Gerardo Schneider
Showing 20 publications
When is good enough good enough? On software assurances
Are chrome extensions compliant with the spirit of least privilege?
Transforming data flow diagrams for privacy compliance
Gray-box monitoring of hyperproperties with an application to privacy
MultiCall: A Transaction-batching Interpreter for Ethereum
Refining Privacy-Aware Data Flow Diagrams
Information-Flow Control by Means of Security Wrappers for Active Object Languages with Futures
CROME: Contract-Based Robotic Mission Specification
A collaborative access control framework for online social networks
After you, please: browser extensions order attacks and countermeasures
HMAC and “secure preferences”: Revisiting chromium-based browsers security
A survey of challenges for runtime verification from advanced application domains (beyond software)
MoVEMo - A structured approach for engineering reward functions
Timed epistemic knowledge bases for social networks
A web-based tool for analysing normative documents in english
Testing Meets Static and Runtime Verification
Modelling and analysis of normative documents
Participatory verification of railway infrastructure by representing regulations in RailCNL
Reachability analysis of complex planar hybrid systems
Download publication list
You can download this list to your computer.
Filter and download publication list
As logged in user (Chalmers employee) you find more export functions in MyResearch.
You may also import these directly to Zotero or Mendeley by using a browser plugin. These are found herer:
Zotero Connector
Mendeley Web Importer
The service SwePub offers export of contents from Research in other formats, such as Harvard and Oxford in .RIS, BibTex and RefWorks format.
Showing 1 research projects
Data-Driven Secure Business Intelligence (DataBIN)