Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 3 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is V  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
B. Finkbeiner, Müller, C., Seidl, H., and Zalinescu, E., Verifying Security Policies in Multi-agent Workflows with Loops, in Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS), 2017.
K
R. Küsters, Truderung, T., and Vogt, A., Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study, in Proceedings of the 32nd IEEE Symposium on Security and Privacy (S{&}P 2011), 2011.
S
C. Scheben and Schmitt, P., Verification of Information Flow Properties of Java Programs without Approximations, in Proceedings of the Formal Verification of Object-Oriented Software (FoVeOOS 2011), 2012.