Author of the publication

Trust-Based Enforcement of Security Policies.

, , , , , and . TGC, volume 8902 of Lecture Notes in Computer Science, page 176-191. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Atomistic Galois insertions for flow sensitive integrity., and . Computer Languages, Systems & Structures, (2017)Pushdown Systems for Monotone Frameworks., , and . CoRR, (2013)A calculus for control flow analysis of security protocols., , and . Int. J. Inf. Sec., 2 (3-4): 145-167 (2004)What is a free name in a process algebra?, , and . Inf. Process. Lett., 103 (5): 188-194 (2007)Optimizing ZigBee Security using Stochastic Model Checking, , , , and . CoRR, (2012)A Denotational Framework for Data Flow Analysis.. Acta Inf., (1982)Succinct Solvers, and . Universität Trier, Mathematik/Informatik, Forschungsbericht, (2001)Static validation of security protocols., , , , and . Journal of Computer Security, 13 (3): 347-390 (2005)Strong Abstract Interpretation Using Power Domains (Extended Abstract)., and . ICALP, volume 154 of Lecture Notes in Computer Science, page 536-547. Springer, (1983)Lightweight Information Flow., and . Models, Languages, and Tools for Concurrent and Distributed Programming, volume 11665 of Lecture Notes in Computer Science, page 455-470. Springer, (2019)