S
E. Loval, Fromm, A., Mohr, M., and Pretschner, A.,
“SHRIFT System-wide HybRid Information Flow Tracking”, in
Proceedings of the 30th International Information Security and Privacy Conference (IFIP SEC), 2015.
R. Gay, Mantel, H., and Sprick, B.,
“Service Automata”, in
Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011), 2012.
R. Küsters, Müller, J., Scapin, E., and Truderung, T.,
“sElect: A Lightweight Verifiable Remote Voting System”, in
Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L.,
“Security in Web-Based Workflows”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R.,
“Security in E-Voting”,
Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss and Hutter, D.,
“Security (hyper-)properties in workflow systems: From specification to verification”, in
Electronic Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2014), 2014.
M. Ochoa,
“Security Guarantees and Evolution: From models to reality”, in
Electronic Proceedings of the 1st ESSoS Doctoral Symposium (ESSoS-DS 2012), 2012.
S. Pfeiffer, Unger, S., Timmermann, D., and Lehmann, A.,
“Secure Information Flow Awareness for Smart Wireless eHealth Systems”, in
Proceedings of 9th International Multi-Conference on Systems, Signals and Devices (SSD 2012), 2012.
A. Lux, Mantel, H., and Perner, M.,
“Scheduler-Independent Declassification”, in
Proceedings of the 11th International Conference on Mathematics of Program Construction (MPC 2012), 2012.
V. Klebanov, Manthey, N., and Muise, C.,
“SAT-based Analysis and Quantification of Information Flow in Programs”, in
Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST 2013), 2013.
R
M. Kovács and Seidl, H.,
“Runtime Enforcement of Information Flow Security in Tree Manipulating Processes”, in
Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
A. Pretschner, Lovat, E., and Buechler, M.,
“Representation-Independent Data Usage Control”, in
6th International Workshop on Data Privacy Management (DPM 2011), 2011.
P
F. Dörre and Klebanov, V.,
“Pseudo-Random Number Generator Verification: A Case Study”, in
Proceedings of the 7th Working Conference on Verified Software: Theories, Tools, and Experiments (VSTTE), 2015.
A. Popescu, Hölzl, J., and Nipkow, T.,
“Proving Concurrent Noninterference”, in
Proceedings of the 2nd International Conference on Certified Programs and Proofs (CPP 2012), 2012.
R. Küsters, Truderung, T., and Vogt, A.,
“Proving Coercion-Resistance of Scantegrity II”, in
Proceedings of the 12th International Conference on Information and Communications Security (ICICS 2010), 2010.
W. Rafnsson, Sabelfeld, A., and Garg, D.,
“Progress-Sensitive Security for SPARK”, in
Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.
F. Dörre and Klebanov, V.,
“Practical Detection of Entropy Loss in Pseudo-Random Number Generators”, in
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), 2016.
Pages