Analysis of Integrity Policies using Soft Constraints. Bistarelli, S. & Foley, S. N. In 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pages 77–80, 2003. IEEE Computer Society. Paper doi bibtex @inproceedings{DBLP:conf/policy/BistarelliF03,
author = {Stefano Bistarelli and
Simon N. Foley},
title = {Analysis of Integrity Policies using Soft Constraints},
booktitle = {4th {IEEE} International Workshop on Policies for Distributed Systems
and Networks {(POLICY} 2003), 4-6 June 2003, Lake Como, Italy},
pages = {77--80},
publisher = {{IEEE} Computer Society},
year = {2003},
url = {https://doi.org/10.1109/POLICY.2003.1206959},
doi = {10.1109/POLICY.2003.1206959},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/policy/BistarelliF03.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":{"_str":"53f475e53d9d602c1a0012d8"},"__v":4,"authorIDs":["5457089d8b01c8193000012f","5a8SaRQZEqQauLeSj","5dec2eeed39dc7de01000059","5defa628706001de01000155","5df0bf368367c8de0100014e","5df7a6a2f3cb28df0100013e","5df8c7c4e6b510df0100018c","5df8e4de877972de0100016c","5df99361c4ada8de01000018","5dfea9342331dfdf01000059","5e012b722e225bde01000053","5e0968c8ade67ddf01000043","5e0b068b3830a1df010000e1","5e10a884cfb06ddf0100002c","5e10fd55d6a01ede01000024","5e142e4b12768ef30100003c","5e1961659eca7cdf01000080","5e1a2ca69fbdddde010000ff","5e1f814208195af3010000a8","5e2b62d96366e2df010000e6","5e2b8ef4f92538df01000011","5e2d73a3556d50df01000041","5e30e7755f9c1cf2010000d7","5e35f2395cd57fde010000c7","5e3a22e3c268d2de01000108","5e3b007c55f0f2df0100011a","5e3e128b4cdb49de0100008a","5e4094bbd668c6de0100007c","5e40f782fd6934df01000169","5e413b68b7d170df01000092","5e42e16aa6f4a6f2010000d1","5e4eddeb2962cadf010000e9","5e54f08fb8e445df01000107","6rZ7TmdCqfG4dxRdT","Q5h43gs9oNpAm4KeK","Zw3hLXQ8Xyab4HobY"],"author_short":["Bistarelli, S.","Foley, S. N."],"bibbaseid":"bistarelli-foley-analysisofintegritypoliciesusingsoftconstraints-2003","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Stefano"],"propositions":[],"lastnames":["Bistarelli"],"suffixes":[]},{"firstnames":["Simon","N."],"propositions":[],"lastnames":["Foley"],"suffixes":[]}],"title":"Analysis of Integrity Policies using Soft Constraints","booktitle":"4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy","pages":"77–80","publisher":"IEEE Computer Society","year":"2003","url":"https://doi.org/10.1109/POLICY.2003.1206959","doi":"10.1109/POLICY.2003.1206959","timestamp":"Thu, 23 Mar 2023 00:00:00 +0100","biburl":"https://dblp.org/rec/conf/policy/BistarelliF03.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/policy/BistarelliF03,\n author = {Stefano Bistarelli and\n Simon N. Foley},\n title = {Analysis of Integrity Policies using Soft Constraints},\n booktitle = {4th {IEEE} International Workshop on Policies for Distributed Systems\n and Networks {(POLICY} 2003), 4-6 June 2003, Lake Como, Italy},\n pages = {77--80},\n publisher = {{IEEE} Computer Society},\n year = {2003},\n url = {https://doi.org/10.1109/POLICY.2003.1206959},\n doi = {10.1109/POLICY.2003.1206959},\n timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/policy/BistarelliF03.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Bistarelli, S.","Foley, S. N."],"key":"DBLP:conf/policy/BistarelliF03","id":"DBLP:conf/policy/BistarelliF03","bibbaseid":"bistarelli-foley-analysisofintegritypoliciesusingsoftconstraints-2003","role":"author","urls":{"Paper":"https://doi.org/10.1109/POLICY.2003.1206959"},"metadata":{"authorlinks":{"bistarelli, s":"https://bista.sites.dmi.unipg.it/papers/"}},"downloads":0},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/53/6380.bib","creationDate":"2014-08-20T10:18:13.878Z","downloads":0,"keywords":[],"search_terms":["analysis","integrity","policies","using","soft","constraints","bistarelli","foley"],"title":"Analysis of Integrity Policies using Soft Constraints","year":2003,"dataSources":["GhB5rb8JzW6az3exo","T6HLi2LBH4teAezac","LXyJ7X9n6g55d9qgh","DjivyTGGA5qit7Mf4","NMm7YpyiDxjcnpopo","WXL4P7BKHQy7Qss6y"]}