Author:
Goovaerts Tom,Desmet Lieven,Joosen Wouter
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Beznosov, K.: Object security attributes: Enabling application-specific access control in middleware. In: On the Move to Meaningful Internet Systems - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002, London, UK, pp. 693–710. Springer, Heidelberg (2002)
2. Dulay, N., Lupu, E., Sloman, M., Damianou, N.: A policy deployment model for the ponder language. In: IEEE/IFIP International Symposium on Integrated Network Management Proceedings, pp. 529–543 (2001)
3. LNCS;G. Gheorghe,2010
4. Goovaerts, T., De Win, B., Joosen, W.: Policy Evaluation Contracts. Technical report, Department of Computer Science, Katholieke Universiteit Leuven (2009)
5. IBBT. PeCMan project (Personal Content MANagement) (2007),
http://projects.ibbt.be/pecman
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献