|
Volumn , Issue , 2009, Pages 214-216
|
Enforcing IRM security policies: Two case studies
|
Author keywords
[No Author keywords available]
|
Indexed keywords
APPLICATION SECURITY;
APPLICATION-SPECIFIC;
DECLARATIVE LANGUAGES;
JAVA APPLICATIONS;
REFERENCE MONITORS;
SECURITY POLICY;
SOURCE CODES;
INTERSYMBOL INTERFERENCE;
LINGUISTICS;
MARKUP LANGUAGES;
RESEARCH;
SECURITY SYSTEMS;
XML;
JAVA PROGRAMMING LANGUAGE;
|
EID: 70350077658
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ISI.2009.5137306 Document Type: Conference Paper |
Times cited : (12)
|
References (15)
|