Author:
Cataño Néstor,Hanvey Sorren,Rueda Camilo
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Appel, A.W.: Foundational proof-carrying code. In: LCS (2001)
2. Backes, M., Bagga, W., Karjoth, G., Schunter, M.: Efficient Comparison of Enterprise Privacy Policies. IBM Research, Zurich Research Laboratory (September 2003)
3. Lecture Notes in Computer Science;G. Barthe,2008
4. Breunesse, C., Cataño, N., Huisman, M., Jacobs, B.: Formal methods for smart cards: An experience report. Science of Computer Programming 55(1-3), 53–80 (2005)
5. Lecture Notes in Computer Science;N. Cataño,2010
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Method Based on MSVL for Verification of the Social Network Privacy Policy;Structured Object-Oriented Formal Language and Method;2016
2. Identifying Transitivity Threats in Social Networks;2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity;2015-05