Author of the publication

Exploiting Generic Aspects of Security Models in Formal Developments.

, and . Mechanizing Mathematical Reasoning, volume 2605 of Lecture Notes in Computer Science, page 452-475. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Case Study in the Mechanical Verification of Fault Tolerance., and . FLAIRS Conference, page 341-345. AAAI Press, (2000)A Unifying Approach to the Security of Distributed and Multi-Threaded Programs., and . Journal of Computer Security, 11 (4): 615-676 (2003)Preserving Information Flow Properties under Refinement.. IEEE Symposium on Security and Privacy, page 78-91. IEEE Computer Society, (2001)On the Composition of Secure Systems.. IEEE Symposium on Security and Privacy, page 88-101. IEEE Computer Society, (2002)A Formalization of Strong Security., , , and . Archive of Formal Proofs, (2014)Simultaneous Quantifier Elimination., , and . KI, volume 1504 of Lecture Notes in Computer Science, page 141-152. Springer, (1998)A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode., , , , , and . NordSec, volume 11252 of Lecture Notes in Computer Science, page 437-453. Springer, (2018)Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis., , , and . LOPSTR, volume 9527 of Lecture Notes in Computer Science, page 201-217. Springer, (2015)Who Can Declassify?., and . Formal Aspects in Security and Trust, volume 5491 of Lecture Notes in Computer Science, page 35-49. Springer, (2008)The framework of selective interleaving functions and the modular assembly kit.. FMSE, page 53-62. ACM, (2005)