Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 33 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is P  [Clear All Filters]
2012
A. Popescu, Hölzl, J., and Nipkow, T., Proving Concurrent Noninterference, in Proceedings of the 2nd International Conference on Certified Programs and Proofs (CPP 2012), 2012.
A. Lux, Mantel, H., and Perner, M., Scheduler-Independent Declassification, in Proceedings of the 11th International Conference on Mathematics of Program Construction (MPC 2012), 2012.
S. Pfeiffer, Unger, S., Timmermann, D., and Lehmann, A., Secure Information Flow Awareness for Smart Wireless eHealth Systems, in Proceedings of 9th International Multi-Conference on Systems, Signals and Devices (SSD 2012), 2012.
F. Kelbert and Pretschner, A., Towards a Policy Enforcement Infrastructure for Distributed Usage Control, in Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012), 2012.
2011
E. Lovat and Pretschner, A., Data-centric multi-layer usage control enforcement: a Social Network Example, in Proceedings of the 16th ACM symposium on Access control models and technologies (SACMAT 2011), 2011.
P. Kumari, Pretschner, A., Peschla, J., and Kuhn, J. - M., Distributed Data Usage Control for Web Applications: A Social Network Implementation, in Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY 2011), 2011.
P. Kumari, Pretschner, A., Peschla, J., and Kuhn, J. - M., Distributed Data Usage Control for Web Applications: A Social Network Implementation, in Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY 2011), 2011.
A. Pretschner, Lovat, E., and Buechler, M., Representation-Independent Data Usage Control, in 6th International Workshop on Data Privacy Management (DPM 2011), 2011.

Pages