Reasoning about Secure Interoperation Using Soft Constraints. Bistarelli, S., Foley, S. N., & O'Sullivan, B. In Dimitrakos, T. & Martinelli, F., editors, Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, volume 173, of IFIP, pages 173–186, 2004. Springer.
Paper doi bibtex @inproceedings{DBLP:conf/ifip1-7/BistarelliFO04,
author = {Stefano Bistarelli and
Simon N. Foley and
Barry O'Sullivan},
editor = {Theodosis Dimitrakos and
Fabio Martinelli},
title = {Reasoning about Secure Interoperation Using Soft Constraints},
booktitle = {Formal Aspects in Security and Trust: Second {IFIP} {TC1} {WG1.7}
Workshop on Formal Aspects in Security and Trust (FAST), an event
of the 18th {IFIP} World Computer Congress, August 22-27, 2004, Toulouse,
France},
series = {{IFIP}},
volume = {173},
pages = {173--186},
publisher = {Springer},
year = {2004},
url = {https://doi.org/10.1007/0-387-24098-5\_13},
doi = {10.1007/0-387-24098-5\_13},
timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ifip1-7/BistarelliFO04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":{"_str":"53f475e53d9d602c1a0012ca"},"__v":0,"authorIDs":["5457089d8b01c8193000012f"],"author_short":["Bistarelli, S.","Foley, S. N.","O'Sullivan, B."],"bibbaseid":"bistarelli-foley-osullivan-reasoningaboutsecureinteroperationusingsoftconstraints-2004","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Stefano"],"propositions":[],"lastnames":["Bistarelli"],"suffixes":[]},{"firstnames":["Simon","N."],"propositions":[],"lastnames":["Foley"],"suffixes":[]},{"firstnames":["Barry"],"propositions":[],"lastnames":["O'Sullivan"],"suffixes":[]}],"editor":[{"firstnames":["Theodosis"],"propositions":[],"lastnames":["Dimitrakos"],"suffixes":[]},{"firstnames":["Fabio"],"propositions":[],"lastnames":["Martinelli"],"suffixes":[]}],"title":"Reasoning about Secure Interoperation Using Soft Constraints","booktitle":"Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France","series":"IFIP","volume":"173","pages":"173–186","publisher":"Springer","year":"2004","url":"https://doi.org/10.1007/0-387-24098-5\\_13","doi":"10.1007/0-387-24098-5_13","timestamp":"Tue, 26 Jun 2018 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/ifip1-7/BistarelliFO04.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/ifip1-7/BistarelliFO04,\n author = {Stefano Bistarelli and\n Simon N. Foley and\n Barry O'Sullivan},\n editor = {Theodosis Dimitrakos and\n Fabio Martinelli},\n title = {Reasoning about Secure Interoperation Using Soft Constraints},\n booktitle = {Formal Aspects in Security and Trust: Second {IFIP} {TC1} {WG1.7}\n Workshop on Formal Aspects in Security and Trust (FAST), an event\n of the 18th {IFIP} World Computer Congress, August 22-27, 2004, Toulouse,\n France},\n series = {{IFIP}},\n volume = {173},\n pages = {173--186},\n publisher = {Springer},\n year = {2004},\n url = {https://doi.org/10.1007/0-387-24098-5\\_13},\n doi = {10.1007/0-387-24098-5\\_13},\n timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/ifip1-7/BistarelliFO04.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Bistarelli, S.","Foley, S. N.","O'Sullivan, B."],"editor_short":["Dimitrakos, T.","Martinelli, F."],"key":"DBLP:conf/ifip1-7/BistarelliFO04","id":"DBLP:conf/ifip1-7/BistarelliFO04","bibbaseid":"bistarelli-foley-osullivan-reasoningaboutsecureinteroperationusingsoftconstraints-2004","role":"author","urls":{"Paper":"https://doi.org/10.1007/0-387-24098-5\\_13"},"metadata":{"authorlinks":{}},"downloads":0},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/53/6380.bib","creationDate":"2014-08-20T10:18:13.830Z","downloads":0,"keywords":[],"search_terms":["reasoning","secure","interoperation","using","soft","constraints","bistarelli","foley","o'sullivan"],"title":"Reasoning about Secure Interoperation Using Soft Constraints","year":2004,"dataSources":["BdSNx7DFqX9RjWbWF","T6HLi2LBH4teAezac","LXyJ7X9n6g55d9qgh","DjivyTGGA5qit7Mf4","NMm7YpyiDxjcnpopo","WXL4P7BKHQy7Qss6y","dYbBqY6vzA8Y5nLL3"]}