Skip to main content
About
Events
Research
Open Positions
Links
Contact
Publications
Projects
Project Clusters
Reference Scenarios
Tools
Search form
Search
Reliably Secure Software Systems (RS
3
) –
DFG Priority Programme 1496
Research
Publications
Best Paper Awards
Projects
Funded Projects
Associated Projects
Projects by Phases
Project Clusters
Projects
Reference Scenarios
Security in E-Voting
Security in Web-based Workflow Management Systems
Software Security for Mobile Devices
Projects
Tools
Search
Show only items where
Author
any
Abadi, Martín
Accorsi, R.
Ahrendt, Wolfgang
Arzt, S.
Arzt, Steven
Askarov, Aslan
Atkinson, C.
Barte, A.
Bartel, Alexandre
Bastys, Iulia
Bauereiß, Thomas
Bauereiss, T.
Bauereiss, Thomas
Beckert, B.
Beckert, Bernhard
Bichhawat, A.
Bichhawat, Abhishek
Bissyandé, Tegawendé F.
Blanchette, J. C.
Blasum, H.
Bodden, E.
Bodden, Eric
Böhme, S.
Bolosteanu, Iulia
Borek, M.
Breitner, Joachim
Bruns, D.
Bruns, Daniel
Bubel, Richard
Buechler, M.
Chong, Stephen
Clarkson, M. R.
Cortier, Véronique
Cúellar, J.
Dering, Matthew
Dimitrova, R.
Do, Huy Quoc
Do, Quoc Huy
Dörre, Felix
Ehlers, R.
Fahland, D.
Faymonville, Peter
Fennell, L.
Finkbeiner, B.
Finkbeiner, Bernd
Fischer, P.
Fischer, R.
Freiling, F.
Fritz, C.
Fromm, Alexander
Galindo, David
Garg, D.
Garg, Deepak
Gark, Deepak
Gawlitza, T. M.
Gay, R.
Gay, Richard
Gerbig, R.
Giffhorn, Dennis
Gladisch, Christoph
Graf, J.
Graf, Jürgen
Grahl, Daniel
Grebenshchikov, Sergey
Grebing, S.
Grebing, Sarah
Greiner, Simon
Grewe, S.
Gritti, Armando Pesenti
Hadasch, F.
Hahn, Christopher
Hähnle, Reiner
Hammer, C.
Hammer, Christian
Havle, O.
Hecker, M.
Hecker, Martin
Henschel, Martin
Herda, Mihai
Hölzl, J.
Hutter, D.
Hutter, Dieter
Jager, T.
Jain, Jinank
Jha, Somesh
Jürjens, J.
Kamburjan, Eduard
Kanav, S.
Katkalov, K.
Keil, M.
Kelbert, F.
Kelbert, Florian
Kennel, B.
Kirsten, Michael
Klebanov, V.
Klebanov, Vladimir
Klein, J.
Klein, Jacques
Koleini, M.
Köpf, B.
Kovács, M.
Kremer, Steve
Kuhn, J.-M.
Kumari, P.
Kunčar, Ondřej
Küsters, R.
Küsters, Ralf
Lammich, P.
Lammich, Peter
Langenstein, B.
Le Traon, Y.
Le Traon, Yves
Lehmann, A.
Li, Li
Li, Ximeng
Liu, Tianhai
Lochbihler, A.
Lohmann, N.
Lohner, D.
Lortz, Steffen
Loval, Enrico
Lovat, E.
Lovat, Enrico
Lux, A.
Maedche, A.
Mann, C.
Mantel, H.
Mantel, Heiko
Manthey, N.
Mauborgne, L.
McDaniel, P.
McDaniel, Patrick
Micinski, K. K.
Moebius, N.
Mohr, M.
Mohr, Martin
Mostowski, W.
Mostowski, Wojciech
Mueller, B.
Muise, C.
Müller, S.
Müller, Christian
Müller, Johannes
Müller-Olm, M.
Müller-Olm, Markus
Nemouchi, Y.
Nipkow, T.
Nordhoff, B.
Nordhoff, Benedikt
Ochoa, M.
Octeau, D.
Octeau, Damien
Oudinet, J.
Perner, M.
Perner, Matthias
Peschla, J.
Pfeiffer, S.
Popescu, A.
Popescu, Andrei
Pretschner, A.
Pretschner, Alexander
Rabe, M.
Rabe, M. N.
Rabe, Markus
Rafnsson, Willard
Raimondi, Franco
Rajani, V.
Rajani, Vineet
Rasthofer, S.
Rasthofer, Siegfried
Reif, W.
Rezk, Tamara
Rios, R.
Sabelfeld, Andrei
Sánchez, C.
Sánchez, César
Sands, D.
Sauer, J.
Scapin, E.
Scapin, Enrico
Scheben, C.
Scheben, Christoph
Schinzel, S.
Schmaltz, J.
Schmitt, P.
Schmitt, I.
Schmitt, P. H.
Schmitt, Peter H.
Schmitt, Peter H.
Schneider, David
Schoepe, D.
Schwarz, M. D.
Seidl, H.
Seidl, Helmut
Sinz, C.
Smallbone, N.
Smorovksy, J
Snelling, Gregor
Snelting, G.
Snelting, Gregor
Sprick, B.
Starostin, A.
Starostin, Artem
Stenger, Marvin
Stenzel, K.
Stephan, W.
Sudbrock, H.
Taghdiri, M.
Taghdiri, Mana
Tasch, Markus
Tentrup, Leander
Thiemann, P.
Timmermann, D.
Truderung, T.
Truderung, Tomasz
Tunjic, C.
Tverdyshew, S.
Tyszberowicz, Shmuel
Ulbrich, M.
Ulbrich, Matthias
Ulbrich, Mattias
Unger, S.
Verbeek, F.
Vogt, A.
Vojdani, V.
Wand, D.
Warzecha, D.
Wasser, Nathan
Wasserrab, D.
Wasserrab, Daniel
Weber, Alexandra
Weidenbach, C.
Weigl, Alexander
Weisbarth, Jörg
Wenner, A.
Wenner, Alexander
Wolf, K.
Wolf, B.
Wonnemann, C.
Wüchner, T.
Zalinescu, Eugen
Zimmermann, Martin
Type
any
Conference Paper
Journal Article
Miscellaneous
Term
any
Year
any
2017
2016
2015
2014
2013
2012
2011
2010
Keyword
any
conference
Export 147 results:
BibTeX
Author
Title
[
Type
]
Year
Filters:
Filter
is
[Clear All Filters]
Conference Paper
V. Klebanov
,
Manthey, N.
, and
Muise, C.
,
“
SAT-based Analysis and Quantification of Information Flow in Programs
”
, in
Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST 2013)
, 2013.
Google Scholar
BibTeX
M. Kovács
and
Seidl, H.
,
“
Runtime Enforcement of Information Flow Security in Tree Manipulating Processes
”
, in
Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012)
, 2012.
Google Scholar
BibTeX
S. Arzt
and
Bodden, E.
,
“
Reviser: Efficiently Updating IDE-/IFDS-Based Data-Flow Analyses in Response to Incremental Program Changes
”
, in
Proceedings of the 36th International Conference on Software Engineering (ICSE 2014)
, 2014.
Google Scholar
BibTeX
A. Pretschner
,
Lovat, E.
, and
Buechler, M.
,
“
Representation-Independent Data Usage Control
”
, in
6th International Workshop on Data Privacy Management (DPM 2011)
, 2011.
Google Scholar
BibTeX
M. Kovács
,
Seidl, H.
, and
Finkbeiner, B.
,
“
Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties
”
, in
Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013)
, 2013.
Google Scholar
BibTeX
E. Lovat
,
Oudinet, J.
, and
Pretschner, A.
,
“
On Quantitative Dynamic Data Flow Tracking
”
, in
Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014)
, 2014.
Google Scholar
BibTeX
F. Dörre
and
Klebanov, V.
,
“
Pseudo-Random Number Generator Verification: A Case Study
”
, in
Proceedings of the 7th Working Conference on Verified Software: Theories, Tools, and Experiments (VSTTE)
, 2015.
Google Scholar
BibTeX
D. Wasserrab
and
Lohner, D.
,
“
Proving Information Flow Noninterference by Reusing a Machine-Checked Correctness Proof for Slicing
”
, in
6th International Verification Workshop (VERIFY 2010)
, 2010.
Google Scholar
BibTeX
A. Popescu
,
Hölzl, J.
, and
Nipkow, T.
,
“
Proving Concurrent Noninterference
”
, in
Proceedings of the 2nd International Conference on Certified Programs and Proofs (CPP 2012)
, 2012.
Google Scholar
BibTeX
R. Küsters
,
Truderung, T.
, and
Vogt, A.
,
“
Proving Coercion-Resistance of Scantegrity II
”
, in
Proceedings of the 12th International Conference on Information and Communications Security (ICICS 2010)
, 2010.
Google Scholar
BibTeX
W. Rafnsson
,
Sabelfeld, A.
, and
Garg, D.
,
“
Progress-Sensitive Security for SPARK
”
, in
Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS)
, 2016.
Google Scholar
BibTeX
F. Dörre
and
Klebanov, V.
,
“
Practical Detection of Entropy Loss in Pseudo-Random Number Generators
”
, in
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS)
, 2016.
Google Scholar
BibTeX
T. Bauereiss
and
Hutter, D.
,
“
Possibilistic information flow security of workflow management systems
”
, in
Proceedings of the 1st International Workshop on Graphical Models for Security at ETAPS 2014 (GraMSec 2014)
, 2014.
Google Scholar
BibTeX
C. Atkinson
,
Gerbig, R.
, and
Kennel, B.
,
“
On-the-Fly Emendation of Multi-level Models
”
, in
8th European Conference on Modelling Foundations and Applications (ECMFA 2012)
, 2012.
Google Scholar
BibTeX
A. Popescu
,
Hölzl, J.
, and
Nipkow, T.
,
“
Noninterfering Schedulers - When Possibilistic Noninterference Implies Probabilistic Noninterference
”
, in
Proceedings of the 5th Conference on Algebra and Coalgebra in Computer Science (CALCO 2013)
, 2013.
Google Scholar
BibTeX
H. Mantel
,
Perner, M.
, and
Sauer, J.
,
“
Noninterference under Weak Memory Models
”
, in
Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014)
, 2014.
Google Scholar
BibTeX
M. Ochoa
,
Jürjens, J.
, and
Cúellar, J.
,
“
Non-interference on UML State-charts
”
, in
Proceedings of the 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012)
, 2012.
Google Scholar
BibTeX
J. C. Blanchette
,
Popescu, A.
,
Wand, D.
, and
Weidenbach, C.
,
“
More SPASS with Isabelle - Superposition with Hard Sorts and Configurable Simplification
”
, in
Proceedings of the 3rd Conference on Interactive Theorem Proving (ITP 2012)
, 2012.
Google Scholar
BibTeX
R. Dimitrova
,
Finkbeiner, B.
, and
Rabe, M. N.
,
“
Monitoring Temporal Information Flow
”
, in
Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change
, 2012.
Google Scholar
BibTeX
R. Ehlers
and
Finkbeiner, B.
,
“
Monitoring Realizability
”
, in
Proceedings of the 2nd International Conference on Runtime Verification (RV 2011)
, 2012.
Google Scholar
BibTeX
B. Finkbeiner
,
Hahn, C.
,
Stenger, M.
, and
Tentrup, L.
,
“
Monitoring Hyperproperties
”
, in
Proceedings of the 17th International Conference on Runtime Verification (RV)
, 2017.
Google Scholar
BibTeX
S. Greiner
,
Mohr, M.
, and
Beckert, B.
,
“
Modular Verification of Information-Flow Security in Component-Based Systems
”
, in
Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM)
, 2017.
Google Scholar
BibTeX
A. Lehmann
and
Lohmann, N.
,
“
Modeling wizard for confidential Business Processes
”
, in
1st Joint International Workshop on Security in Business Processes (SBP)
, 2012.
Google Scholar
BibTeX
K. Katkalov
,
Stenzel, K.
,
Borek, M.
, and
Reif, W.
,
“
Model-Driven Development of Information Flow-Secure Systems with IFlow
”
, in
Proceedings of 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013)
, 2013.
Google Scholar
BibTeX
A. Lehmann
and
Lohmann, N.
,
“
Model support for confidential service-oriented business processes
”
, in
Proceedings of the 4th Central-European Workshop on Services and their Composition (ZEUS 2012)
, Bamberg, Germany, 2012.
Google Scholar
BibTeX
Pages
« first
‹ previous
1
2
3
4
5
6
next ›
last »