(2011) Policy auditing over incomplete logs: theory, implementation and applications.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11).
Conference:
CCS ACM Conference on Computer and Communications Security
Item Type: | Conference or Workshop Item (A Paper) (Paper) |
---|---|
Additional Information: | pub_id: 1080 Bibtex: Garg_11:PolAudit URL date: None |
Divisions: | Unspecified |
Conference: | CCS ACM Conference on Computer and Communications Security |
Depositing User: | Sebastian Weisgerber |
Date Deposited: | 26 Jul 2017 10:31 |
Last Modified: | 18 Jul 2019 12:09 |
Primary Research Area: | NRA2: Reliable Security Guarantees |
URI: | https://publications.cispa.saarland/id/eprint/707 |
Actions
Actions (login required)
View Item |