Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 9 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S. Grewe, Lux, A., Mantel, H., and Sauer, J., A Formalization of Strong Security, Archive of Formal Proofs, 2014.
S. Grewe, Mantel, H., and Schoepe, D., A Formalization of Assumptions and Guarantees for Compositional Noninterference, Archive of Formal Proofs, 2014.
S. Grewe, Lux, A., Mantel, H., and Sauer, J., A Formalization of Declassification with WHAT-and-WHERE-Security, Archive of Formal Proofs, 2014.
S. Greiner, Mohr, M., and Beckert, B., Modular Verification of Information-Flow Security in Component-Based Systems, in Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM), 2017.
J. Graf, Hecker, M., and Mohr, M., Using JOANA for Information Flow Control in Java Programs - A Practical Guide, in Proceedings of the 6th Working Conference on Programming Languages (ATPS 2013), 2013.
J. Graf, Hecker, M., Mohr, M., and Nordhoff, B., Lock-sensitive Interference Analysis for Java: Combining Program Dependence Graphs with Dynamic Pushdown Networks, in 1st International Workshop on Interference and Dependence (ID 2013), 2013.
D. Giffhorn and Snelting, G., A New Algorithm for Low-Deterministic Security, International Journal on Information Security, 2014.
R. Gay, Mantel, H., and Sprick, B., Service Automata, in Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011), 2012.
T. M. Gawlitza, Lammich, P., Müller-Olm, M., Seidl, H., and Wenner, A., Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation, in Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2011), 2011.