Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 4 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
C. Hammer, Efficient Algorithms for Control Closures, in 1st International Workshop on Interference and Dependence (ID 2013), 2013.
C. Hammer, Experiences with PDG-based IFC, in Proceedings of the 2nd International Symposium on Engineering Secure Software and Systems (ESSoS 2010), 2010.
F. Hadasch, Mueller, B., and Maedche, A., Leaking Confidential Information by Non-Malicious User Behaviour in Enterprise Systems - Design of an Empirical Study, in Proceedings of the 6th Mediterranean Conference on Information Systems (MCIS 2011), 2011.
F. Hadasch, Mueller, B., and Maedche, A., Exploring Antecedent Environmental and Organizational Factors to User-Caused Information Leaks: A Qualitative Study, in Proceedings of the 20th European Conference on Information Systems (ECIS 2012), Barcelona, Spain, 2012.