Author:
Hasan Ragib,Winslett Marianne
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Providing Compliance in Critical Computing Systems;Springer Series in Reliability Engineering;2022-07-26
2. Towards Secure Provenance in the Cloud: A Survey;2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC);2015-12
3. Automatic Enforcement of Data Use Policies with DataLawyer;Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data;2015-05-27
4. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach;Lecture Notes in Computer Science;2015
5. Rumpole;ACM Transactions on Information and System Security;2014-08