Articles with public access mandates - Bernhard BeckertLearn more
Not available anywhere: 15
Verifying voting schemes
B Beckert, R Goré, C Schürmann, T Bormer, J Wang
Journal of Information Security and Applications 19 (2), 115-129, 2014
Mandates: Danish Council for Strategic Research
Generalised test tables: a practical specification language for reactive systems
B Beckert, S Cha, M Ulbrich, B Vogel-Heuser, A Weigl
Integrated Formal Methods: 13th International Conference, IFM 2017, Turin …, 2017
Mandates: German Research Foundation
Modular verification of information flow security in component-based systems
S Greiner, M Mohr, B Beckert
Software Engineering and Formal Methods: 15th International Conference, SEFM …, 2017
Mandates: Federal Ministry of Education and Research, Germany
Towards correct smart contracts: a case study on formal verification of access control
J Schiffl, M Grundmann, M Leinweber, O Stengele, S Friebe, B Beckert
Proceedings of the 26th ACM Symposium on Access Control Models and …, 2021
Mandates: Helmholtz Association
Applicability of generalized test tables: a case study using the manufacturing system demonstrator xPPU
S Cha, A Weigl, M Ulbrich, B Beckert, B Vogel-Heuser
at-Automatisierungstechnik 66 (10), 834-848, 2018
Mandates: German Research Foundation
Regression verification for Java using a secure information flow calculus
B Beckert, V Klebanov, M Ulbrich
Proceedings of the 17th Workshop on Formal Techniques for Java-like Programs …, 2015
Mandates: German Research Foundation
Modeling and enforcing access control policies for smart contracts
JP Töberg, J Schiffl, F Reiche, B Beckert, R Heinrich, R Reussner
2022 IEEE International Conference on Decentralized Applications and …, 2022
Mandates: Helmholtz Association
Generation of Monitoring Functions in Production Automation Using Test Specifications
S Cha, S Ulewicz, B Vogel-Heuser, A Weigl, M Ulbrich, B Beckert
15th IEEE International Conference on Industrial Informatics, INDIN 2017, 2017
Mandates: German Research Foundation
Why Is Online Voting Still Largely a Black Box?
M Kirsten, M Volkamer, B Beckert
European Symposium on Research in Computer Security, 555-567, 2022
Mandates: Helmholtz Association
Using theorem provers to increase the precision of dependence analysis for information flow control
B Beckert, S Bischof, M Herda, M Kirsten, M Kleine Büning
Formal Methods and Software Engineering: 20th International Conference on …, 2018
Mandates: German Research Foundation
On the preservation of the trust by regression verification of PLC software for cyber-physical systems of systems
S Cha, M Ulbrich, A Weigl, B Beckert, K Land, B Vogel-Heuser
2019 IEEE 17th International Conference on Industrial Informatics (INDIN) 1 …, 2019
Mandates: German Research Foundation
Verification-based test case generation for information-flow properties
M Herda, S Tyszberowicz, J Müssig, B Beckert
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2231-2238, 2019
Mandates: National Natural Science Foundation of China, European Commission
Consistency in the View-Based Development of Cyber-Physical Systems (Convide)
R Reussner, I Schaefer, B Beckert, A Koziolek, E Burger
2023 ACM/IEEE International Conference on Model Driven Engineering Languages …, 2023
Mandates: German Research Foundation
Achieving delta description of the control software for an automated production system evolution
S Cha, A Weigl, M Ulbrich, B Beckert, B Vogel-Heuser
2018 IEEE 14th International Conference on Automation Science and …, 2018
Mandates: German Research Foundation
Static Capability-Based Security for Smart Contracts
J Schiffl, A Weigl, B Beckert
2023 IEEE International Conference on Decentralized Applications and …, 2023
Mandates: Helmholtz Association
Available somewhere: 24
The KeY platform for verification and analysis of Java programs
W Ahrendt, B Beckert, D Bruns, R Bubel, C Gladisch, S Grebing, R Hähnle, ...
Verified Software: Theories, Tools and Experiments: 6th International …, 2014
Mandates: German Research Foundation, European Commission
A hybrid approach for proving noninterference of Java programs
R Küsters, T Truderung, B Beckert, D Bruns, M Kirsten, M Mohr
2015 IEEE 28th Computer Security Foundations Symposium, 305-319, 2015
Mandates: German Research Foundation
Regression verification for programmable logic controller software
B Beckert, M Ulbrich, B Vogel-Heuser, A Weigl
Formal Methods and Software Engineering: 17th International Conference on …, 2015
Mandates: German Research Foundation
Selected challenges of software evolution for automated production systems
B Vogel-Heuser, S Feldmann, J Folmer, J Ladiges, A Fay, S Lity, M Tichy, ...
2015 IEEE 13th International Conference on Industrial Informatics (INDIN …, 2015
Mandates: German Research Foundation
Information flow in object-oriented software
B Beckert, D Bruns, V Klebanov, C Scheben, PH Schmitt, M Ulbrich
Logic-Based Program Synthesis and Transformation: 23rd International …, 2014
Mandates: German Research Foundation
Publication and funding information is determined automatically by a computer program