Evaluating the Use of Security Tags in Security Policy Enforcement Mechanisms

Jim Alves-Foss, Jia Song, A. Scott Amack, Lawrence Kerr, Stuart Steiner. Evaluating the Use of Security Tags in Security Policy Enforcement Mechanisms. In Tung X. Bui, Ralph H. Sprague Jr., editors, 48th Hawaii International Conference on System Sciences, HICSS 2015, Kauai, Hawaii, USA, January 5-8, 2015. pages 5201-5210, IEEE, 2015. [doi]

@inproceedings{Alves-FossSAKS15,
  title = {Evaluating the Use of Security Tags in Security Policy Enforcement Mechanisms},
  author = {Jim Alves-Foss and Jia Song and A. Scott Amack and Lawrence Kerr and Stuart Steiner},
  year = {2015},
  doi = {10.1109/HICSS.2015.614},
  url = {http://dx.doi.org/10.1109/HICSS.2015.614},
  researchr = {https://researchr.org/publication/Alves-FossSAKS15},
  cites = {0},
  citedby = {0},
  pages = {5201-5210},
  booktitle = {48th Hawaii International Conference on System Sciences, HICSS 2015, Kauai, Hawaii, USA, January 5-8, 2015},
  editor = {Tung X. Bui and Ralph H. Sprague Jr.},
  publisher = {IEEE},
  isbn = {978-1-4799-7367-5},
}