Conference Paper
A. Pretschner, Lovat, E., and Buechler, M.,
“Representation-Independent Data Usage Control”, in
6th International Workshop on Data Privacy Management (DPM 2011), 2011.
M. Kovács and Seidl, H.,
“Runtime Enforcement of Information Flow Security in Tree Manipulating Processes”, in
Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.