Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/esorics/RayL15
%A Ray, Donald
%A Ligatti, Jay
%B ESORICS (2)
%D 2015
%E Pernul, Günther
%E Ryan, Peter Y. A.
%E Weippl, Edgar R.
%I Springer
%K dblp
%P 481-499
%T A Theory of Gray Security Policies.
%U http://dblp.uni-trier.de/db/conf/esorics/esorics2015-2.html#RayL15
%V 9327
%@ 978-3-319-24176-0
@inproceedings{conf/esorics/RayL15,
added-at = {2017-05-23T00:00:00.000+0200},
author = {Ray, Donald and Ligatti, Jay},
biburl = {https://www.bibsonomy.org/bibtex/24fc39621720cc10b98411d74155e9ad9/dblp},
booktitle = {ESORICS (2)},
crossref = {conf/esorics/2015-2},
editor = {Pernul, Günther and Ryan, Peter Y. A. and Weippl, Edgar R.},
ee = {https://doi.org/10.1007/978-3-319-24177-7_24},
interhash = {eaed270ad68c3687475908a1362eefef},
intrahash = {4fc39621720cc10b98411d74155e9ad9},
isbn = {978-3-319-24176-0},
keywords = {dblp},
pages = {481-499},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2019-10-22T13:31:51.000+0200},
title = {A Theory of Gray Security Policies.},
url = {http://dblp.uni-trier.de/db/conf/esorics/esorics2015-2.html#RayL15},
volume = 9327,
year = 2015
}