BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
polici (29)
secur (20)
system (19)
use (15)
runtim (11)

Stem enforc$ (all stems)

138 papers:

DACDAC-2015-McLaughlin #behaviour #policy
Blocking unsafe behaviors in control systems through static and dynamic policy enforcement (SM), p. 6.
SIGMODSIGMOD-2015-UpadhyayaBS #automation #policy
Automatic Enforcement of Data Use Policies with DataLawyer (PU, MB, DS), pp. 213–225.
TACASTACAS-2015-BloemKKW #runtime #synthesis
Shield Synthesis: — Runtime Enforcement for Reactive Systems (RB, BK, RK, CW), pp. 533–548.
PLDIPLDI-2015-JohnsonWMC #dependence #graph #security
Exploring and enforcing security guarantees via program dependence graphs (AJ, LW, SM, SC), pp. 291–302.
CHICHI-2015-RooksbyRMC #process
Pass the Ball: Enforced Turn-Taking in Activity Tracking (JR, MR, AM, MC), pp. 2417–2426.
ICEISICEIS-v3-2015-Piedrabuena0R #data transformation
Enforcing Data Protection Regulations within e-Government Master Data Management Systems (FP, LG, RR), pp. 316–321.
POPLPOPL-2015-NgoMMP #black box #policy #runtime #security #source code
Runtime Enforcement of Security Policies on Black Box Reactive Programs (MN, FM, DM, FP), pp. 43–54.
REFSQREFSQ-2015-LiHM #requirements #security #specification
Analyzing and Enforcing Security Mechanisms on Requirements Specifications (TL, JH, JM), pp. 115–131.
SACSAC-2015-CharafeddineEFJ #component #runtime
Runtime enforcement for component-based systems (HC, KEH, YF, MJ), pp. 1789–1796.
SACSAC-2015-LabibPCG #approach #development #learning #product line #reuse
Enforcing reuse and customization in the development of learning objects: a product line approach (AEL, MCP, JHC, AG), pp. 261–263.
ESEC-FSEESEC-FSE-2015-PrauseJ #gamification
Gamification for enforcing coding conventions (CRP, MJ), pp. 649–660.
ICSEICSE-v2-2015-IzquierdoC #open source
Enabling the Definition and Enforcement of Governance Rules in Open Source Systems (JLCI, JC), pp. 505–514.
ASPLOSASPLOS-2015-Sidiroglou-Douskos #automation #branch #integer #using
Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement (SSD, EL, NR, PP, FL, DK, MCR), pp. 473–486.
ECSAECSA-2014-HorcasPF #policy #runtime #security
Runtime Enforcement of Dynamic Security Policies (JMH, MP, LF), pp. 340–356.
CASECASE-2014-GaoLWA #monitoring #petri net #problem #sequence #using
A monitor solution to enforce legal transition firing sequences problems by using Petri nets (XG, ZL, AW, AMAA), pp. 419–424.
DATEDATE-2014-UbolliGBC #linear #megamodelling
Sensitivity-based weighting for passivity enforcement of linear macromodels in power integrity applications (AU, SGT, MB, AC), pp. 1–6.
PLDIPLDI-2014-LuJS #parallel #scripting language
Dynamic enforcement of determinism in a parallel scripting language (LL, WJ, MLS), p. 53.
ICEISICEIS-v2-2014-WeiRT #data access #policy
Enhance OpenStack Access Control via Policy Enforcement Based on XACML (HW, JSR, AT), pp. 283–289.
KEODKEOD-2014-KruppS0 #mobile #ontology #policy #privacy #security
An Ontology for Enforcing Security and Privacy Policies on Mobile Devices (BK, NS, WZ), pp. 288–295.
KRKR-2014-Dyrkolbotn #how #set #using
How to Argue for Anything: Enforcing Arbitrary Sets of Labellings using AFs (SKD).
SACSAC-2014-GaubatzHZS #collaboration #constraints #documentation #editing #realtime #web
Enforcing entailment constraints in offline editing scenarios for real-time collaborative web documents (PG, WH, UZ, MS), pp. 735–742.
SACSAC-2014-LiuTZ #constraints #mining
Mining key and referential constraints enforcement patterns (KL, HBKT, HZ), pp. 850–854.
SACSAC-2014-PinisettyFJM #runtime
Runtime enforcement of regular timed properties (SP, YF, TJ, HM), pp. 1279–1286.
FSEFSE-2014-AutiliRSP #internet #named
CHOReOSynt: enforcing choreography realizability in the future internet (MA, DDR, ADS, AP), pp. 723–726.
FSEFSE-2014-Bell #dependence #detection #testing
Detecting, isolating, and enforcing dependencies among and within test cases (JB), pp. 799–802.
FSEFSE-2014-JoinerRJDG #performance #policy #weaving
Efficient runtime-enforcement techniques for policy weaving (RJ, TWR, SJ, MD, VG), pp. 224–234.
ASPLOSASPLOS-2014-0001KOTRKSHC #named #policy #security
Sapper: a language for hardware-level security policy enforcement (XL, VK, JKO, MT, VRR, RK, TS, BH, FTC), pp. 97–112.
ESOPESOP-2013-BouajjaniDM #robust
Checking and Enforcing Robustness against TSO (AB, ED, RM), pp. 533–553.
FASEFASE-2013-AutiliRSIT #modelling #process #synthesis
A Model-Based Synthesis Process for Choreography Realizability Enforcement (MA, DDR, ADS, PI, MT), pp. 37–52.
FASEFASE-2013-BradfieldS #calculus #game studies #qvt #μ-calculus
Enforcing QVT-R with μ-Calculus and Games (JCB, PS), pp. 282–296.
TACASTACAS-2013-BackesGHMS #android #named #requirements
AppGuard — Enforcing User Requirements on Android Apps (MB, SG, CH, MM, PvSR), pp. 543–548.
CAiSECAiSE-2013-AguileraGO #concept #development #ide #quality
Enforcement of Conceptual Schema Quality Issues in Current Integrated Development Environments (DA, CG, AO), pp. 626–640.
SEKESEKE-2013-PereiraAS #data access #policy #relational #runtime
Runtime Values Driven by Access Control Policies — Statically Enforced at the Level of Relational Business Tiers (ÓMP, RLA, MYS), pp. 1–7.
PPDPPPDP-2013-StewartBN #data flow #data type #dependent type #policy #semistructured data
Dependent types for enforcement of information flow and erasure policies in heterogeneous data structures (GS, AB, AN), pp. 145–156.
SACSAC-2013-JeonKKC #android #security
Enhancing security enforcement on unmodified Android (CJ, WK, BK, YC), pp. 1655–1656.
ISSTAISSTA-2013-LuoR #named #parallel #runtime #source code #thread
EnforceMOP: a runtime property enforcement system for multithreaded programs (QL, GR), pp. 156–166.
QoSAQoSA-2012-DajsurenBSH #architecture #case study #consistency #multi
Automotive ADLS: a study on enforcing consistency through multiple architectural levels (YD, MvdB, AS, RH), pp. 71–80.
CASECASE-2012-HouLZ #on the #petri net
On iterative liveness-enforcement for a class of generalized Petri nets (YH, DL, MZ), pp. 188–193.
LATALATA-2012-Genova #normalisation #set
Forbidding Sets and Normal Forms for Language Forbidding-Enforcing Systems (DG), pp. 289–300.
SEKESEKE-2012-RebeloLMOR #aspect-oriented #contract #source code
Enforcing Contracts for Aspect-oriented programs with Annotations, Pointcuts and Advice (HR, RMFL, AM, CALO, MR), pp. 148–153.
POPLPOPL-2012-YangYS #automation #policy #privacy
A language for automatically enforcing privacy policies (JY, KY, ASL), pp. 85–96.
CAVCAV-2012-FredriksonJJRPSY #abstraction #performance #policy #refinement #runtime #using
Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement (MF, RJ, SJ, TWR, PAP, HS, VY), pp. 548–563.
ICSTICST-2012-ElrakaibyMT #analysis #mutation testing #policy #testing #using
Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
ISSTAISSTA-2012-CoughlinCDS #source code #what
Measuring enforcement windows with symbolic trace interpretation: what well-behaved programs say (DC, BYEC, AD, JGS), pp. 276–286.
DACDAC-2011-PatilBC #architecture #contract #synthesis
Enforcing architectural contracts in high-level synthesis (NAP, AB, DC), pp. 824–829.
DATEDATE-2011-GobbatoCG #megamodelling #parallel #scalability
A parallel Hamiltonian eigensolver for passivity characterization and enforcement of large interconnect macromodels (LG, AC, SGT), pp. 26–31.
VLDBVLDB-2011-AtaullahT #database #modelling #policy
Business Policy Modeling and Enforcement in Databases (AAA, FWT), pp. 921–931.
ESOPESOP-2011-JensenKP #policy
Secure the Clones — Static Enforcement of Policies for Secure Object Copying (TPJ, FK, DP), pp. 317–337.
TACASTACAS-2011-GarbervetskyGN #invariant #using
Enforcing Structural Invariants Using Dynamic Frames (DG, DG, AN), pp. 65–80.
MODELSMoDELS-2011-HamidGJD #design #formal method #modelling
Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches (BH, SG, CJ, ND), pp. 319–333.
MODELSMoDELS-2011-HamidGJD #design #formal method #modelling
Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches (BH, SG, CJ, ND), pp. 319–333.
OOPSLAOOPSLA-2011-WeeratungeZJ #using
Accentuating the positive: atomicity inference and enforcement using correct executions (DW, XZ, SJ), pp. 19–34.
ECSAECSA-2010-KacemKD #adaptation #approach #consistency #formal method #self
A Formal Approach to Enforcing Consistency in Self-adaptive Systems (NHK, AHK, KD), pp. 279–294.
ASEASE-2010-HalleEBB #fault #model checking #navigation #runtime #state machine #web
Eliminating navigation errors in web applications via model checking and runtime enforcement of navigation state machines (SH, TE, CB, TB), pp. 235–244.
CASECASE-2010-HuZLW #assembly #automation #concurrent #flexibility
Deadlock-free control of ratio-enforced automated manufacturing systems with flexible routes and assembly operations (HH, MZ, ZL, NW), pp. 459–464.
CASECASE-2010-NazeemR #approach #design #resource management
A practical approach to the design of maximally permissive liveness-enforcing supervisors for complex resource allocation systems (AN, SR), pp. 451–458.
DATEDATE-2010-YeSP #assessment
Extended Hamiltonian Pencil for passivity assessment and enforcement for S-parameter systems (ZY, LMS, JRP), pp. 1148–1152.
DocEngDocEng-2010-SimskeB #automation #named #policy
APEX: automated policy enforcement eXchange (SJS, HB), pp. 139–142.
ESOPESOP-2010-SwamyCC #data flow #policy
Enforcing Stateful Authorization and Information Flow Policies in Fine (NS, JC, RC), pp. 529–549.
ICSMEICSM-2010-CeccatoT #consistency #legacy #migration #static analysis #thread
Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system (MC, PT), pp. 1–9.
PLDIPLDI-2010-ChenCS #compilation #security #verification
Type-preserving compilation of end-to-end verification of security enforcement (JC, RC, NS), pp. 412–423.
SEFMSEFM-2010-BartolettiZ
Static Enforcement of Service Deadlines (MB, RZ), pp. 320–324.
CHICHI-2010-TullioHWZGT #experience #video
Experience, adjustment, and engagement: the role of video in law enforcement (JT, EMH, DW, HZ, CVSG, AT), pp. 1505–1514.
SEKESEKE-2010-Nehmer #approach #consistency #exception
A Log-Assisted Approach Enforcing Consistency in the Presence of Exceptions (NN), pp. 757–764.
GPCEGPCE-J-2007-FradetH10 #aspect-oriented
Aspects of availability: Enforcing timed properties to prevent denial of service (PF, SHTH), pp. 516–542.
ICSEICSE-2010-GabelS #online
Online inference and enforcement of temporal properties (MG, ZS), pp. 15–24.
ICSEICSE-2010-Lewis #generative #invariant #named #realtime
Zenet: generating and enforcing real-time temporal invariants (CL), pp. 329–330.
ICSEICSE-2010-Mattsson #architecture #automation #design
Automatic enforcement of architectural design rules (AM), pp. 369–372.
ISMMISMM-2010-NagarakatteZMZ #c #compilation #named #safety
CETS: compiler enforced temporal safety for C (SN, JZ, MMKM, SZ), pp. 31–40.
OSDIOSDI-2010-AviramWHF #parallel #performance
Efficient System-Enforced Deterministic Parallelism (AA, SCW, SH, BF), pp. 193–206.
SIGMODSIGMOD-2009-CorcoranSH #security #web
Cross-tier, label-based security enforcement for web applications (BJC, NS, MWH), pp. 269–282.
SEKESEKE-2009-KulkarniCZ #framework #monitoring #named #online #policy
iPass: An Integrated Framework for Educating, Monitoring and Enforcing Password Policies for Online Services (DK, DC, FZ), pp. 548–551.
SACSAC-2009-FalconeFM #classification #monitoring
Enforcement monitoring wrt. the safety-progress classification of properties (YF, JCF, LM), pp. 593–600.
CAVCAV-2009-HalleV #contract #interface #web
Browser-Based Enforcement of Interface Contracts in Web Applications with BeepBeep (SH, RV), pp. 648–653.
WICSAWICSA-2008-Aldrich #architecture #using
Using Types to Enforce Architectural Structure (JA), pp. 211–220.
ASEASE-2008-BrichauKM #source code #using
Enforcing Structural Regularities in Source Code using IntensiVE (JB, AK, KM), pp. 471–472.
ESOPESOP-2008-HuntS #semantics
Just Forget It — The Semantics and Enforcement of Information Erasure (SH, DS), pp. 239–253.
EDOCEDOC-2008-Fabry #database #requirements
Database Vault: Enforcing Separation of Duties to Meet Regulatory Compliance Requirements (HWF).
ICPRICPR-2008-GrumB #3d #consistency #image #modelling #multi
Enforcing image consistency in multiple 3-D object modelling (MG, AGB), pp. 1–4.
OOPSLAOOPSLA-2008-GopinathanR #analysis #protocol #runtime
Enforcing object protocols by combining static and runtime analysis (MG, SKR), pp. 245–260.
OSDIOSDI-2008-ZeldovichKDK #hardware #memory management #policy #security #using
Hardware Enforcement of Application Security Policies Using Tagged Memory (NZ, HK, MD, CK), pp. 225–240.
CBSECBSE-2007-Dahlgren #component #contract #interface
Performance-Driven Interface Contract Enforcement for Scientific Components (TD), pp. 157–172.
SIGMODSIGMOD-2007-QiaoSFPCBK #database #framework #policy
A framework for enforcing application policies in database systems (LQ, BS, GF, AP, BC, TB, WK), pp. 981–992.
FASEFASE-2007-TibermacineHK #architecture #component #constraints #deployment #distributed
Enforcing Architecture and Deployment Constraints of Distributed Component-Based Software (CT, DH, RK), pp. 140–154.
ICPCICPC-2007-ShearerC #constraints #source code
Enforcing Constraints Between Documentary Comments and Source Code (CDS, MLC), pp. 271–280.
PASTEPASTE-2007-ChinMMM #programming #validation
Enforcing and validating user-defined programming disciplines (BC, DM, SM, TDM), pp. 85–86.
PLDIPLDI-2007-ShpeismanMABGHMS #order
Enforcing isolation and ordering in STM (TS, VM, ARAT, SB, DG, RLH, KFM, BS), pp. 78–88.
AGTIVEAGTIVE-2007-AmelunxenLSS #graph transformation #guidelines #modelling
Checking and Enforcement of Modeling Guidelines with Graph Transformations (CA, EL, AS, IS), pp. 313–328.
SACSAC-2007-OrlovskyR #distributed #policy #security
Decentralized enforcement of security policies for distributed computational systems (AO, DR), pp. 241–248.
PLDIPLDI-2006-DhurjatiKA #alias #analysis #named
SAFECode: enforcing alias analysis for weakly typed languages (DD, SK, VSA), pp. 144–157.
FMFM-2006-ArthoBH #injection #named #performance
Enforcer — Efficient Failure Injection (CA, AB, SH), pp. 412–427.
ICEISICEIS-SAIC-2006-SattanathanNMM #policy #web #web service
Context-Driven Policy Enforcement and Reconciliation for Web Services (SS, NCN, ZM, GKM), pp. 93–99.
SACSAC-2006-LucraftEA #internet
Enforcing path uniqueness in internet routing (DL, AE, FA), pp. 399–403.
SACSAC-2006-WelchL #policy #security
Policy-driven reflective enforcement of security policies (IW, FL), pp. 1580–1584.
SACSAC-2006-YoussefAA #mobile #privacy #semantics
Semantically enhanced enforcement of mobile consumer’s privacy preferences (MY, NRA, VA), pp. 1172–1176.
OSDIOSDI-2006-CastroCH #data flow
Securing Software by Enforcing Data-flow Integrity (MC, MC, TLH), pp. 147–160.
ISSTAISSTA-2006-DemskyEGMPR #consistency #data type #specification
Inference and enforcement of data structure consistency specifications (BD, MDE, PJG, SM, JHP, MCR), pp. 233–244.
ESOPESOP-2005-ChanderEILN #bound #dynamic analysis #verification
Enforcing Resource Bounds via Static Verification of Dynamic Checks (AC, DE, NI, PL, GCN), pp. 311–325.
MODELSMoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming #using
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
MODELSMoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming #using
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
SACSAC-2005-YangEY #database #security #semistructured data #specification
Mediation security specification and enforcement for heterogeneous databases (LY, RKE, HY), pp. 354–358.
ICSEICSE-2005-SherrellS #education #process #question
Will earlier projects plus a disciplined process enforce SE principles throughout the CS curriculum? (LBS, SGS), pp. 619–620.
HPDCHPDC-2005-KarmonLS #distributed #named #performance #protocol
GWiQ-P: an efficient decentralized grid-wide quota enforcement protocol (KK, LL, AS), pp. 222–232.
SOSPSOSP-2005-SeshadriLSPDK #execution #legacy #named #verification
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems (AS, ML, ES, AP, LvD, PKK), pp. 1–16.
ICSMEICSM-2004-JanssensMHV #approach #composition #configuration management
A Modular Approach Enforcing Safe Reconfiguration of Producer-Consumer Applications (NJ, SM, TH, PV), pp. 274–283.
AdaSIGAda-2004-ChapmanH #analysis #data flow #modelling #safety #security
Enforcing security and safety models with an information flow analysis tool (RC, AH), pp. 39–46.
ICEISICEIS-v4-2004-CostaOS #identification
E-Services in Mission-Critical Organizations: Identification Enforcement (CC, JLO, AS), pp. 389–396.
GPCEGPCE-2004-CepaM #dependence #dot-net
Declaring and Enforcing Dependencies Between .NET Custom Attributes (VC, MM), pp. 283–297.
SACSAC-2004-StefanoSPT #communication #framework
Enforcing agent communication laws by means of a reflective framework (ADS, CS, GP, ET), pp. 462–468.
ESOPESOP-2003-AltisenCMR #using
Using Controller-Synthesis Techniques to Build Property-Enforcing Layers (KA, AC, FM, ÉR), pp. 174–188.
FoSSaCSFoSSaCS-2003-BlanchetP #encryption #protocol #termination #verification
Verification of Cryptographic Protocols: Tagging Enforces Termination (BB, AP), pp. 136–152.
ECOOPECOOP-2003-LamR #analysis #automation #design #type system
A Type System and Analysis for the Automatic Extraction and Enforcement of Design Information (PL, MCR), pp. 275–302.
ESEC-FSEESEC-FSE-2003-LeeA #component
Policy-enforced linking of untrusted components (EL, AWA), pp. 371–374.
CBSECBSE-2003-VecellioT #framework #policy #predict
Infrastructure Support for Predictable Policy Enforcement (GV, WT), p. 13.
EDOCEDOC-2002-MilosevicJDP #contract
Discretionary Enforcement of Electronic Contracts (ZM, AJ, TD, MAP), pp. 39–50.
ASEASE-2001-AndradeFW #automation #configuration management #policy
Enforcing Business Policies Through Automated Reconfiguration (LFA, JLF, MW), p. 426–?.
ESOPESOP-2001-Thiemann #safety #using
Enforcing Safety Properties Using Type Specialization (PT), pp. 62–76.
PLDIPLDI-2001-DeLineF #bytecode #low level #protocol
Enforcing High-Level Protocols in Low-Level Software (RD, MF), pp. 59–69.
ASEASE-2000-Schewe #automation #consistency
Controlled Automation of Consistency Enforcement (KDS), pp. 265–268.
SASSAS-2000-Jackson #constraints #design #logic
Enforcing Design Constraints with Object Logic (DJ), pp. 1–21.
ICFPICFP-2000-SkalkaS #security
Static enforcement of security with types (CS, SFS), pp. 34–45.
POPLPOPL-2000-ColcombetF #program transformation
Enforcing Trace Properties by Program Transformation (TC, PF), pp. 54–66.
HTHT-1998-FurtadoM #flexibility #hypermedia #type system
Enforcing Strong Object Typing in Flexible Hypermedia (PF, HM), pp. 171–179.
EDOCEDOC-1998-SyrbeP #analysis
An enterprise-level analysis of customer-provider relationships and implications for QoS enforcement (JHS, TP), pp. 208–217.
SIGMODSIGMOD-1997-JajodiaSSB #data access #framework #multi #policy
A Unified Framework for Enforcing Multiple Access Control Policies (SJ, PS, VSS, EB), pp. 474–485.
STOCSTOC-1996-DworkLN #self
Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version) (CD, JBL, MN), pp. 489–498.
ICLPICLP-1995-CodognetR #constraints #programming
NMCC Programming: Constraint Enforcement and Retracting in CC Programming (PC, FR), pp. 417–431.
VLDBVLDB-1993-AttieSSR #dependence #specification
Specifying and Enforcing Intertask Dependencies (PCA, MPS, APS, MR), pp. 134–145.
ISSTAISSTA-1993-Goradia #effectiveness #impact analysis
Dynamic Impact Analysis: A Cost-Effective Technique to Enforce Error-Propagation (TG), pp. 171–181.
ICMLML-1990-Hammond #learning #process
Learning and Enforcement: Stabilizing Environments to Facilitate Activity (KJH), pp. 204–210.
VLDBVLDB-1988-CasanovaTF #dependence
Enforcing Inclusion Dependencies and Referencial Integrity (MAC, LT, ALF), pp. 38–49.
CSLCSL-1988-SudkampK #constraints #semantics
Enforcement of Integrity Constraints in a Semantic Data Model (NS, PK), pp. 313–328.
SIGMODSIGMOD-1984-ShepherdK #database #knowledge base #named #semantics #specification
PRISM: A Knowledge Based System for Semantic Integrity Specification and Enforcement in Database Systems (AS, LK), pp. 307–315.
VLDBVLDB-1984-EhrichLG #constraints #database #semantics #specification
Specification, Semantics, and Enforcement of Dynamic Database Constraints (HDE, UWL, MG), pp. 301–308.
VLDBVLDB-1984-Morgenstern #automation #constraints #declarative #equation
Constraint Equations: Declarative Expression of Constraints With Automatic Enforcement (MM), pp. 291–300.
POPLPOPL-1983-Strom #security
Mechanisms for Compile-Time Enforcement of Security (RES), pp. 276–284.
ICALPICALP-1982-EhrenfeuchtHR #context-free grammar
Conditions Enforcing Regularity of Context-Free Languages (AE, DH, GR), pp. 187–191.
SOSPSOSP-1975-JonesL #policy #security
The Enforcement of Security Policies for Computation (AKJ, RJL), pp. 197–206.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.