Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 3 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is V  [Clear All Filters]
B. Finkbeiner, Müller, C., Seidl, H., and Zalinescu, E., Verifying Security Policies in Multi-agent Workflows with Loops, in Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS), 2017.
C. Scheben and Schmitt, P., Verification of Information Flow Properties of Java Programs without Approximations, in Proceedings of the Formal Verification of Object-Oriented Software (FoVeOOS 2011), 2012.
R. Küsters, Truderung, T., and Vogt, A., Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study, in Proceedings of the 32nd IEEE Symposium on Security and Privacy (S{&}P 2011), 2011.