End-To-End Policy-Agnostic Security for Database-Backed Applications. Yang, J., Hance, T., Austin, T. H., Solar-Lezama, A., Flanagan, C., & Chong, S. CoRR, 2015. Paper bibtex @article{DBLP:journals/corr/YangHASFC15,
author = {Jean Yang and
Travis Hance and
Thomas H. Austin and
Armando Solar{-}Lezama and
Cormac Flanagan and
Stephen Chong},
title = {End-To-End Policy-Agnostic Security for Database-Backed Applications},
journal = {CoRR},
volume = {abs/1507.03513},
year = {2015},
url = {http://arxiv.org/abs/1507.03513},
eprinttype = {arXiv},
eprint = {1507.03513},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/YangHASFC15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"wNvmQeQNAzyz9Kav7","bibbaseid":"yang-hance-austin-solarlezama-flanagan-chong-endtoendpolicyagnosticsecurityfordatabasebackedapplications-2015","author_short":["Yang, J.","Hance, T.","Austin, T. H.","Solar-Lezama, A.","Flanagan, C.","Chong, S."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Jean"],"propositions":[],"lastnames":["Yang"],"suffixes":[]},{"firstnames":["Travis"],"propositions":[],"lastnames":["Hance"],"suffixes":[]},{"firstnames":["Thomas","H."],"propositions":[],"lastnames":["Austin"],"suffixes":[]},{"firstnames":["Armando"],"propositions":[],"lastnames":["Solar-Lezama"],"suffixes":[]},{"firstnames":["Cormac"],"propositions":[],"lastnames":["Flanagan"],"suffixes":[]},{"firstnames":["Stephen"],"propositions":[],"lastnames":["Chong"],"suffixes":[]}],"title":"End-To-End Policy-Agnostic Security for Database-Backed Applications","journal":"CoRR","volume":"abs/1507.03513","year":"2015","url":"http://arxiv.org/abs/1507.03513","eprinttype":"arXiv","eprint":"1507.03513","timestamp":"Mon, 13 Aug 2018 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/corr/YangHASFC15.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/corr/YangHASFC15,\n author = {Jean Yang and\n Travis Hance and\n Thomas H. Austin and\n Armando Solar{-}Lezama and\n Cormac Flanagan and\n Stephen Chong},\n title = {End-To-End Policy-Agnostic Security for Database-Backed Applications},\n journal = {CoRR},\n volume = {abs/1507.03513},\n year = {2015},\n url = {http://arxiv.org/abs/1507.03513},\n eprinttype = {arXiv},\n eprint = {1507.03513},\n timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/corr/YangHASFC15.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Yang, J.","Hance, T.","Austin, T. H.","Solar-Lezama, A.","Flanagan, C.","Chong, S."],"key":"DBLP:journals/corr/YangHASFC15","id":"DBLP:journals/corr/YangHASFC15","bibbaseid":"yang-hance-austin-solarlezama-flanagan-chong-endtoendpolicyagnosticsecurityfordatabasebackedapplications-2015","role":"author","urls":{"Paper":"http://arxiv.org/abs/1507.03513"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"http://dblp.org/pers/tb2/s/Solar=Lezama:Armando","dataSources":["rGuy4xgsrB7zfgooW"],"keywords":[],"search_terms":["end","end","policy","agnostic","security","database","backed","applications","yang","hance","austin","solar-lezama","flanagan","chong"],"title":"End-To-End Policy-Agnostic Security for Database-Backed Applications","year":2015}