Enhancing Security Using Legality Assertions. Wang, L., Cordy, J. R., & Dean, T. R. In WCRE, pages 35-44, 2005. IEEE Computer Society.
Link
Paper bibtex @inproceedings{conf/wcre/WangCD05,
author = {Wang, Lei and Cordy, James R. and Dean, Thomas R.},
booktitle = {WCRE},
crossref = {conf/wcre/2005},
ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2005.36},
interhash = {9040dad84489a2ae047ea64b3de0369e},
intrahash = {45da0efbd29f50886ef4ab79543c6295},
isbn = {0-7695-2474-5},
pages = {35-44},
publisher = {IEEE Computer Society},
title = {Enhancing Security Using Legality Assertions.},
url = {http://dblp.uni-trier.de/db/conf/wcre/wcre2005.html#WangCD05},
year = 2005
}
Downloads: 0
{"_id":"WRPkbaWeWwHrvXNAQ","bibbaseid":"wang-cordy-dean-enhancingsecurityusinglegalityassertions-2005","downloads":0,"creationDate":"2017-10-15T15:21:08.733Z","title":"Enhancing Security Using Legality Assertions.","author_short":["Wang, L.","Cordy, J. R.","Dean, T. R."],"year":2005,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/james cordy?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"propositions":[],"lastnames":["Wang"],"firstnames":["Lei"],"suffixes":[]},{"propositions":[],"lastnames":["Cordy"],"firstnames":["James","R."],"suffixes":[]},{"propositions":[],"lastnames":["Dean"],"firstnames":["Thomas","R."],"suffixes":[]}],"booktitle":"WCRE","crossref":"conf/wcre/2005","ee":"http://doi.ieeecomputersociety.org/10.1109/WCRE.2005.36","interhash":"9040dad84489a2ae047ea64b3de0369e","intrahash":"45da0efbd29f50886ef4ab79543c6295","isbn":"0-7695-2474-5","pages":"35-44","publisher":"IEEE Computer Society","title":"Enhancing Security Using Legality Assertions.","url":"http://dblp.uni-trier.de/db/conf/wcre/wcre2005.html#WangCD05","year":"2005","bibtex":"@inproceedings{conf/wcre/WangCD05,\n author = {Wang, Lei and Cordy, James R. and Dean, Thomas R.},\n booktitle = {WCRE},\n crossref = {conf/wcre/2005},\n ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2005.36},\n interhash = {9040dad84489a2ae047ea64b3de0369e},\n intrahash = {45da0efbd29f50886ef4ab79543c6295},\n isbn = {0-7695-2474-5},\n pages = {35-44},\n publisher = {IEEE Computer Society},\n title = {Enhancing Security Using Legality Assertions.},\n url = {http://dblp.uni-trier.de/db/conf/wcre/wcre2005.html#WangCD05},\n year = 2005\n}\n\n","author_short":["Wang, L.","Cordy, J. R.","Dean, T. R."],"key":"conf/wcre/WangCD05","id":"conf/wcre/WangCD05","bibbaseid":"wang-cordy-dean-enhancingsecurityusinglegalityassertions-2005","role":"author","urls":{"Link":"http://doi.ieeecomputersociety.org/10.1109/WCRE.2005.36","Paper":"http://dblp.uni-trier.de/db/conf/wcre/wcre2005.html#WangCD05"},"downloads":0},"search_terms":["enhancing","security","using","legality","assertions","wang","cordy","dean"],"keywords":[],"authorIDs":[],"dataSources":["JHozo5KzkRHrh6ajp"]}