Skip to main content
About
Events
Research
Open Positions
Links
Contact
Publications
Projects
Project Clusters
Reference Scenarios
Tools
Search form
Search
Reliably Secure Software Systems (RS
3
) –
DFG Priority Programme 1496
Research
Publications
Best Paper Awards
Projects
Funded Projects
Associated Projects
Projects by Phases
Project Clusters
Projects
Reference Scenarios
Security in E-Voting
Security in Web-based Workflow Management Systems
Software Security for Mobile Devices
Projects
Tools
Search
Show only items where
Author
any
Abadi, Martín
Accorsi, R.
Ahrendt, Wolfgang
Arzt, Steven
Arzt, S.
Askarov, Aslan
Atkinson, C.
Barte, A.
Bartel, Alexandre
Bastys, Iulia
Bauereiß, Thomas
Bauereiss, Thomas
Bauereiss, T.
Beckert, Bernhard
Beckert, B.
Bichhawat, A.
Bichhawat, Abhishek
Bissyandé, Tegawendé F.
Blanchette, J. C.
Blasum, H.
Bodden, Eric
Bodden, E.
Böhme, S.
Bolosteanu, Iulia
Borek, M.
Breitner, Joachim
Bruns, D.
Bruns, Daniel
Bubel, Richard
Buechler, M.
Chong, Stephen
Clarkson, M. R.
Cortier, Véronique
Cúellar, J.
Dering, Matthew
Dimitrova, R.
Do, Quoc Huy
Do, Huy Quoc
Dörre, Felix
Ehlers, R.
Fahland, D.
Faymonville, Peter
Fennell, L.
Finkbeiner, B.
Finkbeiner, Bernd
Fischer, P.
Fischer, R.
Freiling, F.
Fritz, C.
Fromm, Alexander
Galindo, David
Garg, D.
Garg, Deepak
Gark, Deepak
Gawlitza, T. M.
Gay, Richard
Gay, R.
Gerbig, R.
Giffhorn, Dennis
Gladisch, Christoph
Graf, Jürgen
Graf, J.
Grahl, Daniel
Grebenshchikov, Sergey
Grebing, S.
Grebing, Sarah
Greiner, Simon
Grewe, S.
Gritti, Armando Pesenti
Hadasch, F.
Hahn, Christopher
Hähnle, Reiner
Hammer, C.
Hammer, Christian
Havle, O.
Hecker, Martin
Hecker, M.
Henschel, Martin
Herda, Mihai
Hölzl, J.
Hutter, D.
Hutter, Dieter
Jager, T.
Jain, Jinank
Jha, Somesh
Jürjens, J.
Kamburjan, Eduard
Kanav, S.
Katkalov, K.
Keil, M.
Kelbert, Florian
Kelbert, F.
Kennel, B.
Kirsten, Michael
Klebanov, V.
Klebanov, Vladimir
Klein, Jacques
Klein, J.
Koleini, M.
Köpf, B.
Kovács, M.
Kremer, Steve
Kuhn, J.-M.
Kumari, P.
Kunčar, Ondřej
Küsters, Ralf
Küsters, R.
Lammich, P.
Lammich, Peter
Langenstein, B.
Le Traon, Y.
Le Traon, Yves
Lehmann, A.
Li, Li
Li, Ximeng
Liu, Tianhai
Lochbihler, A.
Lohmann, N.
Lohner, D.
Lortz, Steffen
Loval, Enrico
Lovat, E.
Lovat, Enrico
Lux, A.
Maedche, A.
Mann, C.
Mantel, Heiko
Mantel, H.
Manthey, N.
Mauborgne, L.
McDaniel, P.
McDaniel, Patrick
Micinski, K. K.
Moebius, N.
Mohr, M.
Mohr, Martin
Mostowski, W.
Mostowski, Wojciech
Mueller, B.
Muise, C.
Müller, Christian
Müller, S.
Müller, Johannes
Müller-Olm, M.
Müller-Olm, Markus
Nemouchi, Y.
Nipkow, T.
Nordhoff, Benedikt
Nordhoff, B.
Ochoa, M.
Octeau, Damien
Octeau, D.
Oudinet, J.
Perner, M.
Perner, Matthias
Peschla, J.
Pfeiffer, S.
Popescu, A.
Popescu, Andrei
Pretschner, Alexander
Pretschner, A.
Rabe, Markus
Rabe, M.
Rabe, M. N.
Rafnsson, Willard
Raimondi, Franco
Rajani, Vineet
Rajani, V.
Rasthofer, S.
Rasthofer, Siegfried
Reif, W.
Rezk, Tamara
Rios, R.
Sabelfeld, Andrei
Sánchez, C.
Sánchez, César
Sands, D.
Sauer, J.
Scapin, Enrico
Scapin, E.
Scheben, C.
Scheben, Christoph
Schinzel, S.
Schmaltz, J.
Schmitt, Peter H.
Schmitt, Peter H.
Schmitt, I.
Schmitt, P. H.
Schmitt, P.
Schneider, David
Schoepe, D.
Schwarz, M. D.
Seidl, H.
Seidl, Helmut
Sinz, C.
Smallbone, N.
Smorovksy, J
Snelling, Gregor
Snelting, Gregor
Snelting, G.
Sprick, B.
Starostin, Artem
Starostin, A.
Stenger, Marvin
Stenzel, K.
Stephan, W.
Sudbrock, H.
Taghdiri, Mana
Taghdiri, M.
Tasch, Markus
Tentrup, Leander
Thiemann, P.
Timmermann, D.
Truderung, T.
Truderung, Tomasz
Tunjic, C.
Tverdyshew, S.
Tyszberowicz, Shmuel
Ulbrich, M.
Ulbrich, Mattias
Ulbrich, Matthias
Unger, S.
Verbeek, F.
Vogt, A.
Vojdani, V.
Wand, D.
Warzecha, D.
Wasser, Nathan
Wasserrab, Daniel
Wasserrab, D.
Weber, Alexandra
Weidenbach, C.
Weigl, Alexander
Weisbarth, Jörg
Wenner, Alexander
Wenner, A.
Wolf, K.
Wolf, B.
Wonnemann, C.
Wüchner, T.
Zalinescu, Eugen
Zimmermann, Martin
Type
any
Conference Paper
Journal Article
Miscellaneous
Term
any
Year
any
2017
2016
2015
2014
2013
2012
2011
2010
Keyword
any
conference
Export 33 results:
BibTex
Author
[
Title
]
Type
Year
Filters:
First Letter Of Last Name
is
P
[Clear All Filters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
B
A. Popescu
and
Lammich, P.
,
“
Bounded-Deducibility Security
”
,
Archive of Formal Proofs
, 2014.
Google Scholar
BibTex
C
O. Kunčar
and
Popescu, A.
,
“
Comprehending Isabelle/HOL's Consistency
”
, in
Proceedings of the 26th European Symposium on Programming (ESOP)
, 2017.
Google Scholar
BibTex
S. Kanav
,
Lammich, P.
, and
Popescu, A.
,
“
A Conference Management System with Verified Document Confidentiality
”
, in
Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014)
, 2014.
Google Scholar
BibTex
O. Kunčar
and
Popescu, A.
,
“
A Consistent Foundation for Isabelle/HOL
”
, in
Proceedings of the 6th International Conference on Interactive Theorem Proving (ITP)
, 2015.
Google Scholar
BibTex
T. Bauereiß
,
Gritti, A. Pesenti
,
Popescu, A.
, and
Raimondi, F.
,
“
CoSMed: A Confidentiality-Verified Social Media Platform
”
, in
Proceedings of the 7th International Conference on Interactive Theorem Proving (ITP)
, 2016.
Google Scholar
BibTex
T. Bauereiß
,
Gritti, A. Pesenti
,
Popescu, A.
, and
Raimondi, F.
,
“
CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees
”
, in
Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P)
, 2017.
Google Scholar
BibTex
D
E. Lovat
and
Pretschner, A.
,
“
Data-centric multi-layer usage control enforcement: a Social Network Example
”
, in
Proceedings of the 16th ACM symposium on Access control models and technologies (SACMAT 2011)
, 2011.
Google Scholar
BibTex
F. Kelbert
and
Pretschner, A.
,
“
Decentralized Distributed Data Usage Control
”
, in
Proceedings of the 13th International Conference on Cryptology and Network Security (CANS 2014)
, 2014.
Google Scholar
BibTex
P. Kumari
,
Pretschner, A.
,
Peschla, J.
, and
Kuhn, J. - M.
,
“
Distributed Data Usage Control for Web Applications: A Social Network Implementation
”
, in
Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY 2011)
, 2011.
Google Scholar
BibTex
P. Kumari
,
Pretschner, A.
,
Peschla, J.
, and
Kuhn, J. - M.
,
“
Distributed Data Usage Control for Web Applications: A Social Network Implementation
”
, in
Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY 2011)
, 2011.
Google Scholar
BibTex
E
J. C. Blanchette
,
Böhme, S.
,
Popescu, A.
, and
Smallbone, N.
,
“
Encoding Monomorphic and Polymorphic Types
”
, in
Proceedings of the 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013)
, 2013.
Google Scholar
BibTex
F
A. Popescu
,
Hölzl, J.
, and
Nipkow, T.
,
“
Formal Verification of Language-Based Concurrent Noninterference
”
,
J. Formalized Reasoning
, vol. 6, pp. 1-30, 2013.
Google Scholar
BibTex
A. Popescu
,
Hölzl, J.
, and
Nipkow, T.
,
“
Formalizing Probabilistic Noninterference
”
, in
Proceedings of the 3rd International Conference on Certified Programs and Proofs (CPP 2013)
, 2013.
Google Scholar
BibTex
O. Kunčar
and
Popescu, A.
,
“
From Types to Sets by Local Type Definitions in Higher-Order Logic
”
, in
Proceedings of the 7th International Conference on Interactive Theorem Proving (ITP)
, 2016.
Google Scholar
BibTex
F. Kelbert
and
Pretschner, A.
,
“
A Fully Decentralized Data Usage Control Enforcement Infrastructure
”
, in
Proceedings of the 13th International Conference on Applied Cryptography and Network Security
, 2015.
Google Scholar
BibTex
M
T. Wüchner
,
Ochoa, M.
, and
Pretschner, A.
,
“
Malware Detection with Quantitative Data Flow Graphs
”
, in
Proceedings of the 9th ACM Symposyum on Information, Computer and Communications Security (ASIACCS 2014)
, 2014.
Google Scholar
BibTex
J. C. Blanchette
and
Popescu, A.
,
“
Mechanizing the Metatheory of Sledgehammer
”
, in
Proceedings of the 9th International Symposium on Frontiers of Combining Systems (FroCos 2013)
, 2013.
Google Scholar
BibTex
J. C. Blanchette
,
Popescu, A.
,
Wand, D.
, and
Weidenbach, C.
,
“
More SPASS with Isabelle - Superposition with Hard Sorts and Configurable Simplification
”
, in
Proceedings of the 3rd Conference on Interactive Theorem Proving (ITP 2012)
, 2012.
Google Scholar
BibTex
N
H. Mantel
,
Perner, M.
, and
Sauer, J.
,
“
Noninterference under Weak Memory Models
”
, in
Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF 2014)
, 2014.
Google Scholar
BibTex
A. Popescu
,
Hölzl, J.
, and
Nipkow, T.
,
“
Noninterfering Schedulers - When Possibilistic Noninterference Implies Probabilistic Noninterference
”
, in
Proceedings of the 5th Conference on Algebra and Coalgebra in Computer Science (CALCO 2013)
, 2013.
Google Scholar
BibTex
P
A. Popescu
and
Hölzl, J.
,
“
Possibilistic Noninterference
”
,
Archive of Formal Proofs
, 2012.
Google Scholar
BibTex
A. Popescu
and
Hölzl, J.
,
“
Probabilistic Noninterference
”
,
Archive of Formal Proofs
, 2014.
Google Scholar
BibTex
A. Popescu
,
Hölzl, J.
, and
Nipkow, T.
,
“
Proving Concurrent Noninterference
”
, in
Proceedings of the 2nd International Conference on Certified Programs and Proofs (CPP 2012)
, 2012.
Google Scholar
BibTex
Q
E. Lovat
,
Oudinet, J.
, and
Pretschner, A.
,
“
On Quantitative Dynamic Data Flow Tracking
”
, in
Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014)
, 2014.
Google Scholar
BibTex
R
A. Pretschner
,
Lovat, E.
, and
Buechler, M.
,
“
Representation-Independent Data Usage Control
”
, in
6th International Workshop on Data Privacy Management (DPM 2011)
, 2011.
Google Scholar
BibTex
Pages
1
2
next ›
last »