Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Heiko Mantel
2010 – today
- 2012
[c34]
[c33]Alexander Lux, Heiko Mantel, Matthias Perner: Scheduler-Independent Declassification. MPC 2012: 25-47- 2011
[c32]Heiko Mantel, David Sands, Henning Sudbrock: Assumptions and Guarantees for Compositional Noninterference. CSF 2011: 218-232
[c31]Richard Gay, Heiko Mantel, Barbara Sprick: Service Automata. Formal Aspects in Security and Trust 2011: 148-163
[r1]Heiko Mantel: Information Flow and Noninterference. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 605-607- 2010
[c30]
2000 – 2009
- 2009
[c29]- 2008
[j9]Serge Autexier, Heiko Mantel, Stephan Merz, Tobias Nipkow: Preface. J. Autom. Reasoning 41(3-4): 191-192 (2008)
[c28]
[c27]Heiko Mantel, Henning Sudbrock: Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels. Formal Aspects in Security and Trust 2008: 67-81- 2007
[j8]Boris Köpf, Heiko Mantel: Transformational typing and unification for automatically correcting insecure programs. Int. J. Inf. Sec. 6(2-3): 107-131 (2007)
[j7]Dieter Hutter, Heiko Mantel, Ina Schaefer, Axel Schairer: Security of multi-agent systems: A case study on comparison shopping. J. Applied Logic 5(2): 303-332 (2007)
[c26]Heiko Mantel, Henning Sudbrock: Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework. CSF 2007: 326-340
[c25]Gilles Barthe, Heiko Mantel, Peter Müller, Andrew C. Myers, Andrei Sabelfeld: 07091 Executive Summary - Mobility, Ubiquity and Security. Mobility, Ubiquity and Security 2007
[c24]Gilles Barthe, Heiko Mantel, Peter Müller, Andrew C. Myers, Andrei Sabelfeld: 07091 Abstracts Collection - Mobility, Ubiquity and Security. Mobility, Ubiquity and Security 2007
[c23]Heiko Mantel, Alexander Reinhard: Controlling the What and Where of Declassification in Language-Based Security. ESOP 2007: 141-156
[e3]Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel (Eds.): Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-887-9
[e2]Gilles Barthe, Heiko Mantel, Peter Müller, Andrew C. Myers, Andrei Sabelfeld (Eds.): Mobility, Ubiquity and Security, 25.02. - 02.03.2007. Dagstuhl Seminar Proceedings 07091, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007- 2006
[c22]Heiko Mantel, Henning Sudbrock, Tina Kraußer: Combining Different Proof Techniques for Verifying Information Flow Security. LOPSTR 2006: 94-110- 2005
[j6]Serge Autexier, Iliano Cervesato, Heiko Mantel: Preface to the special issue of selected papers from FCS/VERIFY 2002. Int. J. Inf. Sec. 4(1-2): 1 (2005)
[c21]Heiko Mantel, Axel Schairer: Exploiting Generic Aspects of Security Models in Formal Developments. Mechanizing Mathematical Reasoning 2005: 452-475
[c20]Heiko Mantel: The framework of selective interleaving functions and the modular assembly kit. FMSE 2005: 53-62
[c19]Boris Köpf, Heiko Mantel: Eliminating Implicit Information Leaks by Transformational Typing and Unification. Formal Aspects in Security and Trust 2005: 47-62
[e1]Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld (Eds.): Language-Based Security, 5.-10. October 2003. Dagstuhl Seminar Proceedings 03411, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany 2005- 2004
[b1]Heiko Mantel: A uniform framework for the formal specification and verification of information flow security. Saarland University 2004, pp. 1-275
[j5]Christoph Kreitz, Heiko Mantel: A Matrix Characterization for Multiplicative Exponential Linear Logic. J. Autom. Reasoning 32(2): 121-166 (2004)
[c18]Heiko Mantel, David Sands: Controlled Declassification Based on Intransitive Noninterference. APLAS 2004: 129-145- 2003
[j4]Heiko Mantel, Andrei Sabelfeld: A Unifying Approach to the Security of Distributed and Multi-Threaded Programs. Journal of Computer Security 11(4): 615-676 (2003)
[j3]Dieter Hutter, Heiko Mantel, Axel Schairer: Informationsflusskontrolle als Grundlage für die Sicherheit von Multi-Agenten-Systemen. Praxis der Informationsverarbeitung und Kommunikation 26(1): 39-47 (2003)
[c17]Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld: 03411 Final Report - Language Based Security. Language Based Security 2003
[c16]Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld: 03411 Abstracts Collection - Language Based Security. Language Based Security 2003- 2002
[c15]
[c14]Heiko Mantel: On the Composition of Secure Systems. IEEE Symposium on Security and Privacy 2002: 88-101- 2001
[c13]Heiko Mantel, Andrei Sabelfeld: A Generic Approach to the Security of Multi-Threaded Programs. CSFW 2001: 126-
[c12]
[c11]Heiko Mantel: Preserving Information Flow Properties under Refinement. IEEE Symposium on Security and Privacy 2001: 78-91- 2000
[j2]Heiko Mantel, Felix C. Gärtner: A case study in the mechanical verification of fault tolerance. J. Exp. Theor. Artif. Intell. 12(4): 473-487 (2000)
[j1]Serge Autexier, Dieter Hutter, Bruno Langenstein, Heiko Mantel, Georg Rock, Axel Schairer, Werner Stephan, Roland Vogt, Andreas Wolpers: VSE: formal methods meet industrial needs. STTT 3(1): 66-77 (2000)
[c10]
[c9]
[c8]Heiko Mantel, Felix C. Gärtner: A Case Study in the Mechanical Verification of Fault Tolerance. FLAIRS Conference 2000: 341-345
1990 – 1999
- 1999
[c7]Serge Autexier, Dieter Hutter, Heiko Mantel, Axel Schairer: System Description: inka 5.0 - A Logic Voyager. CADE 1999: 207-211
[c6]
[c5]Serge Autexier, Dieter Hutter, Heiko Mantel, Axel Schairer: Towards an Evolutionary Formal Software-Development Using CASL. WADT 1999: 73-88- 1998
[c4]Dieter Hutter, Heiko Mantel, Georg Rock, Werner Stephan, Andreas Wolpers, Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel: VSE: Controlling the Complexity in Formal Software Developments. FM-Trends 1998: 351-358
[c3]
[c2]- 1997
[c1]Christoph Kreitz, Heiko Mantel, Jens Otten, Stephan Schmitt: Connection-Based Proof Construction in Linear Logic. CADE 1997: 207-221
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:11 CEST by the dblp team



