Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 4 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is N  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
N
D. Giffhorn and Snelting, G., A New Algorithm for Low-Deterministic Security, International Journal on Information Security, 2014.
M. Ochoa, Jürjens, J., and Cúellar, J., Non-interference on UML State-charts, in Proceedings of the 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012), 2012.
H. Mantel, Perner, M., and Sauer, J., Noninterference under Weak Memory Models, in Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014), 2014.
A. Popescu, Hölzl, J., and Nipkow, T., Noninterfering Schedulers - When Possibilistic Noninterference Implies Probabilistic Noninterference, in Proceedings of the 5th Conference on Algebra and Coalgebra in Computer Science (CALCO 2013), 2013.