Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 7 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is T  [Clear All Filters]
H. Quoc Do, Kamburjan, E., and Wasser, N., Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
M. R. Clarkson, Finkbeiner, B., Koleini, M., Micinski, K. K., Rabe, M. N., and Sánchez, C., Temporal Logics for Hyperproperties, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
M. Keil and Thiemann, P., Type-based Dependency Analysis for JavaScript, in Proceedings of the 8th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2013), 2013.
F. Kelbert and Pretschner, A., Towards a Policy Enforcement Infrastructure for Distributed Usage Control, in Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012), 2012.
C. Atkinson, Gerbig, R., and Tunjic, C., Towards Multi-level Aware Model Transformations, in 5th International Conference on Theory and Practice of Model Transformations (ICMT 2012), 2012.