Conference Paper
E. Lovat and Pretschner, A.,
“Data-centric multi-layer usage control enforcement: a Social Network Example”, in
Proceedings of the 16th ACM symposium on Access control models and technologies (SACMAT 2011), 2011.
E. Lovat,
“Cross-Layer Data-Centric Usage Control”, in
Proceedings of the International Symposium on Engineering Secure Software and Systems - Doctoral Symposium (ESSoS 2014)), 2014.
P. Lammich, Müller-Olm, M., Seidl, H., and Wenner, A.,
“Contextual Locking for Dynamic Pushdown Networks”, in
Proceedings of the 20th International Symposium on Static Analysis (SAS 2013), 2013.
O. Kunčar and Popescu, A.,
“A Consistent Foundation for Isabelle/HOL”, in
Proceedings of the 6th International Conference on Interactive Theorem Proving (ITP), 2015.
S. Kanav, Lammich, P., and Popescu, A.,
“A Conference Management System with Verified Document Confidentiality”, in
Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014), 2014.
T. Liu, Tyszberowicz, S., Herda, M., Beckert, B., Grahl, D., and Taghdiri, M.,
“Computing Specification-Sensitive Abstractions for Program Verification”, in
Proceedings of the 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA), 2016.
O. Kunčar and Popescu, A.,
“Comprehending Isabelle/HOL's Consistency”, in
Proceedings of the 26th European Symposium on Programming (ESOP), 2017.
T. Wüchner, Müller, S., and Fischer, R.,
“Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control”, in
Proceedings of the 5th International Conference on Cloud Computing Technology and Science (CloudCom 2013), 2013.
T. Bauereiss and Hutter, D.,
“Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS”, in
Proceedings of the 29th International Information Security and Privacy Conference (IFIP SEC 2014), 2014.
D. Octeau, Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., and Le Traon, Y.,
“Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis”, in
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2016.
R. Küsters, Truderung, T., and Vogt, A.,
“Clash Attacks on the Verifiability of E-Voting Systems”, in
Proceedings of the 33rd IEEE Symposium on Security and Privacy (S{&}P 2012), 2012.
L. Fennell and Thiemann, P.,
“The Blame Theorem for a Linear Lambda Calculus with Type Dynamic”, in
Proceedings of the Symposium on Trends in Functional Programming (TFP 2012), 2012.
B. Köpf, Mauborgne, L., and Ochoa, M.,
“Automatic Quantification of Cache Side-Channels”, in
Proceedings of the 24th International Conference on Computer Aided Verification (CAV 2012), 2012.
R. Accorsi and Lehmann, A.,
“Automatic Information Flow Analysis of Business Process Models”, in
10th International Conference on Business Process Management (BPM 2012), 2012.
I. Bolosteanu and Garg, D.,
“Asymmetric Secure Multi-execution with Declassification”, in
Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
H. Mantel, Sands, D., and Sudbrock, H.,
“Assumptions and Guarantees for Compositional Noninterference”, in
Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF 2011), 2011.
R. Accorsi,
“Anwenden struktureller Nicht-Interferenz zur Sicherheitsanalyse von Workflow-Modellen”, in
Proceedings of INFORMATIK 2011 - Dependable Software for Critical Infrastructures (DSCI 2011), 2011.
B. Finkbeiner, Rabe, M., and Sánchez, C.,
“Algorithms for Model Checking HyperLTL and HyperCTL*”, in
Proceedings of the 27th International Conference on Computer Aided Verification (CAV), 2015.
V. Rajani, Garg, D., and Rezk, T.,
“On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks”, in
Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
Pages