Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 39 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
W. Rafnsson, Sabelfeld, A., and Garg, D., Progress-Sensitive Security for SPARK, in Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.
S
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R., Security in E-Voting, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
D. Bruns, Do, H. Quoc, Greiner, S., Herda, M., Mohr, M., Scapin, E., Truderung, T., Beckert, B., Küsters, R., Mantel, H., and Gay, R., Security in E-Voting, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L., Security in Web-Based Workflows, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L., Security in Web-Based Workflows, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
T. Bauereiss, Bichhawat, A., Bolosteanu, I., Faymonville, P., Finkbeiner, B., Garg, D., Gay, R., Grebenshchikov, S., Hammer, C., Hutter, D., Kunčar, O., Lammich, P., Mantel, H., Müller, C., Popescu, A., Rabe, M., Rajani, V., Seidl, H., Tasch, M., and Tentrup, L., Security in Web-Based Workflows, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
R. Gay, Mantel, H., and Sprick, B., Service Automata, in Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011), 2012.
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A., Software Security for Mobile Devices, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
V. Cortier, Galindo, D., Küsters, R., Müller, J., and Truderung, T., SoK: Verifiability Notions for E-Voting Protocols, in Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P), 2016.
C. Atkinson, Gerbig, R., and Kennel, B., Symbiotic general-purpose and domain-specific languages, in Proceedings of the 34th International Conference on Software Engineering (ICSE 2012), 2012.
T
C. Atkinson, Gerbig, R., and Tunjic, C., Towards Multi-level Aware Model Transformations, in 5th International Conference on Theory and Practice of Model Transformations (ICMT 2012), 2012.
V. Rajani, Bastys, I., Rafnsson, W., and Garg, D., Type Systems for Information Flow Control: The Question of Granularity, ACM SIGLOG News, vol. 4, no. 1, 2017.
U
J. Graf, Hecker, M., and Mohr, M., Using JOANA for Information Flow Control in Java Programs - A Practical Guide, in Proceedings of the 6th Working Conference on Programming Languages (ATPS 2013), 2013.
W
A. Bichhawat, Rajani, V., Jain, J., Garg, D., and Hammer, C., WebPol: Fine-grained Information Flow Policies for Web Browsers, in Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), 2017.

Pages