Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/hicss/Alves-FossSAKS15
%A Alves-Foss, Jim
%A Song, Jia
%A Amack, A. Scott
%A Kerr, Lawrence
%A Steiner, Stuart
%B HICSS
%D 2015
%E Bui, Tung X.
%E Jr., Ralph H. Sprague
%I IEEE Computer Society
%K dblp
%P 5201-5210
%T Evaluating the Use of Security Tags in Security Policy Enforcement Mechanisms.
%U http://dblp.uni-trier.de/db/conf/hicss/hicss2015.html#Alves-FossSAKS15
%@ 978-1-4799-7367-5
@inproceedings{conf/hicss/Alves-FossSAKS15,
added-at = {2024-03-15T00:00:00.000+0100},
author = {Alves-Foss, Jim and Song, Jia and Amack, A. Scott and Kerr, Lawrence and Steiner, Stuart},
biburl = {https://www.bibsonomy.org/bibtex/233ca5a5a62da3802ca6634ad716a119a/dblp},
booktitle = {HICSS},
crossref = {conf/hicss/2015},
editor = {Bui, Tung X. and Jr., Ralph H. Sprague},
ee = {https://doi.ieeecomputersociety.org/10.1109/HICSS.2015.614},
interhash = {f3804b7026e58ee91aa77bd68bfe3ffd},
intrahash = {33ca5a5a62da3802ca6634ad716a119a},
isbn = {978-1-4799-7367-5},
keywords = {dblp},
pages = {5201-5210},
publisher = {IEEE Computer Society},
timestamp = {2024-04-10T21:26:42.000+0200},
title = {Evaluating the Use of Security Tags in Security Policy Enforcement Mechanisms.},
url = {http://dblp.uni-trier.de/db/conf/hicss/hicss2015.html#Alves-FossSAKS15},
year = 2015
}