TreeDroid: a tree automaton based approach to enforcing data processing policies. Dam, M., Guernic, G. L., & Lundblad, A. In Yu, T., Danezis, G., & Gligor, V. D., editors, ACM Conference on Computer and Communications Security, pages 894-905, 2012. ACM.
Link
Paper bibtex @inproceedings{conf/ccs/DamGL12,
added-at = {2012-10-16T00:00:00.000+0200},
author = {Dam, Mads and Guernic, Gurvan Le and Lundblad, Andreas},
biburl = {http://www.bibsonomy.org/bibtex/2fd39fe8a855b78f8b1fa38d10507bf00/dblp},
booktitle = {ACM Conference on Computer and Communications Security},
crossref = {conf/ccs/2012},
editor = {Yu, Ting and Danezis, George and Gligor, Virgil D.},
ee = {http://doi.acm.org/10.1145/2382196.2382290},
interhash = {591f963ad537785e089cea70159f953b},
intrahash = {fd39fe8a855b78f8b1fa38d10507bf00},
isbn = {978-1-4503-1651-4},
keywords = {dblp},
pages = {894-905},
publisher = {ACM},
timestamp = {2012-10-17T11:35:34.000+0200},
title = {TreeDroid: a tree automaton based approach to enforcing data processing policies.},
url = {http://dblp.uni-trier.de/db/conf/ccs/ccs2012.html#DamGL12},
year = 2012
}
Downloads: 0
{"_id":"wnziTiCgwYSva3zTf","bibbaseid":"dam-guernic-lundblad-treedroidatreeautomatonbasedapproachtoenforcingdataprocessingpolicies-2012","downloads":0,"creationDate":"2016-09-14T11:41:42.976Z","title":"TreeDroid: a tree automaton based approach to enforcing data processing policies.","author_short":["Dam, M.","Guernic, G. L.","Lundblad, A."],"year":2012,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/guernic?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2012-10-16T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Dam"],"firstnames":["Mads"],"suffixes":[]},{"propositions":[],"lastnames":["Guernic"],"firstnames":["Gurvan","Le"],"suffixes":[]},{"propositions":[],"lastnames":["Lundblad"],"firstnames":["Andreas"],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/2fd39fe8a855b78f8b1fa38d10507bf00/dblp","booktitle":"ACM Conference on Computer and Communications Security","crossref":"conf/ccs/2012","editor":[{"propositions":[],"lastnames":["Yu"],"firstnames":["Ting"],"suffixes":[]},{"propositions":[],"lastnames":["Danezis"],"firstnames":["George"],"suffixes":[]},{"propositions":[],"lastnames":["Gligor"],"firstnames":["Virgil","D."],"suffixes":[]}],"ee":"http://doi.acm.org/10.1145/2382196.2382290","interhash":"591f963ad537785e089cea70159f953b","intrahash":"fd39fe8a855b78f8b1fa38d10507bf00","isbn":"978-1-4503-1651-4","keywords":"dblp","pages":"894-905","publisher":"ACM","timestamp":"2012-10-17T11:35:34.000+0200","title":"TreeDroid: a tree automaton based approach to enforcing data processing policies.","url":"http://dblp.uni-trier.de/db/conf/ccs/ccs2012.html#DamGL12","year":"2012","bibtex":"@inproceedings{conf/ccs/DamGL12,\n added-at = {2012-10-16T00:00:00.000+0200},\n author = {Dam, Mads and Guernic, Gurvan Le and Lundblad, Andreas},\n biburl = {http://www.bibsonomy.org/bibtex/2fd39fe8a855b78f8b1fa38d10507bf00/dblp},\n booktitle = {ACM Conference on Computer and Communications Security},\n crossref = {conf/ccs/2012},\n editor = {Yu, Ting and Danezis, George and Gligor, Virgil D.},\n ee = {http://doi.acm.org/10.1145/2382196.2382290},\n interhash = {591f963ad537785e089cea70159f953b},\n intrahash = {fd39fe8a855b78f8b1fa38d10507bf00},\n isbn = {978-1-4503-1651-4},\n keywords = {dblp},\n pages = {894-905},\n publisher = {ACM},\n timestamp = {2012-10-17T11:35:34.000+0200},\n title = {TreeDroid: a tree automaton based approach to enforcing data processing policies.},\n url = {http://dblp.uni-trier.de/db/conf/ccs/ccs2012.html#DamGL12},\n year = 2012\n}\n\n","author_short":["Dam, M.","Guernic, G. L.","Lundblad, A."],"editor_short":["Yu, T.","Danezis, G.","Gligor, V. D."],"key":"conf/ccs/DamGL12","id":"conf/ccs/DamGL12","bibbaseid":"dam-guernic-lundblad-treedroidatreeautomatonbasedapproachtoenforcingdataprocessingpolicies-2012","role":"author","urls":{"Link":"http://doi.acm.org/10.1145/2382196.2382290","Paper":"http://dblp.uni-trier.de/db/conf/ccs/ccs2012.html#DamGL12"},"keyword":["dblp"],"downloads":0},"search_terms":["treedroid","tree","automaton","based","approach","enforcing","data","processing","policies","dam","guernic","lundblad"],"keywords":["dblp"],"authorIDs":[],"dataSources":["Q4AxEyCiwhuEHt7Ey"]}