{"_id":"Xuw7JxfpajDdS3TDR","bibbaseid":"fleming-peterson-kline-reiher-datatetherspreventinginformationleakagebyenforcingenvironmentaldataaccesspolicies-2012","author_short":["Fleming, C.","Peterson, P.","Kline, E.","Reiher, P."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["C."],"propositions":[],"lastnames":["Fleming"],"suffixes":[]},{"firstnames":["P."],"propositions":[],"lastnames":["Peterson"],"suffixes":[]},{"firstnames":["E."],"propositions":[],"lastnames":["Kline"],"suffixes":[]},{"firstnames":["P."],"propositions":[],"lastnames":["Reiher"],"suffixes":[]}],"booktitle":"2012 IEEE International Conference on Communications (ICC)","title":"Data Tethers: Preventing information leakage by enforcing environmental data access policies","year":"2012","volume":"","number":"","pages":"835-840","keywords":"computer network security;information retrieval;mobile computing;data tethers;information leakage prevention;environmental data access policies;data protection;mobile computing;security requirements;fine-grain data flow tracking;dynamic recompilation;legacy applications;real user applications;word processors;spreadsheets;Monitoring;Instruments;Benchmark testing;Cryptography;Operating systems;Servers","doi":"10.1109/ICC.2012.6364368","issn":"1550-3607","month":"June","bibtex":"@inproceedings{fleming-12,\nauthor={C. {Fleming} and P. {Peterson} and E. {Kline} and P. {Reiher}},\nbooktitle={2012 IEEE International Conference on Communications (ICC)},\ntitle={{Data Tethers: Preventing information leakage by enforcing environmental data access policies}},\nyear={2012},\nvolume={},\nnumber={},\npages={835-840},\nkeywords={computer network security;information retrieval;mobile computing;data tethers;information leakage prevention;environmental data access policies;data protection;mobile computing;security requirements;fine-grain data flow tracking;dynamic recompilation;legacy applications;real user applications;word processors;spreadsheets;Monitoring;Instruments;Benchmark testing;Cryptography;Operating systems;Servers},\ndoi={10.1109/ICC.2012.6364368},\nISSN={1550-3607},\nmonth={June},}\n\n\n","author_short":["Fleming, C.","Peterson, P.","Kline, E.","Reiher, P."],"bibbaseid":"fleming-peterson-kline-reiher-datatetherspreventinginformationleakagebyenforcingenvironmentaldataaccesspolicies-2012","role":"author","urls":{},"keyword":["computer network security;information retrieval;mobile computing;data tethers;information leakage prevention;environmental data access policies;data protection;mobile computing;security requirements;fine-grain data flow tracking;dynamic recompilation;legacy applications;real user applications;word processors;spreadsheets;Monitoring;Instruments;Benchmark testing;Cryptography;Operating systems;Servers"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/f/9pcSdPhraY2XWhiXP/kline-2023.bib","dataSources":["mP2t5BJf9HbSGMTKv","zRmQ3TbGvXP9DZfZL"],"keywords":["computer network security;information retrieval;mobile computing;data tethers;information leakage prevention;environmental data access policies;data protection;mobile computing;security requirements;fine-grain data flow tracking;dynamic recompilation;legacy applications;real user applications;word processors;spreadsheets;monitoring;instruments;benchmark testing;cryptography;operating systems;servers"],"search_terms":["data","tethers","preventing","information","leakage","enforcing","environmental","data","access","policies","fleming","peterson","kline","reiher"],"title":"Data Tethers: Preventing information leakage by enforcing environmental data access policies","year":2012}