Brian Demsky. Cross-application data provenance and policy enforcement. ACM Trans. Inf. Syst. Secur., 14(1):6, 2011. [doi]
@article{Demsky11, title = {Cross-application data provenance and policy enforcement}, author = {Brian Demsky}, year = {2011}, doi = {10.1145/1952982.1952988}, url = {http://doi.acm.org/10.1145/1952982.1952988}, tags = {data-flow}, researchr = {https://researchr.org/publication/Demsky11}, cites = {0}, citedby = {0}, journal = {ACM Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {6}, }