Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 47 results:
Author Title Type [ Year(Desc)]
Filters: First Letter Of Last Name is M  [Clear All Filters]
2011
H. Mantel, Sands, D., and Sudbrock, H., Assumptions and Guarantees for Compositional Noninterference, in Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF 2011), 2011.
T. M. Gawlitza, Lammich, P., Müller-Olm, M., Seidl, H., and Wenner, A., Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation, in Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI 2011), 2011.
F. Hadasch, Mueller, B., and Maedche, A., Leaking Confidential Information by Non-Malicious User Behaviour in Enterprise Systems - Design of an Empirical Study, in Proceedings of the 6th Mediterranean Conference on Information Systems (MCIS 2011), 2011.
F. Hadasch, Mueller, B., and Maedche, A., Leaking Confidential Information by Non-Malicious User Behaviour in Enterprise Systems - Design of an Empirical Study, in Proceedings of the 6th Mediterranean Conference on Information Systems (MCIS 2011), 2011.
M. D. Schwarz, Seidl, H., Vojdani, V., Lammich, P., and Müller-Olm, M., Static Analysis of Interrupt-Driven Programs Synchronized via the Priority Ceiling Protocol, in Proceedings of the 38th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL 2011), 2011.
2012
B. Köpf, Mauborgne, L., and Ochoa, M., Automatic Quantification of Cache Side-Channels, in Proceedings of the 24th International Conference on Computer Aided Verification (CAV 2012), 2012.
K. Katkalov, Fischer, P., Stenzel, K., Moebius, N., and Reif, W., Evaluation of Jif and Joana as information flow analyzers in a model-driven approach, in Proceedings of 7th International Workshop on Data Privacy Management (DPM 2012), 2012.
F. Hadasch, Mueller, B., and Maedche, A., Exploring Antecedent Environmental and Organizational Factors to User-Caused Information Leaks: A Qualitative Study, in Proceedings of the 20th European Conference on Information Systems (ECIS 2012), Barcelona, Spain, 2012.
F. Hadasch, Mueller, B., and Maedche, A., Exploring Antecedent Environmental and Organizational Factors to User-Caused Information Leaks: A Qualitative Study, in Proceedings of the 20th European Conference on Information Systems (ECIS 2012), Barcelona, Spain, 2012.
C. Mann and Starostin, A., A Framework for Static Detection of Privacy Leaks in Android Applications, in Proceedings of the 27th Symposium on Applied Computing (SAC 2012), 2012.
A. Lux, Mantel, H., and Perner, M., Scheduler-Independent Declassification, in Proceedings of the 11th International Conference on Mathematics of Program Construction (MPC 2012), 2012.
R. Gay, Mantel, H., and Sprick, B., Service Automata, in Proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011), 2012.
2013
T. Wüchner, Müller, S., and Fischer, R., Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control, in Proceedings of the 5th International Conference on Cloud Computing Technology and Science (CloudCom 2013), 2013.
P. Lammich, Müller-Olm, M., Seidl, H., and Wenner, A., Contextual Locking for Dynamic Pushdown Networks, in Proceedings of the 20th International Symposium on Static Analysis (SAS 2013), 2013.
B. Nordhoff, Müller-Olm, M., and Lammich, P., Iterable Forward Reachability Analysis of Monitor-DPNs, in Proceedings of Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday (Festschrift for Dave Schmidt), 2013.
J. Graf, Hecker, M., Mohr, M., and Nordhoff, B., Lock-sensitive Interference Analysis for Java: Combining Program Dependence Graphs with Dynamic Pushdown Networks, in 1st International Workshop on Interference and Dependence (ID 2013), 2013.
V. Klebanov, Manthey, N., and Muise, C., SAT-based Analysis and Quantification of Information Flow in Programs, in Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST 2013), 2013.
V. Klebanov, Manthey, N., and Muise, C., SAT-based Analysis and Quantification of Information Flow in Programs, in Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST 2013), 2013.
J. Graf, Hecker, M., and Mohr, M., Using JOANA for Information Flow Control in Java Programs - A Practical Guide, in Proceedings of the 6th Working Conference on Programming Languages (ATPS 2013), 2013.

Pages