Team for Research in
Ubiquitous Secure Technology

Policy Auditing over Incomplete Logs: Theory, Implementation and Applications
Deepak Garg, Limin Jia, Anupam Datta

Citation
Deepak Garg, Limin Jia, Anupam Datta. "Policy Auditing over Incomplete Logs: Theory, Implementation and Applications". ACM Conference on Computer and Communications Security, October, 2011.

Abstract
(No abstract.)

Electronic downloads

Citation formats  
  • HTML
    Deepak Garg, Limin Jia, Anupam Datta. <a
    href="http://www.truststc.org/pubs/816.html"
    >Policy Auditing over Incomplete Logs: Theory,
    Implementation and Applications</a>, ACM Conference on
    Computer and Communications Security, October, 2011.
  • Plain text
    Deepak Garg, Limin Jia, Anupam Datta. "Policy Auditing
    over Incomplete Logs: Theory, Implementation and
    Applications". ACM Conference on Computer and
    Communications Security, October, 2011.
  • BibTeX
    @inproceedings{GargJiaDatta11_PolicyAuditingOverIncompleteLogsTheoryImplementation,
        author = {Deepak Garg and Limin Jia and Anupam Datta},
        title = {Policy Auditing over Incomplete Logs: Theory,
                  Implementation and Applications},
        booktitle = {ACM Conference on Computer and Communications
                  Security},
        month = {October},
        year = {2011},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/816.html}
    }
    

Posted by Anupam Datta on 23 Nov 2011.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.