Soft Constraints for Security. Bella, G., Bistarelli, S., & Foley, S. N. In ter Beek, M. H. & Gadducci, F., editors, Proceedings of the First International Workshop on Views on Designing Complex Architectures, VODCA@FOSAD 2004, Bertinoro, Italy, September 11-12, 2004, volume 142, of Electronic Notes in Theoretical Computer Science, pages 11–29, 2004. Elsevier. Paper doi bibtex @inproceedings{DBLP:journals/entcs/BellaBF06,
author = {Giampaolo Bella and
Stefano Bistarelli and
Simon N. Foley},
editor = {Maurice H. ter Beek and
Fabio Gadducci},
title = {Soft Constraints for Security},
booktitle = {Proceedings of the First International Workshop on Views on Designing
Complex Architectures, VODCA@FOSAD 2004, Bertinoro, Italy, September
11-12, 2004},
series = {Electronic Notes in Theoretical Computer Science},
volume = {142},
pages = {11--29},
publisher = {Elsevier},
year = {2004},
url = {https://doi.org/10.1016/j.entcs.2005.07.011},
doi = {10.1016/J.ENTCS.2005.07.011},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/entcs/BellaBF06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"cqmXAPRdmfinrmw4f","bibbaseid":"bella-bistarelli-foley-softconstraintsforsecurity-2004","author_short":["Bella, G.","Bistarelli, S.","Foley, S. N."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Giampaolo"],"propositions":[],"lastnames":["Bella"],"suffixes":[]},{"firstnames":["Stefano"],"propositions":[],"lastnames":["Bistarelli"],"suffixes":[]},{"firstnames":["Simon","N."],"propositions":[],"lastnames":["Foley"],"suffixes":[]}],"editor":[{"firstnames":["Maurice","H."],"propositions":["ter"],"lastnames":["Beek"],"suffixes":[]},{"firstnames":["Fabio"],"propositions":[],"lastnames":["Gadducci"],"suffixes":[]}],"title":"Soft Constraints for Security","booktitle":"Proceedings of the First International Workshop on Views on Designing Complex Architectures, VODCA@FOSAD 2004, Bertinoro, Italy, September 11-12, 2004","series":"Electronic Notes in Theoretical Computer Science","volume":"142","pages":"11–29","publisher":"Elsevier","year":"2004","url":"https://doi.org/10.1016/j.entcs.2005.07.011","doi":"10.1016/J.ENTCS.2005.07.011","timestamp":"Mon, 28 Aug 2023 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/entcs/BellaBF06.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:journals/entcs/BellaBF06,\n author = {Giampaolo Bella and\n Stefano Bistarelli and\n Simon N. Foley},\n editor = {Maurice H. ter Beek and\n Fabio Gadducci},\n title = {Soft Constraints for Security},\n booktitle = {Proceedings of the First International Workshop on Views on Designing\n Complex Architectures, VODCA@FOSAD 2004, Bertinoro, Italy, September\n 11-12, 2004},\n series = {Electronic Notes in Theoretical Computer Science},\n volume = {142},\n pages = {11--29},\n publisher = {Elsevier},\n year = {2004},\n url = {https://doi.org/10.1016/j.entcs.2005.07.011},\n doi = {10.1016/J.ENTCS.2005.07.011},\n timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/entcs/BellaBF06.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Bella, G.","Bistarelli, S.","Foley, S. N."],"editor_short":["ter Beek, M. H.","Gadducci, F."],"key":"DBLP:journals/entcs/BellaBF06","id":"DBLP:journals/entcs/BellaBF06","bibbaseid":"bella-bistarelli-foley-softconstraintsforsecurity-2004","role":"author","urls":{"Paper":"https://doi.org/10.1016/j.entcs.2005.07.011"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/53/6380.bib","dataSources":["LXyJ7X9n6g55d9qgh","DjivyTGGA5qit7Mf4","NMm7YpyiDxjcnpopo","WXL4P7BKHQy7Qss6y"],"keywords":[],"search_terms":["soft","constraints","security","bella","bistarelli","foley"],"title":"Soft Constraints for Security","year":2004}