Cited By
View all- Zhou JAlves-Foss J(2018)Security policy refinement and enforcement for the design of multi-level secure systemsJournal of Computer Security10.5555/1370687.137068816:2(107-131)Online publication date: 24-Dec-2018
- Chong SMeyden R(2015)Using Architecture to Reason about Information SecurityACM Transactions on Information and System Security10.1145/282994918:2(1-30)Online publication date: 9-Dec-2015
- Hanspach MKeller J(2013)In Guards We TrustProceedings of the 2013 International Conference on Social Computing10.1109/SocialCom.2013.87(578-585)Online publication date: 8-Sep-2013