Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 4 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is N  [Clear All Filters]
D. Giffhorn and Snelting, G., A New Algorithm for Low-Deterministic Security, International Journal on Information Security, 2014.
H. Mantel, Perner, M., and Sauer, J., Noninterference under Weak Memory Models, in Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014), 2014.
A. Popescu, Hölzl, J., and Nipkow, T., Noninterfering Schedulers - When Possibilistic Noninterference Implies Probabilistic Noninterference, in Proceedings of the 5th Conference on Algebra and Coalgebra in Computer Science (CALCO 2013), 2013.
M. Ochoa, Jürjens, J., and Cúellar, J., Non-interference on UML State-charts, in Proceedings of the 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012), 2012.