The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Heiko Mantel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Heiko Mantel, David Sands
    Controlled Declassification Based on Intransitive Noninterference. [Citation Graph (0, 0)][DBLP]
    APLAS, 2004, pp:129-145 [Conf]
  2. Heiko Mantel, Axel Schairer
    Exploiting Generic Aspects of Security Models in Formal Developments. [Citation Graph (0, 0)][DBLP]
    Mechanizing Mathematical Reasoning, 2005, pp:452-475 [Conf]
  3. Serge Autexier, Dieter Hutter, Heiko Mantel, Axel Schairer
    System Description: inka 5.0 - A Logic Voyager. [Citation Graph (0, 0)][DBLP]
    CADE, 1999, pp:207-211 [Conf]
  4. Christoph Kreitz, Heiko Mantel, Jens Otten, Stephan Schmitt
    Connection-Based Proof Construction in Linear Logic. [Citation Graph (0, 0)][DBLP]
    CADE, 1997, pp:207-221 [Conf]
  5. Heiko Mantel
    The framework of selective interleaving functions and the modular assembly kit. [Citation Graph (0, 0)][DBLP]
    FMSE, 2005, pp:53-62 [Conf]
  6. Heiko Mantel
    Possibilistic Definitions of Security - An Assembly Kit. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:185-199 [Conf]
  7. Heiko Mantel, Andrei Sabelfeld
    A Generic Approach to the Security of Multi-Threaded Programs. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:126-0 [Conf]
  8. Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld
    03411 Final Report - Language Based Security. [Citation Graph (0, 0)][DBLP]
    Language Based Security, 2003, pp:- [Conf]
  9. Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld
    03411 Abstracts Collection - Language Based Security. [Citation Graph (0, 0)][DBLP]
    Language Based Security, 2003, pp:- [Conf]
  10. Heiko Mantel
    Unwinding Possibilistic Security Properties. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:238-254 [Conf]
  11. Heiko Mantel, Felix C. Gärtner
    A Case Study in the Mechanical Verification of Fault Tolerance. [Citation Graph (0, 0)][DBLP]
    FLAIRS Conference, 2000, pp:341-345 [Conf]
  12. Dieter Hutter, Heiko Mantel, Georg Rock, Werner Stephan, Andreas Wolpers, Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    VSE: Controlling the Complexity in Formal Software Developments. [Citation Graph (0, 0)][DBLP]
    FM-Trends, 1998, pp:351-358 [Conf]
  13. Heiko Mantel
    Information Flow Control and Applications - Bridging a Gap. [Citation Graph (0, 0)][DBLP]
    FME, 2001, pp:153-172 [Conf]
  14. Boris Köpf, Heiko Mantel
    Eliminating Implicit Information Leaks by Transformational Typing and Unification. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:47-62 [Conf]
  15. Heiko Mantel, Christoph Kreitz
    A Matrix Characterization for MELL. [Citation Graph (0, 0)][DBLP]
    JELIA, 1998, pp:169-183 [Conf]
  16. Serge Autexier, Heiko Mantel, Werner Stephan
    Simultaneous Quantifier Elimination. [Citation Graph (0, 0)][DBLP]
    KI, 1998, pp:141-152 [Conf]
  17. Heiko Mantel, Henning Sudbrock, Tina Kraußer
    Combining Different Proof Techniques for Verifying Information Flow Security. [Citation Graph (0, 0)][DBLP]
    LOPSTR, 2006, pp:94-110 [Conf]
  18. Andrei Sabelfeld, Heiko Mantel
    Securing Communication in a Concurrent Language. [Citation Graph (0, 0)][DBLP]
    SAS, 2002, pp:376-394 [Conf]
  19. Heiko Mantel
    Preserving Information Flow Properties under Refinement. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:78-0 [Conf]
  20. Heiko Mantel
    On the Composition of Secure Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:88-0 [Conf]
  21. Heiko Mantel, Jens Otten
    linTAP: A Tableau Prover for Linear Logic. [Citation Graph (0, 0)][DBLP]
    TABLEAUX, 1999, pp:217-231 [Conf]
  22. Serge Autexier, Dieter Hutter, Heiko Mantel, Axel Schairer
    Towards an Evolutionary Formal Software-Development Using CASL. [Citation Graph (0, 0)][DBLP]
    WADT, 1999, pp:73-88 [Conf]
  23. Serge Autexier, Iliano Cervesato, Heiko Mantel
    Preface to the special issue of selected papers from FCS/VERIFY 2002. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:1- [Journal]
  24. Dieter Hutter, Heiko Mantel, Ina Schaefer, Axel Schairer
    Security of multi-agent systems: A case study on comparison shopping. [Citation Graph (0, 0)][DBLP]
    J. Applied Logic, 2007, v:5, n:2, pp:303-332 [Journal]
  25. Christoph Kreitz, Heiko Mantel
    A Matrix Characterization for Multiplicative Exponential Linear Logic. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2004, v:32, n:2, pp:121-166 [Journal]
  26. Heiko Mantel, Andrei Sabelfeld
    A Unifying Approach to the Security of Distributed and Multi-Threaded Programs. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:4, pp:615-676 [Journal]
  27. Heiko Mantel, Felix C. Gärtner
    A case study in the mechanical verification of fault tolerance. [Citation Graph (0, 0)][DBLP]
    J. Exp. Theor. Artif. Intell., 2000, v:12, n:4, pp:473-487 [Journal]
  28. Serge Autexier, Dieter Hutter, Bruno Langenstein, Heiko Mantel, Georg Rock, Axel Schairer, Werner Stephan, Roland Vogt, Andreas Wolpers
    VSE: formal methods meet industrial needs. [Citation Graph (0, 0)][DBLP]
    STTT, 2000, v:3, n:1, pp:66-77 [Journal]
  29. Heiko Mantel, Alexander Reinhard
    Controlling the What and Where of Declassification in Language-Based Security. [Citation Graph (0, 0)][DBLP]
    ESOP, 2007, pp:141-156 [Conf]
  30. Boris Köpf, Heiko Mantel
    Transformational typing and unification for automatically correcting insecure programs. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:107-131 [Journal]

  31. Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework. [Citation Graph (, )][DBLP]


  32. 07091 Executive Summary - Mobility, Ubiquity and Security. [Citation Graph (, )][DBLP]


  33. 07091 Abstracts Collection - Mobility, Ubiquity and Security. [Citation Graph (, )][DBLP]


  34. Declassification with Explicit Reference Points. [Citation Graph (, )][DBLP]


  35. Flexible Scheduler-Independent Security. [Citation Graph (, )][DBLP]


  36. Who Can Declassify?. [Citation Graph (, )][DBLP]


  37. Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002