Nielson, Flemming, 1955-....
Nielson, Flemming
Flemming Nielson Danish professor
VIAF ID: 51843762 (Personal)
Permalink: http://viaf.org/viaf/51843762
Preferred Forms
- 100 0 _ ‡a Flemming Nielson ‡c Danish professor
-
- 100 1 _ ‡a Nielson, Flemming
-
-
-
-
- 100 1 _ ‡a Nielson, Flemming ‡d 1955-
- 100 1 _ ‡a Nielson, Flemming ‡d 1955-
-
-
-
-
- 100 1 0 ‡a Nielson, Flemming, ‡d 1955-
- 100 1 _ ‡a Nielson, Flemming, ‡d 1955-....
4xx's: Alternate Name Forms (3)
5xx's: Related Names (1)
- 500 1 _ ‡a Nielson, Hanne Riis ‡d 1954- ‡4 bezf ‡4 https://d-nb.info/standards/elementset/gnd#familialRelationship ‡e Beziehung familiaer
Works
Title | Sources |
---|---|
Automated Generation of Attack Trees | |
Behaviour analysis for validating communication patterns | |
Broadcast, Denial-of-Service, and Secure Communication | |
Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces | |
Compiler writing using denotational semantics | |
Denmark. Hof- og statskal., 1988: | |
Design, analysis and reasoning about tools | |
Design-efficiency in security | |
Discretionary Information Flow Control for Interaction-Oriented Specifications | |
Effect-driven QuickChecking of compilers | |
Experiments with succinct solvers | |
Explicit Versus Symbolic Algorithms for Solving ALFP Constraints | |
Factorization of Behavioral Integrity | |
Formal methods : an appetizer | |
From CML to process algebras | |
From Explicit to Symbolic Types for Communication Protocols in CCS | |
Functional completeness of the mixed λ-calculus and combinatory logic | |
Future-dependent Flow Policies with Prophetic Variables | |
A generic approach for security policies composition | |
The Guided System Development Framework: Modeling and Verifying Communication Systems | |
Hoare Logic for Disjunctive Information Flow | |
Interprocedural control flow analysis | |
Iterated process analysis over lattice-valued regular expressions | |
Iterative algorithms for fixed point computation | |
Key Update Assistant for resource-constrained networks | |
Klaim-DB: A Modeling Language for Distributed Database Applications | |
Lazy mobile intruders | |
LBTool: A stochastic toolkit for leave-based key updates | |
The Logic of XACML | |
ML with concurrency design, analysis, implementation, and application | |
Modal abstractions of concurrent behavior | |
Model Checking Exact Cost for Attack Scenarios | |
Model Checking Multivariate State Rewards | |
A monotone framework for CCS | |
Observation predicated in flow logic | |
Pareto Efficient Solutions of Attack-Defence Trees | |
Pathway analysis for BioAmbients | |
Performance Evaluation of Security Protocols Specified in LySa | |
Polymorphic subtyping for effect analysis | |
Principles of program analysis | |
Process-Local Static Analysis of Synchronous Processes | |
Program transformations in a denotational setting | |
Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study | |
REACHABILITY FOR FINITE-STATE PROCESS ALGEBRAS USING HORN CLAUSES | |
Recursive Advice for Coordination | |
Secure Information Release in Timed Automata | |
A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks | |
Security for mobility | |
Semantic foundations of data flow analysis | |
Semantics with applications an appetizer | |
Set-Pi: Set Membership p-Calculus | |
Static Analysis for the π-Calculus with Applications to Security | |
Static analysis of topology-dependent broadcast networks | |
Static and dynamic processor allocation for higher-order concurrent languages | |
Static Validation of Licence Conformance Policies | |
The Stochastic Quality Calculus | |
Strictness and totality analysis | |
The tensor product in Wadler's analysis of lists | |
Tensor products generalize the relational data flow analysis method | |
Termination analysis based on operational semantics | |
Theoretical aspects of semantics-based language implementation = Teoretiske aspekter af semantik-baseret sprog-implementation | |
Towards a denotational theory of abstract interpretation | |
Towards Static Analysis of Policy-Based Self-adaptive Computing Systems | |
Trustworthy global computing : 4th International Symposium, TGC 2008, Barcelona, Spain, November 3-4, 2008 : revised selected papers | |
Two-level functional languages | |
Two-level semantics and code generation | |
Type and effect systems : behaviours for concurrency | |
Uniform Protection for Multi-exposed Targets | |
Using transformations in the implementation of higher-order functions | |
Verification of a compiling specification | |
What is a free name in a process algebra? | |
XACML 3.0 in Answer Set Programming | |
The ¤TML-approach to compiler-compilers | |
The ¤typed λ-calculus with first-class processes |