Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 6 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is B and Author is Bernhard Beckert  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
S. Greiner, Mohr, M., and Beckert, B., Modular Verification of Information-Flow Security in Component-Based Systems, in Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM), 2017.
I
B. Beckert, Bruns, D., Klebanov, V., Scheben, C., Schmitt, P. H., and Ulbrich, M., Information Flow in Object-Oriented Software, in Proceedings of the 24th International Symposium on Logic Based Program Synthesis and Transformation (LOPSTR), 2014.
H
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Kirsten, M., and Mohr, M., A Hybrid Approach for Proving Noninterference of Java Programs, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
C
T. Liu, Tyszberowicz, S., Herda, M., Beckert, B., Grahl, D., and Taghdiri, M., Computing Specification-Sensitive Abstractions for Program Verification, in Proceedings of the 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA), 2016.