(2011) Policy auditing over incomplete logs: theory, implementation and applications.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11).
Conference:
CCS ACM Conference on Computer and Communications Security
| Item Type: | Conference or Workshop Item (A Paper) (Paper) |
|---|---|
| Additional Information: | pub_id: 1080 Bibtex: Garg_11:PolAudit URL date: None |
| Divisions: | Unspecified |
| Conference: | CCS ACM Conference on Computer and Communications Security |
| Depositing User: | Sebastian Weisgerber |
| Date Deposited: | 26 Jul 2017 10:31 |
| Last Modified: | 18 Jul 2019 12:09 |
| Primary Research Area: | NRA2: Reliable Security Guarantees |
| URI: | https://publications.cispa.saarland/id/eprint/707 |
Actions
Actions (login required)
![]() |
View Item |
