Follow
Simon Greiner
Title
Cited by
Cited by
Year
Non-interference with what-declassification in component-based systems
S Greiner, D Grahl
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 253-267, 2016
202016
Information flow analysis
C Scheben, S Greiner
Deductive Software Verification–The KeY Book: From Theory to Practice, 453-471, 2016
142016
Modular verification of information flow security in component-based systems
S Greiner, M Mohr, B Beckert
Software Engineering and Formal Methods: 15th International Conference, SEFM …, 2017
122017
Privacy-preserving surveillance: an interdisciplinary approach
P Birnstill, S Bretthauer, S Greiner, E Krempel
Int'l Data Priv. L. 5, 298, 2015
102015
Model-driven specification and analysis of confidentiality in component-based systems
ME Kramer, M Hecker, S Greiner, K Bao, K Yurchenko
92017
Privacy protection in an electronic chronicle system
S Greiner, J Yang
Proc. 34th Ann. IEEE Northeast Bioeng. Conf, 2008
92008
Rifl 1.1: A common specification language for information-flow requirements
T Bauereiß, S Greiner, M Herda, M Kirsten, X Li, H Mantel, M Mohr, ...
Technical Report TUD-CS-2017-0225, TU Darmstadt, 2017
62017
Privacy preserving surveillance and the tracking paradox
S Greiner, P Birnstill, E Krempel, B Beckert, J Beyerer
Proceedings, Future Security Conference, 15-19, 2013
62013
KeY quicktour for JML
C Engel, A Roth, A Blome, R Bubel, S Greiner
Universität Karlsruhe, 2006
52006
CoCoME with Securitys
S Greiner, M Herda
KIT, 2017
42017
Poster: Security in e-voting
D Bruns, HQ Do, S Greiner, M Herda, M Mohr, E Scapin, T Truderung, ...
36th IEEE Symposium on Security and Privacy (S & P 2015), Poster Session, 2015
42015
A supplier’s perspective on threat analysis and risk assessment according to ISO/SAE 21434
S Greiner, M Massierer, C Loderhose, B Lutz, F Stumpf, F Wiemer
20th escar Europe-The World’s Leading Automotive Cyber Security Conference …, 2022
32022
Proving correctness and security of two-party computation implemented in Java in presence of a semi-honest sender
F Böhl, S Greiner, P Scheidecker
Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014
32014
Compositionality of component fault trees
S Greiner, P Munk, A Nordmann
International Symposium on Model-Based Safety and Assessment, 125-140, 2019
22019
A framework for non-interference in component-based systems
S Greiner
Dissertation, Karlsruhe, Karlsruher Institut für Technologie (KIT), 2018, 2018
22018
Feature-based software architecture analysis to identify safety and security interactions
Priyadarshini, S Greiner, M Massierer
2023 IEEE 20th International Conference on Software Architecture (ICSA), 12-22, 2023
12023
A Method for Identifying Inconsistencies between Functional Safety and Cybersecurity of Autonomous Vehicles
Priyadarshini, S Greiner, M Massierer
6th International Workshop on Critical Automotive Applications: Robustness …, 2021
12021
Modular verification of information flow security in component-based systems - proofs and proof of concept
S Greiner, M Mohr, B Beckert
KIT, 2017
12017
Non-interference with what-declassification in component-based systems
D Grahl, S Greiner
KIT, 2015
12015
Computer-implemented method and device for selecting a fuzzing method for testing a program code
C Huth, A Sarkar, S Greiner
US Patent 11,822,463, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20