@inproceedings{5769,
  abstract     = {{Information Flow Analysis (IFA) aims at detecting illegal flows of information between program entities. “Legality” is therein specified in terms of various security policies. For the analysis, this opens up two possibilities: building generic, policy independent and building specific, policy dependent IFAs. While the former needs to track all dependencies between program entities, the latter allows for a reduced and thus more efficient analysis.

In this paper, we start out by formally defining a policy independent information flow analysis. Next, we show how to specialize this IFA via policy specific variable tracking, and prove soundness of the specialization. We furthermore investigate refinement relationships between policies, allowing an IFA for one policy to be employed for its refinements. As policy refinement depends on concrete program entities, we additionally propose a precomputation of policy refinement conditions, enabling an efficient refinement check for concrete programs.}},
  author       = {{Töws, Manuel and Wehrheim, Heike}},
  booktitle    = {{Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)}},
  isbn         = {{9783319686899}},
  issn         = {{0302-9743}},
  pages        = {{362--378}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Policy Dependent and Independent Information Flow Analyses}}},
  doi          = {{10.1007/978-3-319-68690-5_22}},
  year         = {{2017}},
}

@inbook{6255,
  author       = {{Fischer, Holger Gerhard and Engler, Michael and Sauer, Stefan}},
  booktitle    = {{Design, User Experience, and Usability: Theory, Methodology, and Management}},
  isbn         = {{9783319586335}},
  issn         = {{0302-9743}},
  location     = {{Vancouver, Canada}},
  pages        = {{570--583}},
  publisher    = {{Springer International Publishing}},
  title        = {{{A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0}}},
  doi          = {{10.1007/978-3-319-58634-2_42}},
  volume       = {{10288}},
  year         = {{2017}},
}

@inbook{16461,
  author       = {{Bemmann, Pascal and Biermeier, Felix and Bürmann, Jan and Kemper, Arne and Knollmann, Till and Knorr, Steffen and Kothe, Nils and Mäcker, Alexander and Malatyali, Manuel and Meyer auf der Heide, Friedhelm and Riechers, Sören and Schaefer, Johannes Sebastian and Sundermeier, Jannik}},
  booktitle    = {{Structural Information and Communication Complexity}},
  isbn         = {{9783319720494}},
  issn         = {{0302-9743}},
  title        = {{{Monitoring of Domain-Related Problems in Distributed Data Streams}}},
  doi          = {{10.1007/978-3-319-72050-0_13}},
  year         = {{2017}},
}

@inbook{14857,
  author       = {{Beckschäfer, Michaela and Malberg, Simon and Tierney, Kevin and Weskamp, Christoph}},
  booktitle    = {{Lecture Notes in Computer Science}},
  isbn         = {{9783319684956}},
  issn         = {{0302-9743}},
  title        = {{{Simulating Storage Policies for an Automated Grid-Based Warehouse System}}},
  doi          = {{10.1007/978-3-319-68496-3_31}},
  year         = {{2017}},
}

@inbook{23396,
  author       = {{Gerking, Christopher and Schubert, David and Budde, Ingo}},
  booktitle    = {{Theory and Practice of Model Transformation}},
  issn         = {{0302-9743}},
  title        = {{{Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities}}},
  doi          = {{10.1007/978-3-319-61473-1_2}},
  year         = {{2017}},
}

@inbook{60902,
  author       = {{Senk, Johanna and Yegenoglu, Alper and Amblet, Olivier and Brukau, Yury and Davison, Andrew and Lester, David Roland and Lührs, Anna and Quaglio, Pietro and Rostami, Vahid and Rowley, Andrew and Schuller, Bernd and Stokes, Alan Barry and van Albada, Sacha Jennifer and Zielasko, Daniel and Diesmann, Markus and Weyers, Benjamin and Denker, Michael and Grün, Sonja}},
  booktitle    = {{Lecture Notes in Computer Science}},
  isbn         = {{9783319538617}},
  issn         = {{0302-9743}},
  publisher    = {{Springer International Publishing}},
  title        = {{{A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC}}},
  doi          = {{10.1007/978-3-319-53862-4_21}},
  year         = {{2017}},
}

@inproceedings{20000,
  author       = {{Hamann, Heiko and Valentini, Gabriele and Dorigo, Marco}},
  booktitle    = {{10th Int. Conf. on Swarm Intelligence, ANTS 2016}},
  isbn         = {{9783319444260}},
  issn         = {{0302-9743}},
  title        = {{{Population Coding: A New Design Paradigm for Embodied Distributed Systems}}},
  doi          = {{10.1007/978-3-319-44427-7_15}},
  year         = {{2016}},
}

@inproceedings{20004,
  author       = {{Valentini, Gabriele and Brambilla, Davide and Hamann, Heiko and Dorigo, Marco}},
  booktitle    = {{10th Int. Conf. on Swarm Intelligence, ANTS 2016}},
  isbn         = {{9783319444260}},
  issn         = {{0302-9743}},
  title        = {{{Collective Perception of Environmental Features in a Robot Swarm}}},
  doi          = {{10.1007/978-3-319-44427-7_6}},
  year         = {{2016}},
}

@inbook{2948,
  author       = {{Günther, Peter and Krummel, Volker}},
  booktitle    = {{Mathematical Aspects of Computer and Information Sciences}},
  isbn         = {{9783319328584}},
  issn         = {{0302-9743}},
  pages        = {{151--165}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures}}},
  doi          = {{10.1007/978-3-319-32859-1_13}},
  year         = {{2016}},
}

@inbook{2968,
  author       = {{Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler, Christian}},
  booktitle    = {{Algorithm Engineering}},
  isbn         = {{9783319494869}},
  issn         = {{0302-9743}},
  pages        = {{81--116}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Theoretical Analysis of the k-Means Algorithm – A Survey}}},
  doi          = {{10.1007/978-3-319-49487-6_3}},
  year         = {{2016}},
}

@inbook{2970,
  author       = {{Blömer, Johannes and Bujna, Kathrin}},
  booktitle    = {{Advances in Knowledge Discovery and Data Mining}},
  isbn         = {{9783319317496}},
  issn         = {{0302-9743}},
  pages        = {{296--308}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Adaptive Seeding for Gaussian Mixture Models}}},
  doi          = {{10.1007/978-3-319-31750-2_24}},
  year         = {{2016}},
}

@inproceedings{5825,
  abstract     = {{Integrating apps on mobile devices into applications running on other devices is usually difficult. For instance, using a messenger on a smartphone to share a text written on a desktop computer often ends up in a cumbersome solution to transfer the text, because many applications are not designed for such scenarios. In this paper, we present an approach enabling the integration of apps running on Android devices into applications running on other devices and even other platforms. This is achieved by specifying adapters for Android apps, which map their services to a platform-independent service interface. For this purpose, we have developed a domain-specific language to ease the specification of such mappings. Our approach is applicable without the need to modify the existing Android apps providing the service. We analyzed its feasibility by implementing our approach and by specifying mappings for several popular Android apps, e.g., phone book, camera, and file explorer.}},
  author       = {{Wolters, Dennis and Kirchhoff, Jonas and Gerth, Christian and Engels, Gregor}},
  booktitle    = {{Service-Oriented Computing}},
  editor       = {{Sheng, Quan Z.  and Stroulia, Eleni  and Tata, Samir  and Bhiri, Sami }},
  isbn         = {{9783319462943}},
  issn         = {{0302-9743}},
  keywords     = {{Cross-Device, Integration, Android, Adapter, DSL}},
  pages        = {{171--185}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Cross-Device Integration of Android Apps}}},
  doi          = {{10.1007/978-3-319-46295-0_11}},
  year         = {{2016}},
}

@inbook{6257,
  author       = {{Fischer, Holger Gerhard and Senft, Björn}},
  booktitle    = {{Human-Centered and Error-Resilient Systems Development}},
  editor       = {{Bogdan, Christian}},
  isbn         = {{9783319449012}},
  issn         = {{0302-9743}},
  location     = {{Stockholm, Sweden}},
  pages        = {{30--41}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows}}},
  doi          = {{10.1007/978-3-319-44902-9_3}},
  volume       = {{9856}},
  year         = {{2016}},
}

@inbook{2978,
  author       = {{Blömer, Johannes and Bujna, Kathrin}},
  booktitle    = {{Advances in Knowledge Discovery and Data Mining}},
  isbn         = {{9783319317496}},
  issn         = {{0302-9743}},
  pages        = {{296--308}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Adaptive Seeding for Gaussian Mixture Models}}},
  doi          = {{10.1007/978-3-319-31750-2_24}},
  year         = {{2016}},
}

@inbook{60904,
  author       = {{Yegenoglu, Alper and Quaglio, Pietro and Torre, Emiliano and Grün, Sonja and Endres, Dominik}},
  booktitle    = {{Lecture Notes in Computer Science}},
  isbn         = {{9783319409849}},
  issn         = {{0302-9743}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike Patterns in Massively Parallel Spike Trains}}},
  doi          = {{10.1007/978-3-319-40985-6_1}},
  year         = {{2016}},
}

@inbook{2921,
  author       = {{Blazy, Olivier and Kakvi, Saqib and Kiltz, Eike and Pan, Jiaxin}},
  booktitle    = {{Lecture Notes in Computer Science}},
  isbn         = {{9783662464465}},
  issn         = {{0302-9743}},
  pages        = {{256--279}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Tightly-Secure Signatures from Chameleon Hash Functions}}},
  doi          = {{10.1007/978-3-662-46447-2_12}},
  year         = {{2015}},
}

@inbook{15897,
  author       = {{Altmeier, Christian and Mainka, Christian and Somorovsky, Juraj and Schwenk, Jörg}},
  booktitle    = {{Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015}},
  isbn         = {{9783319298825}},
  issn         = {{0302-9743}},
  location     = {{Vienna}},
  title        = {{{AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services}}},
  doi          = {{10.1007/978-3-319-29883-2_5}},
  year         = {{2015}},
}

@inbook{15899,
  author       = {{Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}},
  booktitle    = {{Computer Security -- ESORICS 2015}},
  isbn         = {{9783319241739}},
  issn         = {{0302-9743}},
  title        = {{{Practical Invalid Curve Attacks on TLS-ECDH}}},
  doi          = {{10.1007/978-3-319-24174-6_21}},
  year         = {{2015}},
}

@inproceedings{15088,
  author       = {{Böttcher, Stefan and Hartel, Rita and Jacobs, Thomas and Jeromin, Markus}},
  booktitle    = {{Data Science - 30th British International Conference on Databases, BICOD 2015}},
  isbn         = {{9783319204239}},
  issn         = {{0302-9743}},
  pages        = {{186--198}},
  publisher    = {{Springer}},
  title        = {{{ECST – Extended Context-Free Straight-Line Tree Grammars}}},
  doi          = {{10.1007/978-3-319-20424-6_18}},
  year         = {{2015}},
}

@inbook{25338,
  author       = {{Geierhos, Michaela and Bäumer, Frederik S. and Schulze, Sabine and Klotz, Caterina}},
  booktitle    = {{Modeling and Using Context}},
  issn         = {{0302-9743}},
  title        = {{{Understanding the Patient 2.0}}},
  doi          = {{10.1007/978-3-319-25591-0_12}},
  year         = {{2015}},
}

