Possibilistic definitions of security-an assembly kit H Mantel Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 185-199, 2000 | 238 | 2000 |
On the composition of secure systems H Mantel Proceedings 2002 IEEE Symposium on Security and Privacy, 88-101, 2002 | 176 | 2002 |
Controlled declassification based on intransitive noninterference H Mantel, D Sands Asian Symposium on Programming Languages and Systems, 129-145, 2004 | 152 | 2004 |
Static confidentiality enforcement for distributed programs A Sabelfeld, H Mantel International Static Analysis Symposium, 376-394, 2002 | 125* | 2002 |
A uniform framework for the formal specification and verification of information flow security H Mantel | 110 | 2003 |
Preserving information flow properties under refinement H Mantel Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 78-91, 2000 | 105 | 2000 |
Assumptions and guarantees for compositional noninterference H Mantel, D Sands, H Sudbrock 2011 IEEE 24th Computer Security Foundations Symposium, 218-232, 2011 | 104 | 2011 |
Information flow control and applications—bridging a gap— H Mantel International Symposium of Formal Methods Europe, 153-172, 2001 | 97 | 2001 |
A Unifying Approach to the Security of Distributed and Multi-Threaded Programs H Mantel, A Sabelfeld Journal of Computer Security 11 (4), 615-676, 2003 | 91 | 2003 |
Unwinding possibilistic security properties H Mantel European Symposium on Research in Computer Security, 238-254, 2000 | 83 | 2000 |
Towards an evolutionary formal software-development using CASL S Autexier, D Hutter, H Mantel, A Schairer Recent Trends in Algebraic Development Techniques: 14th International …, 2000 | 80 | 2000 |
Cassandra: Towards a certifying app store for android S Lortz, H Mantel, A Starostin, T Bähr, D Schneider, A Weber Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014 | 70 | 2014 |
Controlling the what and where of declassification in language-based security H Mantel, A Reinhard Programming Languages and Systems: 16th European Symposium on Programming …, 2007 | 69 | 2007 |
A Generic Approach to the Security of Multi-Threaded Programs. H Mantel, A Sabelfeld CSFW, 126-142, 2001 | 63 | 2001 |
System description: Inka 5.0-a logic voyager S Autexier, D Hutter, H Mantel, A Schairer CADE, 207-211, 1999 | 63 | 1999 |
Transforming out timing leaks, more or less H Mantel, A Starostin Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 52 | 2015 |
Scalable offline monitoring D Basin, G Caronni, S Ereth, M Harvan, F Klaedtke, H Mantel International Conference on Runtime Verification, 31-47, 2014 | 46 | 2014 |
Flexible scheduler-independent security H Mantel, H Sudbrock Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 46 | 2010 |
Hybrid monitors for concurrent noninterference A Askarov, S Chong, H Mantel 2015 IEEE 28th Computer Security Foundations Symposium, 137-151, 2015 | 45 | 2015 |
Service automata R Gay, H Mantel, B Sprick Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011 …, 2012 | 43 | 2012 |