Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
Author [ Title(Asc)] Type Year
Filters: Filter is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
T. Bauereiss and Hutter, D., Possibilistic information flow security of workflow management systems, in Proceedings of the 1st International Workshop on Graphical Models for Security at ETAPS 2014 (GraMSec 2014), 2014.
O
C. Atkinson, Gerbig, R., and Kennel, B., On-the-Fly Emendation of Multi-level Models, in 8th European Conference on Modelling Foundations and Applications (ECMFA 2012), 2012.
N
A. Popescu, Hölzl, J., and Nipkow, T., Noninterfering Schedulers - When Possibilistic Noninterference Implies Probabilistic Noninterference, in Proceedings of the 5th Conference on Algebra and Coalgebra in Computer Science (CALCO 2013), 2013.
H. Mantel, Perner, M., and Sauer, J., Noninterference under Weak Memory Models, in Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014), 2014.
M. Ochoa, Jürjens, J., and Cúellar, J., Non-interference on UML State-charts, in Proceedings of the 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012), 2012.
D. Giffhorn and Snelting, G., A New Algorithm for Low-Deterministic Security, International Journal on Information Security, 2014.
M
J. C. Blanchette, Popescu, A., Wand, D., and Weidenbach, C., More SPASS with Isabelle - Superposition with Hard Sorts and Configurable Simplification, in Proceedings of the 3rd Conference on Interactive Theorem Proving (ITP 2012), 2012.
R. Dimitrova, Finkbeiner, B., and Rabe, M. N., Monitoring Temporal Information Flow, in Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012.
R. Ehlers and Finkbeiner, B., Monitoring Realizability, in Proceedings of the 2nd International Conference on Runtime Verification (RV 2011), 2012.
B. Finkbeiner, Hahn, C., Stenger, M., and Tentrup, L., Monitoring Hyperproperties, in Proceedings of the 17th International Conference on Runtime Verification (RV), 2017.
S. Greiner, Mohr, M., and Beckert, B., Modular Verification of Information-Flow Security in Component-Based Systems, in Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM), 2017.
A. Lehmann and Lohmann, N., Modeling wizard for confidential Business Processes, in 1st Joint International Workshop on Security in Business Processes (SBP), 2012.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W., Model-Driven Development of Information Flow-Secure Systems with IFlow, in Proceedings of 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013), 2013.
K. Katkalov, Stenzel, K., Borek, M., and Reif, W., Model-Driven Development of Information Flow-Secure Systems with IFlow, ASE Science Journal, vol. 2, 2013.
A. Lehmann and Lohmann, N., Model support for confidential service-oriented business processes, in Proceedings of the 4th Central-European Workshop on Services and their Composition (ZEUS 2012), Bamberg, Germany, 2012.
R. Dimitrova, Finkbeiner, B., Kovács, M., Rabe, M., and Seidl, H., Model Checking Information Flow in Reactive Systems, in Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2012), 2012.
B. Beckert, Bruns, D., and Grebing, S., Mind the Gap: Formal Verification and the Common Criteria, in Proceedings of the 6th International Verification Workshop (VERIFY 2010), 2012.
J. C. Blanchette and Popescu, A., Mechanizing the Metatheory of Sledgehammer, in Proceedings of the 9th International Symposium on Frontiers of Combining Systems (FroCos 2013), 2013.
T. Wüchner, Ochoa, M., and Pretschner, A., Malware Detection with Quantitative Data Flow Graphs, in Proceedings of the 9th ACM Symposyum on Information, Computer and Communications Security (ASIACCS 2014), 2014.
S. Rasthofer, Arzt, S., and Bodden, E., A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks, Proceedings of the Network and Distributed System Security Symposium (NDSS 2014), 2014.
J
T. M. Gawlitza, Lammich, P., Müller-Olm, M., Seidl, H., and Wenner, A., Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation, in Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2011), 2011.
A. Lochbihler, Java and the Java Memory Model – a Unified, Machine-Checked Formalisation, in Proceedings of the ACM SIGPLAN 7th Workshop on Programming Languages and Systems (PLAS 2012), 2012.

Pages