Browse by UCL people
Group by: Type | Date
Number of items: 68.
2026
Buzoku, Y;
Pym, DJ;
(2026)
Base-Extension Semantics for Intuitionistic Modal Logics (Extended Abstract).
In:
Automated Reasoning with Analytic Tableaux and Related Methods. TABLEAUX 2025.
(pp. pp. 318-334).
Springer, Cham
|
|
Chakraborty, Pinaki;
Caulfield, Tristan;
Pym, David;
(2026)
Local Causal Reasoning in Multiagent Systems.
In:
Proceedings of The 2nd International Workshop on Causality, Agents and Large Models (CALM-25).
Springer
(In press).
|
|
Galmiche, Didier;
Lang, Timo;
Méry, Daniel;
Pym, David;
(2026)
Bifurcation Logic: Separation Through Ordering.
In:
Proceedings Twentieth Conference on Theoretical Aspects of Rationality and Knowledge (TARK 2025).
Electronic Proceedings in Theoretical Computer Science (EPTCS): Düsseldorf, Germany.
(In press).
|
2025
|
Bujorianu, Luminata;
Caulfield, Tristan;
Pym, David;
Ilau, Marius-Constantin;
(2025)
Interfaces in Ecosystems: Concepts, Form, and Implementation.
In:
Simulation Tools and Techniques (SIMUtools 2024).
(pp. pp. 27-47).
Springer Nature: Cham, Switzerland.
|
|
Galmiche, Didier;
Lang, Timo;
Pym, David;
(2025)
Minimalistic System Modelling: Behaviours, Interfaces, and Local Reasoning.
In: Galmiche, Didier and Lang, Timo and Pym, David, (eds.)
Simulation Tools and Techniques (SIMUtools 2024).
(pp. pp. 48-71).
Springer Nature: Cham, Switzerland.
|
Gheorghiu, Alexander V;
Pym, David J;
(2025)
From Proof-Theoretic Validity to Base-Extension Semantics for Intuitionistic Propositional Logic.
Studia Logica
10.1007/s11225-024-10163-9.
(In press).
|
Gheorghiu, Alexander V;
Pym, David J;
(2025)
Semantic Foundations of Reductive Reasoning.
Topoi
10.1007/s11245-025-10211-6.
(In press).
|
Gu, Tao;
Gheorghiu, Alexander V;
Pym, David J;
(2025)
Proof-theoretic Semantics for the Logic of Bunched Implications.
Studia Logica
10.1007/s11225-025-10202-z.
(In press).
|
2024
Demjaha, Albesë;
Pym, David;
Caulfield, Tristan;
Parkin, Simon;
(2024)
‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large university.
Journal of Cybersecurity
, 10
(1)
, Article tyae007. 10.1093/cybsec/tyae007.
|
Gheorghiu, Alexander;
Gu, Tao;
Pym, David;
(2024)
Proof-theoretic Semantics for Intuitionistic Multiplicative Linear Logic.
Studia Logica
10.1007/s11225-024-10158-6.
(In press).
|
Gheorghiu, Alexander;
Gu, Tao;
Pym, David;
(2024)
Inferentialist Resource Semantics (Extended Abstract).
In:
Electronic Notes in Theoretical Informatics and Computer Science: Volume 4 - Proceedings of MFPS XL 2024.
EPI Sciences: Villeurbanne, France.
|
Pym, D;
Ritter, E;
Robinson, E;
(2024)
Categorical Proof-theoretic Semantics.
Studia Logica
10.1007/s11225-024-10101-9.
(In press).
|
2023
Bujorianu, Manuela L;
Caulfield, Tristan;
Pym, David;
Wisniewski, Rafael;
(2023)
From MDP to POMDP and Back: Safety and Compositionality.
In:
2023 European Control Conference (ECC).
(pp. pp. 1-6).
IEEE: Bucharest, Romania.
|
Gheorghiu, A;
Docherty, S;
Pym, D;
(2023)
Reductive Logic, Proof-search, and Coalgebra: A Perspective from Resource Semantics.
In: Parmigiano, A and Sadrzadeh, M, (eds.)
Samson Abramsky on Logic and Structure in Computer Science and Beyond.
(pp. 833-875).
Springer Nature: Cham, Switzerland.
|
Gheorghiu, Alexander;
Gu, Tao;
Pym, David;
(2023)
Proof-theoretic Semantics for Intuitionistic
Multiplicative Linear Logic.
In: Ramanayake, Revantha and Urban, Josef, (eds.)
Procceedings of the 32nd International Conference on Automated Reasoning with Analytic Tableaux and Related Methods.
(pp. pp. 367-385).
Springer: Prague, Czech Republic.
|
Gheorghiu, Alexander;
Pym, David;
(2023)
Semantical Analysis of the Logic of Bunched Implications.
Studia Logica: An International Journal for Symbolic Logic
10.1007/s11225-022-10028-z.
(In press).
|
Gheorghiu, Alexander V;
Gu, Tao;
Pym, David G;
(2023)
Proof-theoretic Semantics for Intuitionistic Multiplicative Linear Logic (Extended Abstract).
In:
Proceedings of the 7th International Workshop on Trends in Linear Logic and Applications (TLLA 2023).
7th International Workshop on Trends in Linear Logic and Applications (TLLA 2023): Rome, Italy.
|
Gheorghiu, Alexander V;
Pym, David J;
(2023)
Defining Logical Systems via Algebraic Constraints on Proofs.
Journal of Logic and Computation
, Article exad065. 10.1093/logcom/exad065.
(In press).
|
Gheorghiu, Alexander V.;
Pym, David J.;
(2023)
Definite Formulae, Negation-as-Failure, and the Base-Extension Semantics of Intuitionistic Propositional Logic.
Bulletin of the Section of Logic
, 52
(2)
pp. 239-266.
10.18778/0138-0680.2023.16.
|
2022
Bujorianu, Manuela L;
Caulfield, Tristan;
Pym, David;
(2022)
Modelling and Control of Complex Cyber-Physical Ecosystems.
In:
IFAC-PapersOnLine.
(pp. pp. 253-258).
Elsevier
|
Caulfield, T;
Ilau, M;
Pym, D;
(2022)
Meta-modelling for Ecosystems Security.
In:
Proceedings of the 13th EAI International Conference, SIMUtools 2021: Simulation Tools and Techniques.
(pp. pp. 259-283).
Springer Nature
|
Caulfield, T;
Ilau, M-C;
Pym, D;
(2022)
Found in Translation: Co-design for Security Modelling.
In:
Socio-Technical Aspects in Security: 11th International Workshop, STAST 2021.
(pp. pp. 108-128).
ACM: Virtual Event.
|
Caulfield, T;
Ilau, M-C;
Pym, D;
(2022)
Engineering Ecosystem Models: Semantics and Pragmatics.
In:
International Conference on Simulation Tools and Techniques SIMUtools 2021: Simulation Tools and Techniques.
(pp. pp. 236-258).
Springer, Cham
|
Caulfield, T;
Ilau, M-C;
Pym, D;
(2022)
Modelling Organizational Recovery.
In:
International Conference on Simulation Tools and Techniques SIMUtools 2021: Simulation Tools and Techniques.
(pp. pp. 284-314).
Springer, Cham
|
Demjaha, Albesë;
Parkin, Simon;
Pym, David;
(2022)
The boundedly rational employee: Security economics for behaviour intervention support in organizations.
Journal of Computer Security
10.3233/jcs-210046.
(In press).
|
Gheorghiu, Alexander;
Pym, David;
(2022)
Generalizing Rules via Algebraic Constraints (Extended Abstract).
Presented at: Scandinavian Logic Symposium 2022, Bergen, Norway.
|
Gheorghiu, Alexander;
Pym, David;
(2022)
Reductive Logic, Proof-search, and Coalgebra (Extended Abstract).
In:
Proceedings of the 16th IFIP WG 1.3 International Workshop on Coalgebraic Methods in Computer Science (CMCS 2022).
(pp. pp. 1-2).
CMCS
|
Pym, David;
Ritter, Eike;
Robinson, Edmund;
(2022)
Proof-theoretic Semantics in Sheaves (Extended Abstract).
Presented at: The Eleventh Scandinavian Logic Symposium (SLSS 2022), Bergen, Norway.
|
2021
Demjaha, A;
Parkin, S;
Pym, D;
(2021)
You've left me no choices: Security economics to inform behaviour intervention support in organizations.
In: Groß, Thomas, and Theo, Tryfonas, (eds.)
Socio-Technical Aspects in Security and Trust. STAST 2019. Lecture Notes in Computer Science, vol 11739.
(pp. pp. 66-86).
Springer, Cham: Luxembourg City, Luxembourg.
|
Pym, D;
(2021)
The Origins of Cyberspace.
In: Cornish, P, (ed.)
The Oxford Handbook of Cybersecurity.
Oxford University Press: Oxford, UK.
|
2020
Brunet, P;
Pym, D;
(2020)
Pomsets with Boxes: Protection, Separation, and Locality in Concurrent Kleene Algebra.
In: Ariola, ZM, (ed.)
5th International Conference on Formal Structures for Computation and Deduction (FSCD 2020).
(pp. 5:1-5:16).
Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
|
Pym, D;
Venters, W;
(2020)
Modelling Interfaces and Things Within the Decentralized Ecosystems of the Internet of Things.
In:
International Conference on Information Systems, ICIS 2020 - Making Digital Inclusive: Blending the Local and the Global.
AIS: Hyderabad, India.
|
2019
Cattermole, T;
Docherty, S;
Pym, D;
Sasse, MA;
(2019)
Asset-Oriented Access Control: Towards a New IoT Framework.
In:
IoT 2019: Proceedings of the 9th International Conference on the Internet of Things.
Association for Computing Machinery (ACM): New York, NY, USA.
|
Demjaha, A;
Caulfield, T;
Sasse, MA;
Pym, D;
(2019)
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes.
In:
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
(pp. pp. 192-201).
IEEE: Stockholm, Sweden.
|
Docherty, S;
Pym, D;
(2019)
Stone-Type Dualities for Separation Logics.
Logical Methods In Computer Science
, 15
(1)
27:1-27:51.
10.23638/LMCS-15(1:27)2019.
|
Galmiche, D;
Kimmel, P;
Pym, D;
(2019)
A Substructural Epistemic Resource Logic: Theory and Modelling Applications.
Journal of Logic and Computation
, 29
(8)
pp. 1251-1287.
10.1093/logcom/exz024.
|
Ioannidis, C;
Pym, D;
Williams, J;
Gheyas, I;
(2019)
Resilience in Information Stewardship.
European Journal of Operational Research
, 274
(2)
pp. 638-653.
10.1016/j.ejor.2018.10.020.
|
Pym, D;
(2019)
Resource semantics: logic as a modelling technology.
ACM SIGLOG News
, 6
(2)
pp. 5-41.
10.1145/3326938.3326940.
|
Pym, D;
Spring, J;
O'Hearn, P;
(2019)
Why Separation Logic Works.
Philosophy and Technology
, 32
pp. 483-516.
10.1007/s13347-018-0312-8.
|
2018
Docherty, S;
Pym, D;
(2018)
Intuitionistic Layered Graph Logic: Semantics and Proof Theory.
Logical Methods in Computer Science (LMCS)
, 14
(4)
, Article 11. 10.23638/LMCS-14(4:11)2018.
|
Docherty, S;
Pym, D;
(2018)
A Stone-type Duality Theorem for Separation Logic Via its Underlying Bunched Logics.
Electronic Notes in Theoretical Computer Science
, 336
pp. 101-118.
10.1016/j.entcs.2018.03.018.
|
Docherty, S;
Pym, D;
(2018)
Modular Tableaux Calculi for Separation Theories.
In: Baier, C and Dal Lago, U, (eds.)
(Proceedings) FoSSaCS 2018, 21st International Conference on Foundations of Software Science and Computation Structures, 14-20 April 2018, Thessaloniki, Greece.
Springer
|
Spring, JM;
Pym, D;
(2018)
Towards Scientific Incident Response.
In: Bushnell, Linda and Tamer, Basar and Radha, Poovendran, (eds.)
Proceedings of the 9th International Conference on Decision and Game Theory for Security.
(pp. pp. 398-417).
Springer Nature: Cham, Switzerland.
|
2017
Baldwin, A;
Gheyas, I;
Ioannidis, C;
Pym, D;
Williams, J;
(2017)
Contagion in cybersecurity attacks.
Journal of the Operational Research Society
, 68
(7)
pp. 780-791.
10.1057/jors.2016.37.
|
Caulfield, T;
Ioannidis, C;
Pym, D;
(2017)
The U.S. Vulnerabilities Equities Process: An Economic Perspective.
In: Rass, S and An, B and Kiekintveld, C and Fang, F and Schauer, S, (eds.)
GameSec 2017: Decision and Game Theory for Security.
(pp. pp. 131-150).
Springer International Publishing: Cham, Switzerland.
|
Dahlqvist, F;
Pym, D;
(2017)
Coalgebraic completeness-via-canonicity for distributive substructural logics.
Journal of Logical and Algebraic Methods in Programming
, 93
pp. 1-22.
10.1016/j.jlamp.2017.07.002.
|
Docherty, S;
Pym, D;
(2017)
Intuitionistic layered graph logic.
In: Sierra, C, (ed.)
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence.
(pp. pp. 4816-4820).
IJCAI: Marina del Rey (CA), USA.
|
Galmiche, D;
Kimmel, P;
Pym, D;
(2017)
A substructural epistemic resource logic.
In:
Logic and Its Applications.
(pp. pp. 106-122).
Springer
|
Pym, D;
Anderson, G;
(2017)
A substructural modal logic of utility.
Journal of Logic and Computation
, 27
(5)
pp. 1421-1464.
10.1093/logcom/exw030.
|
Spring, JM;
Moore, T;
Pym, D;
(2017)
Practicing a Science of Security: A Philosophy of Science Perspective.
In:
NSPW 2017: Proceedings of the 2017 New Security Paradigms Workshop.
(pp. pp. 1-18).
Association for Computing Machinery (ACM): New York, NY, USA.
|
2016
Anderson, G;
McCusker, G;
Pym, D;
(2016)
A logic for the compliance budget.
In: Zhu, Q and Alpcan, T and Panaousis, E and Tambe, M and Casey, W, (eds.)
Decision and Game Theory for Security: Proceedings of the 7th International Conference, GameSec 2016.
(pp. pp. 370-381).
Springer International Publishing
|
Anderson, G;
Pym, D;
(2016)
A calculus and logic of bunched resources and processes.
Theoretical Computer Science
, 614
pp. 63-96.
10.1016/j.tcs.2015.11.035.
|
Caulfield, T;
Ioannidis, C;
Pym, D;
(2016)
On the adoption of privacy-enhancing technologies.
In: Zhu, Q and Alpcan, T and Panaousis, E and Tambe, M and Casey, W, (eds.)
Decision and Game Theory for Security: Proceedings of the 7th International Conference, GameSec 2016.
(pp. pp. 175-194).
Springer International Publishing
|
Caulfield, T;
Ioannidis, C;
Pym, D;
(2016)
Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption.
In: Grossklags, J and Preneel, B, (eds.)
Lecture Notes in Computer Science.
(pp. pp. 271-279).
Springer: Germany.
|
Courtault, J-R;
Galmiche, D;
Pym, D;
(2016)
A logic of separating modalities.
Theoretical Computer Science
, 637
pp. 30-58.
10.1016/j.tcs.2016.04.040.
|
Docherty, S;
Pym, D;
(2016)
Intuitionistic layered graph logic.
In: Olivetti, N and Tiwari, A, (eds.)
Automated Reasoning: 8th International Joint Conference, IJCAR 2016, Proceedings.
(pp. pp. 469-486).
Springer International Publishing: Coimbra, Portugal.
|
Ioannidis, C;
Pym, D;
Williams, J;
(2016)
Is Public Co-Ordination of Investment in Information Security Desirable?
Journal of Information Security
, 7
(2)
pp. 60-80.
10.4236/jis.2016.72005.
|
2015
Caulfield, T;
Pym, D;
(2015)
Improving Security Policy Decisions with Models.
IEEE Security and Privacy Magazine
, 13
(5)
pp. 34-41.
10.1109/MSP.2015.97.
|
Caulfield, T;
Pym, D;
(2015)
Modelling and simulating systems security policy.
Presented at: Eighth EAI International Conference on Simulation Tools and Techniques, Athens, Greece.
|
Dahlqvist, F;
Pym, D;
(2015)
Completeness via Canonicity for Distributive Substructural Logics: A Coalgebraic Perspective.
In: Kahl, W and Winter, M and Oliveira, JN, (eds.)
International Conference on Relational and Algebraic Methods in Computer Science, 15th International Conference, RAMiCS 2015, Braga, Portugal, September 28 - October 1, 2015,.
(pp. pp. 119-135).
Springer: Cham, Switzerland.
|
Pym, D;
Anderson, G;
(2015)
Trust domains in system models: algebra, logic, utility, and combinators.
Journal of Logic and Computation
10.1093/logcom/exv030.
|
Pym, D;
Collinson, M;
McDonald, K;
(2015)
Layered graph logic as an assertion language for access control policy models.
Journal of Logic and Computation
, 27
(1)
pp. 41-80.
10.1093/logcom/exv020.
|
2014
Collinson, M;
McDonald, K;
Pym, D;
(2014)
A substructural logic for layered graphs.
Journal of Logic and Computation
10.1093/logcom/exu002.
|
Ioannidis, C;
Williams, J;
Pym, D;
Gheyas, I;
(2014)
Resilience in Information Stewardship.
In: Grossklags, J, (ed.)
Proceedings of the 13th Annual Workshop on the Economic of Information Security (WEIS 2014).
Workshop on the Economics of Information Security (WEIS): State College, PA, USA.
|
Pym, D;
Caulfield, T;
Williams, J;
(2014)
Compositional security modelling: structure, economics, and behaviour.
In: Tryfonas, T and Askoxylakis, I, (eds.)
Lecture Notes in Computer Science.
(pp. pp. 233-245).
Springer International Publishing: Switzerland.
|
Pym, D;
Ritter, E;
Robinson, E;
(2014)
A proof-theoretic analysis of the classical propositional matrix method.
Journal of Logic and Computation
, 24
(1)
283 - 301.
10.1093/logcom/exs045.
|
2008
Beautement, A;
Coles, R;
Griffin, J;
Ioannidis, C;
Monahan, B;
Pym, DJ;
Sasse, MA;
(2008)
Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security.
In:
Proceedings of the 7th Annual Workshop on the Economics of Information Security (WEIS 2008).
Workshop on the Economics of Information Security (WEIS): Hanover, NH, USA.
|
Coles, R;
Griffin, J;
Johnson, H;
Monahan, B;
Parkin, SE;
Pym, D;
Sasse, MA;
(2008)
Trust economics feasibility study.
Presented at: DSN 2008 Workshop on Resilience Assessment and Dependability Benchmarking, Anchorage, Alaska, USA.
|