Information leaks and other violations of information security pose a severe threat to individuals, companies, and even countries. The mechanisms by which attackers threaten information security are diverse and to show their absence thus proved to be a challenging problem. Information-flow control is a principled approach to prevent security incidents in programs and other technical systems. In information-flow control we define information-flow properties, which are sufficient conditions for when the system is secure in a particular attack scenario. By defining the information-flow property only based on what parts of the executions of the system a potential attacker can observe or control, we obtain security guarantees that are independen...
Cyber-physische Systeme ermöglichen zahlreiche moderne Anwendungsfälle und Geschäftsmodelle wie vern...
The dynamics of an information system (IS) is characterized not only by its computational behavior, ...
The scale and complexity of modern networked systems imposes strict performance requirements on prot...
Information leaks and other violations of information security pose a severe threat to individuals, ...
On a regular basis, we learn about well-known online services that have been misused or compromised ...
Today, safety-critical systems can be found in various domains, including the automotive industry, a...
Computer malware is a well-known threat in security which, despite the enormous time and effort inve...
Modern cryptography has become an often ubiquitous but essential part of our daily lives. Protocols ...
The threat of surveillance by governmental and industrial parties is more eminent than ever. As comm...
Der derzeitige Trend hin zu “smarten” Geräten bringt eine Vielzahl an Internetfähigen und verbundene...
With the introduction of the Internet at the end of the last century the modern society was fundamen...
During the last decades, satellite technology has been outstandingly improved, providing huge amount...
Complex computer systems play an important role in every part of everyday life and their correctness...
The implied need for security and connected requirements by the use of e-learning systems has only b...
During the previous decades, the upcoming demand for security in the digital world, e.g., the Intern...
Cyber-physische Systeme ermöglichen zahlreiche moderne Anwendungsfälle und Geschäftsmodelle wie vern...
The dynamics of an information system (IS) is characterized not only by its computational behavior, ...
The scale and complexity of modern networked systems imposes strict performance requirements on prot...
Information leaks and other violations of information security pose a severe threat to individuals, ...
On a regular basis, we learn about well-known online services that have been misused or compromised ...
Today, safety-critical systems can be found in various domains, including the automotive industry, a...
Computer malware is a well-known threat in security which, despite the enormous time and effort inve...
Modern cryptography has become an often ubiquitous but essential part of our daily lives. Protocols ...
The threat of surveillance by governmental and industrial parties is more eminent than ever. As comm...
Der derzeitige Trend hin zu “smarten” Geräten bringt eine Vielzahl an Internetfähigen und verbundene...
With the introduction of the Internet at the end of the last century the modern society was fundamen...
During the last decades, satellite technology has been outstandingly improved, providing huge amount...
Complex computer systems play an important role in every part of everyday life and their correctness...
The implied need for security and connected requirements by the use of e-learning systems has only b...
During the previous decades, the upcoming demand for security in the digital world, e.g., the Intern...
Cyber-physische Systeme ermöglichen zahlreiche moderne Anwendungsfälle und Geschäftsmodelle wie vern...
The dynamics of an information system (IS) is characterized not only by its computational behavior, ...
The scale and complexity of modern networked systems imposes strict performance requirements on prot...