Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 4 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is R  [Clear All Filters]
2014
S. Arzt and Bodden, E., Reviser: Efficiently Updating IDE-/IFDS-Based Data-Flow Analyses in Response to Incremental Program Changes, in Proceedings of the 36th International Conference on Software Engineering (ICSE 2014), 2014.
2013
M. Kovács, Seidl, H., and Finkbeiner, B., Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties, in Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), 2013.
2012
M. Kovács and Seidl, H., Runtime Enforcement of Information Flow Security in Tree Manipulating Processes, in Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
2011
A. Pretschner, Lovat, E., and Buechler, M., Representation-Independent Data Usage Control, in 6th International Workshop on Data Privacy Management (DPM 2011), 2011.