Michael Huth
Michael Huth
Professor of Computer Science, Computing, Imperial College London
Verified email at
Cited by
Cited by
Logic in Computer Science: Modelling and reasoning about systems
M Huth, M Ryan
Cambridge university press, 2004
Modal transition systems: A foundation for three-valued program analysis
M Huth, R Jagadeesan, D Schmidt
Programming Languages and Systems: 10th European Symposium on Programming …, 2001
Abstraction-based model checking using modal transition systems
P Godefroid, M Huth, R Jagadeesan
International conference on concurrency theory, 426-440, 2001
Quantitative analysis and model checking
M Huth, M Kwiatkowska
Proceedings of Twelfth Annual IEEE Symposium on Logic in Computer Science …, 1997
Assume-guarantee model checking of software: A comparative case study
CS Păsăreanu, MB Dwyer, M Huth
International SPIN Workshop on Model Checking of Software, 168-183, 1999
Relationship-based access control: its expression and enforcement through hybrid logic
G Bruns, PWL Fong, I Siahaan, M Huth
Proceedings of the second ACM conference on Data and Application Security …, 2012
A simple and expressive semantic framework for policy composition in access control
G Bruns, DS Dantas, M Huth
Proceedings of the 2007 ACM workshop on Formal methods in security …, 2007
Access control via Belnap logic: Intuitive, expressive, and analyzable policy composition
G Bruns, M Huth
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-27, 2011
20 years of modal and mixed specifications
A Antonik, M Huth, KG Larsen, U Nyman, A Wasowski
Bulletin of the European Association for Theoretical Computer Science, 2008
Access-control policies via Belnap logic: Effective and efficient composition and analysis
G Bruns, M Huth
2008 21st IEEE Computer Security Foundations Symposium, 163-176, 2008
Model checking vs. generalized model checking: Semantic minimizations for temporal logics
P Godefroid, M Huth
20th Annual IEEE Symposium on Logic in Computer Science (LICS'05), 158-167, 2005
Towards an access-control framework for countering insider threats
J Crampton, M Huth
Insider Threats in Cyber Security, 173-195, 2010
Complexity of decision problems for mixed and modal specifications
A Antonik, M Huth, KG Larsen, U Nyman, A Wąsowski
Foundations of Software Science and Computational Structures: 11th …, 2008
On finite-state approximants for probabilistic computation tree logic
M Huth
Theoretical Computer Science 346 (1), 113-134, 2005
A domain equation for refinement of partial systems
MRA Huth, R Jagadeesan, DA Schmidt
Mathematical Structures in Computer Science 14 (4), 469-505, 2004
On model checking multiple hybrid views
A Hussain, M Huth
Theoretical computer science 404 (3), 186-201, 2008
An authorization framework resilient to policy evaluation failures
J Crampton, M Huth
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
Model checking modal transition systems using Kripke structures
M Huth
International Workshop on Verification, Model Checking, and Abstract …, 2002
Secure communicating systems: design, analysis, and implementation
M Huth
Cambridge University Press, 2001
Linear domains and linear maps
M Huth
International Conference on Mathematical Foundations of Programming …, 1993
The system can't perform the operation now. Try again later.
Articles 1–20