Cross-application data provenance and policy enforcement

Brian Demsky. Cross-application data provenance and policy enforcement. ACM Trans. Inf. Syst. Secur., 14(1):6, 2011. [doi]

@article{Demsky11,
  title = {Cross-application data provenance and policy enforcement},
  author = {Brian Demsky},
  year = {2011},
  doi = {10.1145/1952982.1952988},
  url = {http://doi.acm.org/10.1145/1952982.1952988},
  tags = {data-flow},
  researchr = {https://researchr.org/publication/Demsky11},
  cites = {0},
  citedby = {0},
  journal = {ACM Trans. Inf. Syst. Secur.},
  volume = {14},
  number = {1},
  pages = {6},
}