Publications

Peer-reviewed publications

Generated using php-bibHTML by Hugo Jonker, based on the BiblioPhile PHP BibTex parser.

  • 2023:
    1. Provably Unlinkable Smart Card-based Payments. S. Bursuc, R. Horne, S. Mauw and S. Yurkov. In In proceedings of ACM onference on Computer and Communications Security (CCS) 2023 26-30 NOV. 2023 Tivoli Congress Center, Copenhagen, Denmark. 2023. bib ]
    2. Assessing the Solid Protocol in Relation to Security and Privacy Obligations. C. Esposito, R. Horne, L. Robaldo, B. Buelens and E. Goesaert. Information, 14(7), 2023. bib | preprint | DOI ]
    3. Anomaly detection using deep learning respecting the resources on board a CubeSat. R. Horne, S. Mauw, A. Mizera and J. Thoemel. Journal of Aerospace Information Systems, 2023. bib | DOI ]
    4. A Logical Account of Subtyping for Session Types. R. Horne and L. Padovani. In Proceedings 14th Workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software, PLACES@ETAPS 2023, Paris, France, 22 April 2023. EPTCS 378, pp. 26–37, 2023. bib | preprint | DOI ]
    5. When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied π-calculus. R. Horne, S. Mauw and S. Yurkov. Theor. Comput. Sci., 959:113842, 2023. bib | preprint | DOI ]
    6. Software Certification as a Limit on Liability: the Case of Cubesat Operations. M. Crepaldi, R. Horne and S. Mauw. In Space Law in a Networked World, Brill, Studies in Space Law 19, pp. 162-186, 2023. bib | preprint | DOI ]
  • 2022:
    1. Diamonds for Security: A Non-Interleaving Operational Semantics for the Applied Pi-Calculus. C. Aubert, R. Horne and C. Johansen. In 33rd International Conference on Concurrency Theory (CONCUR 2022) 12-16 September, Warsaw, Poland. LIPIcs, pp. 30:1–30:26, 2022. bib | DOI ]
    2. Bisimulations Respecting Duration and Causality for the Non-interleaving Applied π-Calculus. C. Aubert, R. Horne and C. Johansen. In Proceedings Combined 29th International Workshop on Expressiveness in Concurrency and 19th Workshop on Structural Operational Semantics (EXPRESS⁄SOS 2022), Warsaw, Poland, 12th September 2022. Electronic Proceedings in Theoretical Computer Science 368, pp. 3–22, 2022. bib | DOI ]
    3. A Graphical Proof Theory of Logical Time. M. Acclavio, R. Horne, S. Mauw and L. Straßburger. In 7th International Conference on Formal Structures for Computation and Deduction (FSCD 2022). Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Leibniz International Proceedings in Informatics (LIPIcs) 228, pp. 22:1–22:25, 2022. bib | DOI ]
    4. Is Eve nearby? Analysing protocols under the distant-attacker assumption. R. Gil-Pons, R. Horne, S. Mauw, A. Tiu and R. Trujillo. In IEEE Computer Security Foundations Symposium 2022 (CSF2022), August, 2022, Haifa, Israel. pp. 17-32, 2022. bib | preprint | DOI ]
    5. Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments. R. Horne, S. Mauw and S. Yurkov. In IEEE Computer Security Foundations Symposium 2022 (CSF2022), August, 2022, Haifa, Israel. pp. 364-379, 2022. bib | preprint | DOI ]
    6. Process Algebra Can Save Lives: Static Analysis of XACML Access Control Policies using mCRL2. H. Arshad, R. Horne, C. Johansen, O. Owe and T. Willemse. In FORTE 2022 - 42nd International Conference on Formal Techniques for Distributed Objects, Components, and Systems. Springer, Lecture Notes in Computer Science 13273, 2022. bib | preprint | DOI ]
    7. Theories of life and computation: Special issue on the occasion of the 65th birthday of Professor Gabriel Ciobanu. 2022. bib | DOI ]
    8. An Analytic Propositional Proof System on Graphs. M. Acclavio, R. Horne and L. Straßburger. Logical Methods in Computer Science, 18(4):1:1–1:80, 2022. bib | preprint | DOI ]
    9. Cloud Removal from Satellite Imagery using Multispectral Edge-filtered Conditional Generative Adversarial Networks. C. Hasan, R. Horne, S. Mauw and A. Mizera. International Journal of Remote Sensing, 43(5):1881-1893, 2022. bib | DOI ]
  • 2021:
    1. Compositional Analysis of Protocol Equivalence in the Applied π-Calculus Using Quasi-open Bisimilarity. R. Horne, S. Mauw and S. Yurkov. In Theoretical Aspects of Computing – ICTAC 2021. Springer International Publishing, pp. 235–255, 2021. bib | DOI ]
    2. Assuming Just Enough Fairness to make Session Types Complete for Lock-freedom. R.J. van Glabeek, P. Höfner and R. Horne. In 36th Annual ACM⁄IEEE Symposium on Logic in Computer Science (LICS ’21). IEEE, pp. 1-16, 2021. bib | preprint | DOI ]
    3. A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic. K. Ahn, R. Horne and A. Tiu. Logical Methods in Computer Science, 17(3):2:1–2:40, 2021. bib | preprint | DOI ]
    4. Discovering ePassport Vulnerabilities using Bisimilarity. R. Horne and S. Mauw. Logical Methods in Computer Science, 17(2):24:1–24:52, 2021. bib | preprint | DOI ]
  • 2020:
    1. Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees. D.M. Gabbay, R. Horne, S. Mauw and L. van der Torre. In Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers. Springer, Lecture Notes in Computer Science 12419, pp. 143–165, 2020. bib | preprint | DOI ]
    2. Session Subtyping and Multiparty Compatibility Using Circular Sequents. R. Horne. In 31st International Conference on Concurrency Theory (CONCUR 2020). Schloss Dagstuhl–Leibniz-Zentrum für Informatik, Leibniz International Proceedings in Informatics (LIPIcs) 171, pp. 12:1–12:22, 2020. bib | preprint | DOI ]
    3. Logic Beyond Formulas: A Graphical Proof System. M. Acclavio, R. Horne and L. Straßburger. In 35th Annual ACM⁄IEEE Symposium on Logic in Computer Science (LICS ’20), July 8–11, 2020, Saarbrücken, Germany. ACM, pp. 15, 2020. bib | preprint | DOI ]
    4. Global types with internal delegation. I. Castellani, M. Dezani-Ciancaglini, P. Giannini and R. Horne. Theoretical Computer Science, 807:128 - 153, 2020. bib | preprint | DOI ]
  • 2019:
    1. Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers. M. Albanese, R. Horne and C.W. Probst, editors. Lecture Notes in Computer Science 11720, 2019. bib | preprint | DOI ]
    2. Breaking Unlinkability of the ICAO 9303 Standard for e-Passports Using Bisimilarity. I. Filimonov, R. Horne, S. Mauw and Z. Smith. In Computer Security – ESORICS 2019. Springer International Publishing, pp. 577–594, 2019. bib | preprint | DOI ]
    3. The Sub-Additives: A Proof Theory for Probabilistic Choice extending Linear Logic. R. Horne. In 4th International Conference on Formal Structures for Computation and Deduction (FSCD 2019).. LIPIcs, pp. 23:1–23:16, 2019. bib | preprint | DOI ]
    4. De Morgan Dual Nominal Quantifiers Modelling Private Names in Non-Commutative Logic. R. Horne, A. Tiu, B. Aman and G. Ciobanu. ACM Transactions in Computational Logic (TOCL), 20(4):22:1–22:44, 2019. bib | preprint | DOI ]
    5. Constructing Weak Simulations from Linear Implications for Processes with Private Names. R. Horne and A. Tiu. Mathematical Structures in Computer Science, 29(8):1275-1308, 2019. bib | preprint | DOI ]
  • 2018:
    1. The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement. R. Horne, S. Mauw and A. Tiu. In Graphical Models for Security. Springer International Publishing, pp. 90–110, 2018. bib | preprint | DOI ]
    2. Quasi-Open Bisimilarity with Mismatch is Intuitionistic. R. Horne, K. Ahn, S. Lin and A. Tiu. In In Proceedings of LICS ’18: 33rd Annual ACM⁄IEEE Symposium on Logic in Computer Science, Oxford, United Kingdom, July 9-12, 2018 (LICS ’18). pp. 26-35, 2018. bib | preprint | DOI ]
  • 2017:
    1. A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic. K. Ahn, R. Horne and A. Tiu. In 28th International Conference on Concurrency Theory (CONCUR 2017).. Leibniz International Proceedings in Informatics 85, pp. 7:1-7:17, 2017. bib | preprint | DOI ]
    2. Semantics for Specialising Attack Trees based on Linear Logic. R. Horne, S. Mauw and A. Tiu. Fundamenta Informaticae, 153(1-2):57-86, 2017. bib | preprint | DOI ]
  • 2016:
    1. Private Names in Non-Commutative Logic. R. Horne, A. Tiu, B. Aman and G. Ciobanu. In 27th International Conference on Concurrency Theory (CONCUR 2016). Leibniz International Proceedings in Informatics, pp. 31:1-31:16, 2016. bib | preprint | DOI ]
    2. A descriptive type foundation for RDF Schema. G. Ciobanu, R. Horne and V. Sassone. Journal of Logical and Algebraic Methods in Programming, 85(5):681-706, 2016. bib | preprint | DOI ]
    3. SPEC: An Equivalence Checker for Security Protocols. A. Tiu, N. Nguyen and R. Horne. In Programming Languages and Systems - 14th Asian Symposium, APLAS 2016, Hanoi, Vietnam, November 21-23, 2016, Proceedings. Lecture Notes in Computer Science 10017, pp. 87–95, 2016. bib | DOI ]
  • 2015:
    1. The consistency and complexity of multiplicative additive system virtual. R. Horne. Scientific Annals of Computer Science, 25(2):245-316, 2015. bib | preprint | DOI ]
    2. Behavioural analysis of sessions using the calculus of structures. G. Ciobanu and R. Horne. In In Perspectives of System Informatics, 10th International Andrei Ershov Informatics Conference, PSI 2015, in Memory of Helmut Veith, Kazan and Innopolis, Russia, August 24-27. Springer, LNCS 9609, pp. 91-106, 2015. bib | preprint | DOI ]
    3. Minimal type inference for Linked Data consumers. G. Ciobanu, R. Horne and V. Sassone. Journal of Logical and Algebraic Methods in Programming, 84(4):485-504, 2015. bib | preprint | DOI ]
    4. Embracing Global Computing in Emerging Economies - First Workshop, EGC 2015, Almaty, Kazakhstan, February 26-28, 2015. Proceedings. R. Horne, editor. Communications in Computer and Information Science 514, 2015. bib | DOI ]
  • 2014:
    1. A verified algebra for read-write Linked Data. R. Horne and V. Sassone. Sci. Comput. Program., 89:2–22, 2014. bib | DOI ]
  • 2013:
    1. Non-interleaving Operational Semantics for Geographically Replicated Databases. G. Ciobanu and R. Horne. In 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2013, Timisoara, Romania, September 23-26, 2013. IEEE Computer Society, pp. 440–447, 2013. bib | DOI ]
  • 2012:
    1. Tracing where and who provenance in Linked Data: A calculus. M. Dezani-Ciancaglini, R. Horne and V. Sassone. Theor. Comput. Sci., 464:113–129, 2012. bib | DOI ]
  • 2011:
    1. Operational Semantics for SPARQL Update. R. Horne, V. Sassone and N. Gibbins. In The Semantic Web - Joint International Semantic Technology Conference, JIST 2011, Hangzhou, China, December 4-7, 2011. Proceedings. Springer, Lecture Notes in Computer Science 7185, pp. 242–257, 2011. bib | DOI ]