• United Kingdom

Accepting PhD Students

PhD projects

Prospective PhD students should send an email to [email protected] providing their CV and an explanation of their research interests in the area of security and privacy. Please contact me early so the appropriate scholarship or industrial partnership may be identified. A PhD student can expect to seek under my guidance security and privacy problems that appear in emerging systems, and to use those problems to drive better methodologies for identifying and eliminating threats. See, for example, the thesis of my former PhD student Semen Yurkov, who considered privacy-preserving smartcard-based payments.

Students with strong mathematical and computer science skills are suited to topics in security. I can also propose software engineering problems, e.g., prototyping and evaluating emerging privacy-preserving technology. Students with an entrepreneurial streak are also welcome. See my personalised homepage for a selection of topics, across several domains (logic, space systems, ePassports, ePayments, personal data, concurrency theory, proof theory, API composition, threat modelling, etc.):

https://personal.cis.strath.ac.uk/ross.horne/

Filter
Conference contribution book

Search results

  • 2024

    Brewer-Nash scrutinised: mechanised checking of policies featuring write revocation

    Capozucca, A., Cristia, M., Horne, R. & Katz, R., 20 Sept 2024, 2024 IEEE 37th Computer Security Foundations Symposium (CSF). Los Alamitos, CA, USA, p. 112-126 15 p. (2024 IEEE 37th Computer Security Foundations Symposium (CSF)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • SSI, from specifications to protocol? Formally verify security!

    Braun, C.H.-J., Horne, R., Käfer, T. & Mauw, S., 13 May 2024, WWW '24: Proceedings of the ACM on Web Conference 2024. p. 1620–1631 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    1 Citation (Scopus)
    5 Downloads (Pure)
  • 2023

    Provably unlinkable smart card-based payments

    Bursuc, S., Horne, R., Mauw, S. & Yurkov, S., 15 Nov 2023, CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, p. 1392-1406 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    11 Downloads (Pure)
  • A logical account of subtyping for session types

    Horne, R. & Padovani, L., 13 Apr 2023, Proceedings 14th Workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software. Castellani, I. & Scalas, A. (eds.). Waterloo, NSW: Open Publishing Association, Vol. 378. p. 26-37 12 p. (Electronic Proceedings in Theoretical Computer Science; vol. 378).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    4 Citations (Scopus)
    19 Downloads (Pure)
  • 2022

    Is Eve nearby? Analysing protocols under the distant-attacker assumption

    Gil-Pons, R., Horne, R., Mauw, S., Tiu, A. & Trujillo-Rasua, R., 31 Oct 2022, 2022 IEEE 35th Computer Security Foundations Symposium (CSF). Piscataway, NJ: IEEE, p. 17-32 16 p. (IEEE Computer Security Foundations Symposium; vol. 2022-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    2 Citations (Scopus)
  • Unlinkability of an improved key agreement protocol for EMV 2nd gen payments

    Horne, R., Mauw, S. & Yurkov, S., 31 Oct 2022, 2022 IEEE 35th Computer Security Foundations Symposium, CSF 2022. Piscataway, NJ: IEEE, p. 364-379 16 p. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2022-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    6 Citations (Scopus)
  • Bisimulations respecting duration and causality for the non-interleaving applied pi-calculus

    Aubert, C., Horne, R. & Johansen, C., 6 Sept 2022, Proceedings Combined 29th International Workshop on Expressiveness in Concurrency and 19th Workshop on Structural Operational Semantics. Castiglioni, V. & Mezzina, C. A. (eds.). Waterloo, NSW: Open Publishing Association, p. 3-22 20 p. (Electronic Proceedings in Theoretical Computer Science; vol. 368).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    1 Citation (Scopus)
    28 Downloads (Pure)
  • Diamonds for security: a non-interleaving operational semantics for the applied pi-calculus

    Aubert, C., Horne, R. & Johansen, C., 6 Sept 2022, 33rd International Conference on Concurrency Theory . Klin, B., Lasota, S. & Muscholl, A. (eds.). Wadern, Germany: Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 30:1-30:26 26 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    3 Citations (Scopus)
    8 Downloads (Pure)
  • A graphical proof theory of logical time

    Acclavio, M., Horne, R., Mauw, S. & Straßburger, L., 28 Jun 2022, 7th International Conference on Formal Structures for Computation and Deduction (FSCD 2022). Felty, A. P. (ed.). Dagstuhl, Germany, Vol. 228. p. 22:1-22:25 25 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    5 Citations (Scopus)
    13 Downloads (Pure)
  • Process algebra can save lives: static analysis of XACML access control policies using mCRL2

    Arshad, H., Horne, R., Johansen, C., Owe, O. & Willemse, T. A. C., 12 Jun 2022, Formal Techniques for Distributed Objects, Components, and Systems - 42nd IFIP WG 6.1 International Conference, FORTE 2022, Held as Part of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022, Proceedings. Mousavi, M. R. & Philippou, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 11-30 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13273 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    1 Citation (Scopus)
  • 2021

    Assuming just enough fairness to make session types complete for lock-freedom

    Glabbeek, R. V., Hofner, P. & Horne, R., 29 Jun 2021, 2021 36th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2021. p. 1-13 13 p. 9470531. (Proceedings - Symposium on Logic in Computer Science; vol. 2021-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    21 Citations (Scopus)
  • 2020

    Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees

    Gabbay, D. M., Horne, R., Mauw, S. & van der Torre, L., 8 Dec 2020, Graphical Models for Security - 7th International Workshop, GraMSec 2020, Revised Selected Papers. Eades III, H. & Gadyatskaya, O. (eds.). Cham: Springer Science and Business Media Deutschland GmbH, Vol. 12419. p. 143-165 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12419 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    2 Citations (Scopus)
  • Session subtyping and multiparty compatibility using circular sequents

    Horne, R., 26 Aug 2020, 31st International Conference on Concurrency Theory, CONCUR 2020. Konnov, I. & Kovacs, L. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Vol. 171. p. 12.1-12.22 22 p. 12. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 171).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    11 Citations (Scopus)
    11 Downloads (Pure)
  • Logic beyond formulas: a proof system on graphs

    Acclavio, M., Horne, R. & Straßburger, L., 8 Jul 2020, Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2020. p. 38-52 15 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    9 Citations (Scopus)
    39 Downloads (Pure)
  • 2019

    Breaking unlinkability of the ICAO 9303 standard for e-passports using bisimilarity

    Filimonov, I., Horne, R., Mauw, S. & Smith, Z., 15 Sept 2019, Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Proceedings. Sako, K., Schneider, S. & Ryan, P. Y. A. (eds.). Cham: Springer, Vol. 11735. p. 577-594 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11735 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    15 Citations (Scopus)
  • The sub-additives: a proof theory for probabilistic choice extending linear logic

    Horne, R., 18 Jun 2019, 4th International Conference on Formal Structures for Computation and Deduction, FSCD 2019. Geuvers, H. & Geuvers, H. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Vol. 131. p. 23:1-23:16 16 p. 23. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 131).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    7 Citations (Scopus)
    9 Downloads (Pure)
  • The attacker does not always hold the initiative: attack trees with external refinement

    Horne, R., Mauw, S. & Tiu, A., 31 Mar 2019, Graphical Models for Security - 5th International Workshop, GraMSec 2018, Revised Selected Papers. Pym, D., Cybenko, G. & Fila, B. (eds.). Cham: Springer-Verlag, Vol. 11086 . p. 90-110 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11086 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • 2018

    Quasi-open bisimilarity with mismatch is intuitionistic

    Horne, R., Ahn, K. Y., Lin, S.-W. & Tiu, A., 9 Jul 2018, Proceedings of LICS '18: 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, Oxford, United Kingdom, July 9-12, 2018 (LICS '18). Association for Computing Machinery (ACM), p. 26-35 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    11 Citations (Scopus)
    21 Downloads (Pure)
  • 2017

    A characterisation of open bisimilarity using an intuitionistic modal logic

    Ahn, K. Y., Horne, R. & Tiu, A., 1 Aug 2017, 28th International Conference on Concurrency Theory. Meyer, R. & Nestmann, U. (eds.). Saarbrücken/Wadern: Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 7:1–7:17 17 p. 7. (Leibniz International Proceedings in Informatics; vol. 85).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    10 Citations (Scopus)
    14 Downloads (Pure)
  • 2016

    SPEC: an equivalence checker for security protocols

    Tiu, A., Nguyen, N. & Horne, R., 9 Oct 2016, Programming Languages and Systems: 14th Asian Symposium, APLAS 2016, Hanoi, Vietnam, November 21 - 23, 2016, Proceedings. Igarashi, A. (ed.). Cham, Switzerland: Springer, p. 87-95 9 p. (Lecture Notes in Computer Science; vol. 10017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    10 Citations (Scopus)
  • Private names in non-commutative logic

    Horne, R., Tiu, A., Aman, B. & Ciobanu, G., 24 Aug 2016, 27th International Conference on Concurrency Theory (CONCUR 2016). Desharnais, J. & Jagadeesan, R. (eds.). Saarbrücken/Wadern: Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 31:1-31:16 16 p. (Leibniz International Proceedings in Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    3 Citations (Scopus)
    10 Downloads (Pure)
  • Behavioural analysis of sessions using the calculus of structures

    Ciobanu, G. & Horne, R., 28 Jun 2016, Perspectives of System Informatics: 10th International Andrei Ershov Informatics Conference, PSI 2015, in Memory of Helmut Veith. Mazzara, M. & Voronkov, A. (eds.). Cham: Springer, p. 91-106 16 p. (Lecture Notes in Computer Science; vol. 9609).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    7 Citations (Scopus)
    17 Downloads (Pure)
  • 2015

    Preface

    Horne, R., 12 Nov 2015, Embracing Global Computing in Emerging Economies: First Workshop, EGC 2015, Almaty, Kazakhstan, February 26-28, 2015. Proceedings. Horne, R. (ed.). Cham, Switzerland: Springer, Vol. 514. p. V-VI 2 p. (Communications in Computer and Information Science; vol. 514).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • Descriptive types for linked data resources

    Ciobanu, G., Horne, R. & Sassone, V., 1 Jan 2015, Perspectives of System Informatics: 9th International Ershov Informatics Conference, PSI 2014, St. Petersburg, Russia, June 24-27, 2014. Revised Selected Papers. Voronkov, A. & Virbitskaite, I. (eds.). Cham, Switzerland: Springer, p. 1-25 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8974).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    3 Citations (Scopus)
  • 2014

    Extracting threshold conceptual structures from web documents

    Ciobanu, G., Horne, R. & Vǎideanu, C., 17 Jul 2014, Graph-Based Representation and Reasoning: 21st International Conference on Conceptual Structures, ICCS 2014, Iaşi, Romania, July 27-30, 2014, Proceedings. Hernandez, N., Jäschke, R. & Croitoru, M. (eds.). Cham, Switzerland: Springer, p. 130-144 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8577 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    3 Citations (Scopus)
  • Ensuring faultless communication behaviour in a commercial cloud

    Horne, R. & Umarov, T., 1 Jan 2014, Software Engineering and Formal Methods: SEFM 2013 Collocated Workshops: BEAT2, WS-FMDS, FM-RAIL-Bok, MoKMaSD, and OpenCert, Madrid, Spain, September 23-24, 2013, Revised Selected Papers. Counsell, S. & Núñez, M. (eds.). Cham, Switzerland: Springer, p. 44-55 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8368 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • 2013

    Non-interleaving operational semantics for geographically replicated databases

    Ciobanu, G. & Horne, R., 1 Mar 2013, 2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing. Bjørner, N., Negru, V., Ida, T., Jebelean, T., Petcu, D., Watt, S. M. & Zaharie, D. (eds.). Piscataway, NJ: IEEE, p. 440-447 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    4 Citations (Scopus)
  • 2012

    Operational semantics for SPARQL update

    Horne, R., Sassone, V. & Gibbins, N., 31 May 2012, The Semantic Web: Joint International Semantic Technology Conference, JIST 2011, Hangzhou, China, December 4-7, 2011, Proceedings. Pan, J. Z., Chen, H., Kim, H.-G., Li, J., Wu, Z., Horrocks, I., Mizoguchi, R. & Wu, Z. (eds.). Berlin: Springer-Verlag, p. 242-257 16 p. (Lecture Notes in Computer Science; vol. 7185).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    6 Citations (Scopus)