Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 17 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
G. Snelting, Giffhorn, D., Graf, J., Hammer, C., Hecker, M., Mohr, M., and Wasserrab, D., Checking Probabilistic Noninterference Using JOANA, it - Information Technology, 2014.
T. Wüchner, Müller, S., and Fischer, R., Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control, in Proceedings of the 5th International Conference on Cloud Computing Technology and Science (CloudCom 2013), 2013.
P. Lammich, Müller-Olm, M., Seidl, H., and Wenner, A., Contextual Locking for Dynamic Pushdown Networks, in Proceedings of the 20th International Symposium on Static Analysis (SAS 2013), 2013.
J
T. M. Gawlitza, Lammich, P., Müller-Olm, M., Seidl, H., and Wenner, A., Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation, in Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2011), 2011.
M
T. Wüchner, Ochoa, M., and Pretschner, A., Malware Detection with Quantitative Data Flow Graphs, in Proceedings of the 9th ACM Symposyum on Information, Computer and Communications Security (ASIACCS 2014), 2014.
J. C. Blanchette, Popescu, A., Wand, D., and Weidenbach, C., More SPASS with Isabelle - Superposition with Hard Sorts and Configurable Simplification, in Proceedings of the 3rd Conference on Interactive Theorem Proving (ITP 2012), 2012.
J. C. Blanchette, Popescu, A., Wand, D., and Weidenbach, C., More SPASS with Isabelle - Superposition with Hard Sorts and Configurable Simplification, in Proceedings of the 3rd Conference on Interactive Theorem Proving (ITP 2012), 2012.
S
S. Arzt, Bartel, A., Gay, R., Lortz, S., Lovat, E., Mantel, H., Mohr, M., Nordhoff, B., Perner, M., Rasthofer, S., Schneider, D., Snelting, G., Starostin, A., and Weber, A., Software Security for Mobile Devices, Poster at the IEEE Symposium on Security and Privacy (S&P). 2015.
M. Ochoa, Jürjens, J., and Warzecha, D., A Sound Decision Procedure for the Compositionality of Secrecy, in Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
V. Klebanov, Weigl, A., and Weisbarth, J., Sound Probabilistic #SAT with Projection, in Proceedings of the 14th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL), 2016.
V. Klebanov, Weigl, A., and Weisbarth, J., Sound Probabilistic #SAT with Projection, in Proceedings of the 14th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL), 2016.
R. Accorsi and Wonnemann, C., Strong non-leak guarantees for workflow models, in Proceedings of the 26th ACM Symposium on Applied Computing (SAC 2011), 2011.
A. Lehmann, Lohmann, N., and Wolf, K., Stubborn Sets for Simple Linear Time Properties, in Proceedings of 33rd International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency (PETRI NETS 2012), 2012.
T
H. Quoc Do, Kamburjan, E., and Wasser, N., Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study, in Proceedings of the 5th International Conference on Principles of Security and Trust (POST), 2016.