Publications

Peer-reviewed publications

Generated using php-bibHTML by Hugo Jonker, based on the BiblioPhile PHP BibTex parser.

  • 2020:
    1. Session Subtyping and Multiparty Compatibility Using Circular Sequents. R. Horne. In 31st International Conference on Concurrency Theory (CONCUR 2020). Schloss Dagstuhl–Leibniz-Zentrum für Informatik, Leibniz International Proceedings in Informatics (LIPIcs) 171, pp. 12:1–12:22, 2020. bib | preprint | DOI ]
    2. Logic Beyond Formulas: A Graphical Proof System. M. Acclavio, R. Horne and L. Straßburger. In 35th Annual ACM⁄IEEE Symposium on Logic in Computer Science (LICS ’20), July 8–11, 2020, Saarbrücken, Germany. ACM, pp. 15, 2020. bib | preprint | DOI ]
    3. Global types with internal delegation. I. Castellani, M. Dezani-Ciancaglini, P. Giannini and R. Horne. Theoretical Computer Science, 807:128 - 153, 2020. bib | preprint | DOI ]
  • 2019:
    1. Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers. M. Albanese, R. Horne and C.W. Probst, editors. Lecture Notes in Computer Science 11720, 2019. bib | preprint | DOI ]
    2. Breaking Unlinkability of the ICAO 9303 Standard for e-Passports Using Bisimilarity. I. Filimonov, R. Horne, S. Mauw and Z. Smith. In Computer Security – ESORICS 2019. Springer International Publishing, pp. 577–594, 2019. bib | preprint | DOI ]
    3. The Sub-Additives: A Proof Theory for Probabilistic Choice extending Linear Logic. R. Horne. In 4th International Conference on Formal Structures for Computation and Deduction (FSCD 2019).. LIPIcs, 2019. bib | preprint | DOI ]
    4. De Morgan Dual Nominal Quantifiers Modelling Private Names in Non-Commutative Logic. R. Horne, A. Tiu, B. Aman and G. Ciobanu. ACM Transactions in Computational Logic (TOCL), 20(4):22:1–22:44, 2019. bib | preprint | DOI ]
    5. Constructing Weak Simulations from Linear Implications for Processes with Private Names. R. Horne and A. Tiu. Mathematical Structures in Computer Science, 29(8):1275-1308, 2019. bib | preprint | DOI ]
  • 2018:
    1. The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement. R. Horne, S. Mauw and A. Tiu. In Graphical Models for Security. Springer International Publishing, pp. 90–110, 2018. bib | preprint | DOI ]
    2. Quasi-Open Bisimilarity with Mismatch is Intuitionistic. R. Horne, K. Ahn, S. Lin and A. Tiu. In In Proceedings of LICS ’18: 33rd Annual ACM⁄IEEE Symposium on Logic in Computer Science, Oxford, United Kingdom, July 9-12, 2018 (LICS ’18). pp. 26-35, 2018. bib | preprint | DOI ]
  • 2017:
    1. A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic. K. Ahn, R. Horne and A. Tiu. In 28th International Conference on Concurrency Theory (CONCUR 2017).. Leibniz International Proceedings in Informatics 85, pp. 7:1-7:17, 2017. bib | preprint | DOI ]
    2. Semantics for Specialising Attack Trees based on Linear Logic. R. Horne, S. Mauw and A. Tiu. Fundamenta Informaticae, 153(1-2):57-86, 2017. bib | preprint | DOI ]
  • 2016:
    1. Private Names in Non-Commutative Logic. R. Horne, A. Tiu, B. Aman and G. Ciobanu. In 27th International Conference on Concurrency Theory (CONCUR 2016). Leibniz International Proceedings in Informatics, pp. 31:1-31:16, 2016. bib | preprint | DOI ]
    2. A descriptive type foundation for RDF Schema. G. Ciobanu, R. Horne and V. Sassone. Journal of Logical and Algebraic Methods in Programming, 85(5):681-706, 2016. bib | preprint | DOI ]
    3. SPEC: An Equivalence Checker for Security Protocols. A. Tiu, N. Nguyen and R. Horne. In Programming Languages and Systems - 14th Asian Symposium, APLAS 2016, Hanoi, Vietnam, November 21-23, 2016, Proceedings. pp. 87–95, 2016. bib | DOI ]
  • 2015:
    1. The consistency and complexity of multiplicative additive system virtual. R. Horne. Scientific Annals of Computer Science, 25(2):245-316, 2015. bib | preprint | DOI ]
    2. Behavioural analysis of sessions using the calculus of structures. G. Ciobanu and R. Horne. In In Perspectives of System Informatics, 10th International Andrei Ershov Informatics Conference, PSI 2015, in Memory of Helmut Veith, Kazan and Innopolis, Russia, August 24-27. Springer, LNCS 9609, pp. 91-106, 2015. bib | preprint | DOI ]
    3. Minimal type inference for Linked Data consumers. G. Ciobanu, R. Horne and V. Sassone. Journal of Logical and Algebraic Methods in Programming, 84(4):485-504, 2015. bib | preprint | DOI ]
    4. Embracing Global Computing in Emerging Economies - First Workshop, EGC 2015, Almaty, Kazakhstan, February 26-28, 2015. Proceedings. R. Horne, editor. Communications in Computer and Information Science 514, 2015. bib | DOI ]
  • 2014:
    1. A verified algebra for read-write Linked Data. R. Horne and V. Sassone. Sci. Comput. Program., 89:2–22, 2014. bib | DOI ]
  • 2013:
    1. Non-interleaving Operational Semantics for Geographically Replicated Databases. G. Ciobanu and R. Horne. In 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2013, Timisoara, Romania, September 23-26, 2013. IEEE Computer Society, pp. 440–447, 2013. bib | DOI ]
  • 2012:
    1. Tracing where and who provenance in Linked Data: A calculus. M. Dezani-Ciancaglini, R. Horne and V. Sassone. Theor. Comput. Sci., 464:113–129, 2012. bib | DOI ]
  • 2011:
    1. Operational Semantics for SPARQL Update. R. Horne, V. Sassone and N. Gibbins. In The Semantic Web - Joint International Semantic Technology Conference, JIST 2011, Hangzhou, China, December 4-7, 2011. Proceedings. Springer, Lecture Notes in Computer Science 7185, pp. 242–257, 2011. bib | DOI ]