Publication | Date of Publication | Type |
---|
Lightweight information flow | 2024-02-23 | Paper |
Multi-valued logic for static analysis and model checking | 2023-08-02 | Paper |
Process-local static analysis of synchronous processes | 2023-05-26 | Paper |
Factorization of behavioral integrity | 2022-08-19 | Paper |
Static and dynamic processor allocation for higher-order concurrent languages | 2022-08-18 | Paper |
Constraints for polymorphic behaviours of concurrent ML | 2022-08-16 | Paper |
Benign interaction of security domains | 2022-07-13 | Paper |
Formal Methods | 2021-11-16 | Paper |
Disjunctive Information Flow for Communicating Processes | 2021-04-07 | Paper |
Secure Guarded Commands | 2020-07-20 | Paper |
Information Flow for Timed Automata | 2020-02-24 | Paper |
Secure information release in timed automata | 2019-09-16 | Paper |
A parametric abstract domain for lattice-valued regular expressions | 2018-08-27 | Paper |
A monotone framework for CCS | 2018-05-16 | Paper |
Systematic realisation of control flow analyses for CML | 2017-08-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q2980974 | 2017-05-08 | Paper |
Discovering, quantifying, and displaying attacks | 2017-04-11 | Paper |
Content dependent information flow control | 2017-02-22 | Paper |
Enforcing Availability in Failure-Aware Communicating Systems | 2016-10-19 | Paper |
Hoare Logic for Disjunctive Information Flow | 2016-01-08 | Paper |
Modal abstractions of concurrent behavior | 2015-09-17 | Paper |
Discretionary Information Flow Control for Interaction-Oriented Specifications | 2015-09-14 | Paper |
A calculus of quality for robustness against unreliable communication | 2015-08-21 | Paper |
Stochastic Model Checking of the Stochastic Quality Calculus | 2015-06-22 | Paper |
Shape analysis for mobile ambients | 2015-03-17 | Paper |
Flow Logic for Process Calculi | 2014-08-13 | Paper |
Active Evaluation Contexts for Reaction Semantics | 2013-12-13 | Paper |
Heuristics for Safety and Security Constraints | 2013-12-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q2848486 | 2013-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q2849853 | 2013-09-20 | Paper |
XACML 3.0 in Answer Set Programming | 2013-09-13 | Paper |
Safety versus Security in the Quality Calculus | 2013-08-16 | Paper |
Lazy Mobile Intruders | 2013-08-06 | Paper |
Cryptographic Analysis in Cubic Time | 2013-07-24 | Paper |
\textsf{CaPiTo}: Protocol stacks for services | 2011-10-18 | Paper |
From flow logic to static type systems for coordination languages | 2010-04-29 | Paper |
Model Checking Is Static Analysis of Modal Logic | 2010-04-27 | Paper |
What is a free name in a process algebra? | 2010-03-24 | Paper |
Static analysis of topology-dependent broadcast networks | 2010-02-26 | Paper |
Foundations of Security Analysis and Design II | 2009-05-14 | Paper |
Pathway analysis for BioAmbients | 2008-11-06 | Paper |
Topology-Dependent Abstractions of Broadcast Networks | 2008-09-18 | Paper |
Analyzing Security Protocols in Hierarchical Networks | 2008-09-04 | Paper |
Relational Analysis of Correlation | 2008-08-28 | Paper |
Modal Abstractions of Concurrent Behaviour | 2008-08-28 | Paper |
Iterative Specialisation of Horn Clauses | 2008-04-11 | Paper |
Tools and Algorithms for the Construction and Analysis of Systems | 2007-09-28 | Paper |
Types from Control Flow Analysis | 2007-09-24 | Paper |
Data Flow Analysis for CCS | 2007-09-24 | Paper |
Semantics with applications: an appetizer. | 2007-06-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q3431409 | 2007-04-10 | Paper |
Static Analysis | 2005-08-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4671219 | 2005-04-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4654726 | 2005-03-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4738360 | 2004-08-11 | Paper |
Abstract interpretation of mobile ambients. | 2003-08-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4414732 | 2003-07-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4411948 | 2003-07-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4790411 | 2003-06-02 | Paper |
Static analysis for the \(\pi\)-calculus with applications to security | 2003-01-14 | Paper |
Validating firewalls using flow logics | 2002-07-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q2729057 | 2001-11-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q2748155 | 2001-10-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4505701 | 2001-09-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4494378 | 2000-08-10 | Paper |
Using transformations in the implementation of higher-order functions | 2000-02-09 | Paper |
Strictness and totality analysis | 2000-01-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4255591 | 1999-08-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4222938 | 1999-01-06 | Paper |
Behavior analysis for validating communication patterns | 1998-01-01 | Paper |
Type and behaviour reconstruction for higher-order concurrent programs | 1997-09-29 | Paper |
From CML to its process algebra | 1997-02-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4895544 | 1996-10-14 | Paper |
The tensor product in Wadler's analysis of lists | 1994-07-21 | Paper |
Bounded Fixed-Point Iteration | 1993-06-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4038668 | 1993-05-18 | Paper |
Two-Level Functional Languages | 1993-01-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4023828 | 1993-01-23 | Paper |
Functional completeness of the mixed \(\lambda\)-calculus and combinatory logic | 1990-01-01 | Paper |
Two-level semantics and code generation | 1988-01-01 | Paper |
A Hoare-like proof system for analysing the computation time of programs | 1987-01-01 | Paper |
Computation sequences: A way to characterize classes of attribute grammars | 1983-01-01 | Paper |