremer, Mark Ryan: Composition of Password-Based Protocols. CSF 2008: 239-251
[c41]Anongporn Salaiwarakul, Mark Dermot Ryan: Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol. ISPEC 2008: 1-13
[c40]Andrew Brown, Mark Ryan: Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software. ISPEC 2008: 233-247
[c39]Anongporn Salaiwarakul, Mark Ryan: Analysis of a Biometric Authentication Protocol for Signature Creation Application. IWSEC 2008: 231-245
[c38]Andrew Brown, Mark Ryan: Monitoring the Execution of Third-Party Software on Mobile Devices. RAID 2008: 410-411
[c37]Tien Tuan Anh Dinh, Mark Ryan: A Sybil-Resilient Reputation Metric for P2P Applications. SAINT 2008: 193-196
[e6]Liqun Chen, Steve Kremer, Mark Dermot Ryan (Eds.): Formal Protocol Verification Applied, 14.10. - 19.10.2007. Dagstuhl Seminar Proceedings 07421, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008
[e5]Liqun Chen, Mark Dermot Ryan, Guilin Wang (Eds.): Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings. Lecture Notes in Computer Science 5308, Springer 2008, ISBN 978-3-540-88624-2- 2007
[j18]
[j17]Nikos Gorogiannis, Mark Ryan: Minimal refinements of specifications in model and termporal logics. Formal Asp. Comput. 19(1): 35-62 (2007)
[j16]Nikos Gorogiannis, Mark Ryan: Minimal refinements of specifications in modal and temporal logics. Formal Asp. Comput. 19(2): 273 (2007)
[j15]Nikos Gorogiannis, Mark Ryan: Minimal refinements of specifications in modal and temporal logics. Formal Asp. Comput. 19(4): 417-444 (2007)
[j14]Dimitar P. Guelev, Mark Dermot Ryan, Pierre-Yves Schobbens: Model-checking the preservation of temporal properties upon feature integration. STTT 9(1): 53-62 (2007)
[c36]Liqun Chen, Steve Kremer, Mark Dermot Ryan: 07421 Executive Summary -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007
[c35]Liqun Chen, Steve Kremer, Mark Dermot Ryan: 07421 Abstracts Collection -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007
[c34]Ben Smyth, Mark Ryan, Liqun Chen: Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. ESAS 2007: 218-231
[c33]Aybek Mukhamedov, Mark Ryan: Improved Multi-party Contract Signing. Financial Cryptography 2007: 179-191
[c32]Stéphanie Delaune, Steve Kremer, Mark Ryan: Symbolic Bisimulation for the Applied Pi Calculus. FSTTCS 2007: 133-145
[c31]Aybek Mukhamedov, Mark Dermot Ryan: Anonymity Protocol with Identity Escrow and Analysis in the Applied n-Calculus. TGC 2007: 330-346- 2006
[j13]Dimitar P. Guelev, Mark Dermot Ryan, Pierre-Yves Schobbens: Synthesising Features by Games. Electr. Notes Theor. Comput. Sci. 145: 79-93 (2006)
[c30]Stéphanie Delaune, Steve Kremer, Mark Ryan: Coercion-Resistance and Receipt-Freeness in Electronic Voting. CSFW 2006: 28-42
[c29]Aybek Mukhamedov, Mark Dermot Ryan: Resolve-Impossibility for a Contract-Signing Protocol. CSFW 2006: 167-176- 2005
[j12]Steve Kremer, Mark Ryan: Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks. Electr. Notes Theor. Comput. Sci. 128(5): 87-104 (2005)
[j11]Dimitar P. Guelev, Mark Dermot Ryan, Pierre-Yves Schobbens: Model-checking the Preservation of Temporal Properties upon Feature Integration. Electr. Notes Theor. Comput. Sci. 128(6): 311-324 (2005)
[c28]Steve Kremer, Mark Ryan: Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. ESOP 2005: 186-200
[c27]Aybek Mukhamedov, Mark Dermot Ryan: On Anonymity with Identity Escrow. Formal Aspects in Security and Trust 2005: 235-243
[c26]Nan Zhang, Mark Ryan, Dimitar P. Guelev: Evaluating Access Control Policies Through Model Checking. ISC 2005: 446-460
[c25]Aidan Harding, Mark Ryan, Pierre-Yves Schobbens: A New Algorithm for Strategy Synthesis in LTL Games. TACAS 2005: 477-492
[e4]Stephan Reiff-Marganiec, Mark Ryan (Eds.): Feature Interactions in Telecommunications and Software Systems VIII, ICFI'05, 28-30 June 2005, Leicester, UK. IOS Press 2005, ISBN 1-58603-524-X- 2004
[b2]Michael Huth, Mark Dermot Ryan: Logic in computer science - modelling and reasoning about systems (2. ed.). Cambridge University Press 2004, pp. I-XIV, 1-427
[c24]Nan Zhang, Mark Ryan, Dimitar P. Guelev: Synthesising verified access control systems in XACML. FMSE 2004: 56-65
[c23]Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobbens: Model-Checking Access Control Policies. ISC 2004: 219-230
[e3]Mark Dermot Ryan, John-Jules Ch. Meyer, Hans-Dieter Ehrich (Eds.): Objects, Agents, and Features, International Seminar, Dagstuhl Castle, Germany, February 2003, Revised and Invited Papers. Lecture Notes in Computer Science 2975, Springer 2004, ISBN 3-540-21989-7- 2003
[c22]John-Jules Ch. Meyer, Mark Dermot Ryan, Hans-Dieter Ehrich: Objects, Agents, and Features: An Introduction. Objects, Agents, and Features 2003: 1-7
[c21]Dimitar P. Guelev, Mark Dermot Ryan, Pierre-Yves Schobbens: Feature Integration as Substitution. FIW 2003: 275-294
[c20]
[c19]Aidan Harding, Mark Ryan, Pierre-Yves Schobbens: Towards Symbolic Strategy Synthesis for \left\langle {\left\langle A \right\rangle } \right\rangle-LTL. TIME 2003: 137-146- 2002
[j10]Nikos Gorogiannis, Mark Ryan: Requirements, specifications, and minimal refinement. Electr. Notes Theor. Comput. Sci. 67: 218-232 (2002)
[j9]Hajnal Andréka, Mark Ryan, Pierre-Yves Schobbens: Operators and Laws for Combining Preference Relations. J. Log. Comput. 12(1): 13-53 (2002)
[j8]Nikos Gorogiannis, Mark Ryan: Implementation of Belief Change Operators Using BDDs. Studia Logica 70(1): 131-156 (2002)
[c18]
[c17]- 2001
[j7]Malte Plath, Mark Ryan: Feature integration using a feature construct. Sci. Comput. Program. 41(1): 53-84 (2001)
[c16]Mark Ryan, Pierre-Yves Schobbens: Agents and Roles: Refinement in Alternating-Time Temporal Logic. ATAL 2001: 100-114
[e2]Franck Cassez, Claude Jard, Brigitte Rozoy, Mark Dermot Ryan (Eds.): Modeling and Verification of Parallel Processes, 4th Summer School, MOVEP 2000, Nantes, France, June 19-23, 2000. Lecture Notes in Computer Science 2067, Springer 2001, ISBN 3-540-42787-2- 2000
[b1]Michael Huth, Mark Dermot Ryan: Logic in computer science - modelling and reasoning about systems. Cambridge University Press 2000, ISBN 978-0-521-65602-3, pp. I-XVII, 1-387
[j6]Alessio Lomuscio, Ron van der Meyden, Mark Ryan: Knowledge in multiagent systems: initial configurations and broadcast. ACM Trans. Comput. Log. 1(2): 247-284 (2000)
[c15]
1990 – 1999
- 1999
[j5]Alessio Lomuscio, Mark Ryan: An algorithmic approach to knowledge evolution. AI EDAM 13(2): 119-132 (1999)
[j4]Christel Baier, Michael Huth, Marta Z. Kwiatkowska, Mark Ryan: Preface. Electr. Notes Theor. Comput. Sci. 22: 1-2 (1999)
[c14]Alessio Lomuscio, Mark Ryan: A Spectrum of Modes of Knowledge Sharing between Agents. ATAL 1999: 13-26
[i1]Alessio Lomuscio, Ron van der Meyden, Mark Ryan: Knowledge in Multi-Agent Systems: Initial Configurations and Broadcast. CoRR cs.LO/9909019 (1999)- 1998
[c13]
[c12]- 1997
[j3]Mark Ryan, Pierre-Yves Schobbens: Counterfactuals and Updates as Inverse Modalities. Journal of Logic, Language and Information 6(2): 123-146 (1997)
[c11]Alessio Lomuscio, Mark Ryan: On the Relation between Interpreted Systems and Kripke Models. Agents and Multi-Agent Systems Formalisms, Methodologies, and Applications 1997: 46-59
[c10]Christel Baier, Edmund M. Clarke, Vassili Hartonas-Garmhausen, Marta Z. Kwiatkowska, Mark Ryan: Symbolic Model Checking for Probabilistic Processes. ICALP 1997: 430-440- 1996
[c9]
[c8]Mark Ryan: Belief Revision and Ordered Theory Presentations. Logic, Action, and Information 1996: 129-151
[c7]Mark Ryan, Pierre-Yves Schobbens, Odinaldo Rodrigues: Counterfactuals and Updates as Inverse Modalities. TARK 1996: 163-173- 1995
[j2]Mark Ryan, Pierre-Yves Schobbens: Belief Revision and Verisimilitude. Notre Dame Journal of Formal Logic 36(1): 15-29 (1995)
[c6]- 1993
[j1]
[c5]
[c4]
[e1]Geoffrey L. Burn, Simon J. Gay, Mark Ryan (Eds.): Theory and Formal Methods 1993, Proceedings of the First Imperial College Department of Computing Workshop on Theory and Formal Methods, Isle of Thorns Conference Centre, Chelwood Gate, Sussex, UK, 29-31 March 1993. Workshops in Computing, Springer 1993, ISBN 3-540-19842-3- 1992
[c3]- 1991
[c2]
[c1]Mark Ryan, José Luiz Fiadeiro, T. S. E. Maibaum: Sharing Actions and Attributes in Modal Action Logic. TACS 1991: 569-593
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:58 CEST by the dblp team



