Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 8 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
V. Rajani, Garg, D., and Rezk, T., On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks, in Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
B. Finkbeiner, Rabe, M., and Sánchez, C., Algorithms for Model Checking HyperLTL and HyperCTL*, in Proceedings of the 27th International Conference on Computer Aided Verification (CAV), 2015.
R. Accorsi, Anwenden struktureller Nicht-Interferenz zur Sicherheitsanalyse von Workflow-Modellen, in Proceedings of INFORMATIK 2011 - Dependable Software for Critical Infrastructures (DSCI 2011), 2011.
H. Mantel, Sands, D., and Sudbrock, H., Assumptions and Guarantees for Compositional Noninterference, in Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF 2011), 2011.
I. Bolosteanu and Garg, D., Asymmetric Secure Multi-execution with Declassification, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
Q. Huy Do, Bubel, R., and Hähnle, R., Automatic Detection and Demonstrator Generation for Information Flow Leaks in Object-Oriented Programs, Computers & Security, vol. 67, 2017.
R. Accorsi and Lehmann, A., Automatic Information Flow Analysis of Business Process Models, in 10th International Conference on Business Process Management (BPM 2012), 2012.
B. Köpf, Mauborgne, L., and Ochoa, M., Automatic Quantification of Cache Side-Channels, in Proceedings of the 24th International Conference on Computer Aided Verification (CAV 2012), 2012.