Reasoning about Secure Interoperation Using Soft Constraints. Bistarelli, S., Foley, S., N., & O'Sullivan, B. 2005. bibtex @misc{
title = {Reasoning about Secure Interoperation Using Soft Constraints},
type = {misc},
year = {2005},
source = {Formal Aspects in Security and Trust},
identifiers = {[object Object]},
id = {af2b0c69-0c45-3204-bd7a-6f8b1f72bf85},
created = {2017-04-06T23:05:12.013Z},
file_attached = {false},
profile_id = {903920d0-d2a6-30df-a1d5-ff042699cff4},
last_modified = {2017-04-06T23:05:12.013Z},
read = {false},
starred = {false},
authored = {true},
confirmed = {false},
hidden = {false},
private_publication = {false},
bibtype = {misc},
author = {Bistarelli, Stefano and Foley, Simon N and O'Sullivan, Barry}
}
Downloads: 0
{"_id":{"_str":"53f4b84d3d9d602c1a00146c"},"__v":0,"authorIDs":["5457089d8b01c8193000012f"],"author_short":["Bistarelli, S.","Foley, S., N.","O'Sullivan, B."],"bibbaseid":"bistarelli-foley-osullivan-reasoningaboutsecureinteroperationusingsoftconstraints-2005","bibdata":{"title":"Reasoning about Secure Interoperation Using Soft Constraints","type":"misc","year":"2005","source":"Formal Aspects in Security and Trust","identifiers":"[object Object]","id":"af2b0c69-0c45-3204-bd7a-6f8b1f72bf85","created":"2017-04-06T23:05:12.013Z","file_attached":false,"profile_id":"903920d0-d2a6-30df-a1d5-ff042699cff4","last_modified":"2017-04-06T23:05:12.013Z","read":false,"starred":false,"authored":"true","confirmed":false,"hidden":false,"private_publication":false,"bibtype":"misc","author":"Bistarelli, Stefano and Foley, Simon N and O'Sullivan, Barry","bibtex":"@misc{\n title = {Reasoning about Secure Interoperation Using Soft Constraints},\n type = {misc},\n year = {2005},\n source = {Formal Aspects in Security and Trust},\n identifiers = {[object Object]},\n id = {af2b0c69-0c45-3204-bd7a-6f8b1f72bf85},\n created = {2017-04-06T23:05:12.013Z},\n file_attached = {false},\n profile_id = {903920d0-d2a6-30df-a1d5-ff042699cff4},\n last_modified = {2017-04-06T23:05:12.013Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n private_publication = {false},\n bibtype = {misc},\n author = {Bistarelli, Stefano and Foley, Simon N and O'Sullivan, Barry}\n}","author_short":["Bistarelli, S.","Foley, S., N.","O'Sullivan, B."],"bibbaseid":"bistarelli-foley-osullivan-reasoningaboutsecureinteroperationusingsoftconstraints-2005","role":"author","urls":{},"downloads":0},"bibtype":"misc","biburl":null,"creationDate":"2014-08-20T15:01:33.274Z","downloads":0,"keywords":[],"search_terms":["reasoning","secure","interoperation","using","soft","constraints","bistarelli","foley","o'sullivan"],"title":"Reasoning about Secure Interoperation Using Soft Constraints","year":2005}