Cited By
View all- Kaushik SWinsborough WWijesekera DAmmann P(2006)Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security on Data and Applications Security XX - Volume 412710.5555/3127142.3127154(163-178)Online publication date: 31-Jul-2006
- Kaushik SWinsborough WWijesekera DAmmann P(2006)Policy Transformations for Preventing Leakage of Sensitive Information in Email SystemsData and Applications Security XX10.1007/11805588_12(163-178)Online publication date: 2006
- Gelperin D(1976)A Resolution-Based Proof Procedure Using Deletion-Directed SearchIEEE Transactions on Computers10.1109/TC.1976.167461225:4(323-327)Online publication date: 1-Apr-1976
- Show More Cited By