Cited By
View all- Mandal DMazumdar C(2018)Automating Information Security Policy Compliance Checking2018 Fifth International Conference on Emerging Applications of Information Technology (EAIT)10.1109/EAIT.2018.8470420(1-4)Online publication date: Jan-2018
- Collazos NHanvey SCalderón C(2015)On the Use of Formal Methods to Enforce Privacy-Aware Social NetworkingStandards and Standardization10.4018/978-1-4666-8111-8.ch016(307-332)Online publication date: 2015
- Mace JMorisset CMoorsel A(2015)Resiliency Variance in Workflows with ChoiceProceedings of the 7th International Workshop on Software Engineering for Resilient Systems - Volume 927410.1007/978-3-319-23129-7_10(128-143)Online publication date: 7-Sep-2015
- Show More Cited By