Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 7 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
C. Atkinson, Gerbig, R., and Tunjic, C., Towards Multi-level Aware Model Transformations, in 5th International Conference on Theory and Practice of Model Transformations (ICMT 2012), 2012.
C
M. R. Clarkson, Finkbeiner, B., Koleini, M., Micinski, K. K., Rabe, M. N., and Sánchez, C., Temporal Logics for Hyperproperties, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
D
H. Quoc Do, Kamburjan, E., and Wasser, N., Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.
K
M. Keil and Thiemann, P., Type-based Dependency Analysis for JavaScript, in Proceedings of the 8th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2013), 2013.
F. Kelbert and Pretschner, A., Towards a Policy Enforcement Infrastructure for Distributed Usage Control, in Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012), 2012.
L
X. Li, Mantel, H., and Tasch, M., Taming Message-passing Communication in Compositional Reasoning about Confidentiality, in Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS), 2017.