Send email Copy Email Address
2011-10-17

Policy auditing over incomplete logs: theory, implementation and applications

Conference / Medium

Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11)

Date published

2011-10-17

Date last modified

2019-07-18 12:09:28