Generation of Transmission Control Rules Compliant with Existing Access Control Policies View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2015

AUTHORS

Yoann Bertrand , Mireille Blay-Fornarino , Karima Boudaoud , Michel Riveill

ABSTRACT

Access Control (AC) is a well known mechanism that allows access restriction to resources. Nevertheless, it does not provide notification when a resource is retransmitted to an unauthorized third party. To overcome this issue, one can use mechanisms such as Data Loss/Leak Prevention (DLP) or Transmission Control (TC). These mechanisms are based on policies that are defined by security experts. Unfortunately, these policies can contradict existing AC rules, leading to security leakage (i.e. a legitimate user is allowed to send a resource to someone who has no access rights in the AC). In this article, we aim at creating TC policies that are compliant with existing AC policies. To do so, we use a mapping mechanism that generates TC rules directly from existing AC policies. Thanks to the generated rules, our solution can make inferences to improve existing AC and enhance security knowledge between infrastructures. More... »

PAGES

438-455

References to SciGraph publications

  • 2014. Decentralized Distributed Data Usage Control in CRYPTOLOGY AND NETWORK SECURITY
  • 2010. Enforcing UCON Policies on the Enterprise Service Bus in ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS, OTM 2010
  • 2012. A Survey of Data Leakage Detection and Prevention Solutions in NONE
  • 2007. A Policy Language for Distributed Usage Control in COMPUTER SECURITY – ESORICS 2007
  • 2012. Logical Approaches to Authorization Policies in LOGIC PROGRAMS, NORMS AND ACTION
  • 2007. An Integrated Model for Access Control and Information Flow Requirements in ADVANCES IN COMPUTER SCIENCE – ASIAN 2007. COMPUTER AND NETWORK SECURITY
  • Book

    TITLE

    Security and Privacy in Communication Networks

    ISBN

    978-3-319-28864-2
    978-3-319-28865-9

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-28865-9_24

    DOI

    http://dx.doi.org/10.1007/978-3-319-28865-9_24

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1033171113


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Law", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/18", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Law and Legal Studies", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "name": [
                "University of Nice Sophia Antipolis, CNRS, I3S, UMR 7271"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Bertrand", 
            "givenName": "Yoann", 
            "id": "sg:person.011565365437.36", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011565365437.36"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "University of Nice Sophia Antipolis, CNRS, I3S, UMR 7271"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Blay-Fornarino", 
            "givenName": "Mireille", 
            "id": "sg:person.07767513703.93", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07767513703.93"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "University of Nice Sophia Antipolis, CNRS, I3S, UMR 7271"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Boudaoud", 
            "givenName": "Karima", 
            "id": "sg:person.011747351366.02", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011747351366.02"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "University of Nice Sophia Antipolis, CNRS, I3S, UMR 7271"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Riveill", 
            "givenName": "Michel", 
            "id": "sg:person.015344032460.53", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015344032460.53"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-540-76929-3_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004447763", 
              "https://doi.org/10.1007/978-3-540-76929-3_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-76929-3_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004447763", 
              "https://doi.org/10.1007/978-3-540-76929-3_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://app.dimensions.ai/details/publication/pub.1007197624", 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-1-4614-2053-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007197624", 
              "https://doi.org/10.1007/978-1-4614-2053-8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-1-4614-2053-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007197624", 
              "https://doi.org/10.1007/978-1-4614-2053-8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/984334.984339", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010383533"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.entcs.2007.01.064", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011330204"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-74835-9_35", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016144601", 
              "https://doi.org/10.1007/978-3-540-74835-9_35"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-74835-9_35", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016144601", 
              "https://doi.org/10.1007/978-3-540-74835-9_35"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-29414-3_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023485977", 
              "https://doi.org/10.1007/978-3-642-29414-3_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.comnet.2011.09.014", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029398977"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/361011.361070", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041075202"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-16949-6_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042689376", 
              "https://doi.org/10.1007/978-3-642-16949-6_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-16949-6_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042689376", 
              "https://doi.org/10.1007/978-3-642-16949-6_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/2523514.2523549", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045332049"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-12280-9_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052610061", 
              "https://doi.org/10.1007/978-3-319-12280-9_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/2.485845", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061105558"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/proc.1975.9939", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061443155"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/ntms.2011.5721143", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094366030"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/ares.2009.152", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095343168"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2015", 
        "datePublishedReg": "2015-01-01", 
        "description": "Access Control (AC) is a well known mechanism that allows access restriction to resources. Nevertheless, it does not provide notification when a resource is retransmitted to an unauthorized third party. To overcome this issue, one can use mechanisms such as Data Loss/Leak Prevention (DLP) or Transmission Control (TC). These mechanisms are based on policies that are defined by security experts. Unfortunately, these policies can contradict existing AC rules, leading to security leakage (i.e. a legitimate user is allowed to send a resource to someone who has no access rights in the AC). In this article, we aim at creating TC policies that are compliant with existing AC policies. To do so, we use a mapping mechanism that generates TC rules directly from existing AC policies. Thanks to the generated rules, our solution can make inferences to improve existing AC and enhance security knowledge between infrastructures.", 
        "editor": [
          {
            "familyName": "Thuraisingham", 
            "givenName": "Bhavani", 
            "type": "Person"
          }, 
          {
            "familyName": "Wang", 
            "givenName": "XiaoFeng", 
            "type": "Person"
          }, 
          {
            "familyName": "Yegneswaran", 
            "givenName": "Vinod", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-28865-9_24", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-319-28864-2", 
            "978-3-319-28865-9"
          ], 
          "name": "Security and Privacy in Communication Networks", 
          "type": "Book"
        }, 
        "name": "Generation of Transmission Control Rules Compliant with Existing Access Control Policies", 
        "pagination": "438-455", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-28865-9_24"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "9e058263c99bf6ccb24754f9750d0521ff5d41ca80197e65752e8e3b73388e3f"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1033171113"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-28865-9_24", 
          "https://app.dimensions.ai/details/publication/pub.1033171113"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T16:17", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8675_00000263.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-28865-9_24"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-28865-9_24'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-28865-9_24'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-28865-9_24'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-28865-9_24'


     

    This table displays all metadata directly associated to this object as RDF triples.

    154 TRIPLES      23 PREDICATES      43 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-28865-9_24 schema:about anzsrc-for:18
    2 anzsrc-for:1801
    3 schema:author N4513fda458ac4218bbb71f15e46f8b2f
    4 schema:citation sg:pub.10.1007/978-1-4614-2053-8
    5 sg:pub.10.1007/978-3-319-12280-9_23
    6 sg:pub.10.1007/978-3-540-74835-9_35
    7 sg:pub.10.1007/978-3-540-76929-3_12
    8 sg:pub.10.1007/978-3-642-16949-6_14
    9 sg:pub.10.1007/978-3-642-29414-3_19
    10 https://app.dimensions.ai/details/publication/pub.1007197624
    11 https://doi.org/10.1016/j.comnet.2011.09.014
    12 https://doi.org/10.1016/j.entcs.2007.01.064
    13 https://doi.org/10.1109/2.485845
    14 https://doi.org/10.1109/ares.2009.152
    15 https://doi.org/10.1109/ntms.2011.5721143
    16 https://doi.org/10.1109/proc.1975.9939
    17 https://doi.org/10.1145/2523514.2523549
    18 https://doi.org/10.1145/361011.361070
    19 https://doi.org/10.1145/984334.984339
    20 schema:datePublished 2015
    21 schema:datePublishedReg 2015-01-01
    22 schema:description Access Control (AC) is a well known mechanism that allows access restriction to resources. Nevertheless, it does not provide notification when a resource is retransmitted to an unauthorized third party. To overcome this issue, one can use mechanisms such as Data Loss/Leak Prevention (DLP) or Transmission Control (TC). These mechanisms are based on policies that are defined by security experts. Unfortunately, these policies can contradict existing AC rules, leading to security leakage (i.e. a legitimate user is allowed to send a resource to someone who has no access rights in the AC). In this article, we aim at creating TC policies that are compliant with existing AC policies. To do so, we use a mapping mechanism that generates TC rules directly from existing AC policies. Thanks to the generated rules, our solution can make inferences to improve existing AC and enhance security knowledge between infrastructures.
    23 schema:editor N2697a4334f294f48b151381e24b758ea
    24 schema:genre chapter
    25 schema:inLanguage en
    26 schema:isAccessibleForFree true
    27 schema:isPartOf N2e573ba4b65d454cb0f10f8732066cfb
    28 schema:name Generation of Transmission Control Rules Compliant with Existing Access Control Policies
    29 schema:pagination 438-455
    30 schema:productId N311151af5eb74f739487cce3fb4106d9
    31 N9565ad93292c4a2f891ca3dc3b78d605
    32 Nc3de168c9a9e49a2ad6873aeb606534b
    33 schema:publisher N45bec2758265495b91e52871b22966e4
    34 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033171113
    35 https://doi.org/10.1007/978-3-319-28865-9_24
    36 schema:sdDatePublished 2019-04-15T16:17
    37 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    38 schema:sdPublisher N604a6a9310a54e1ea08fd0a0026f3ca5
    39 schema:url http://link.springer.com/10.1007/978-3-319-28865-9_24
    40 sgo:license sg:explorer/license/
    41 sgo:sdDataset chapters
    42 rdf:type schema:Chapter
    43 N0bcb1e4b5f0f4ee0979e0c944db2b54f schema:familyName Yegneswaran
    44 schema:givenName Vinod
    45 rdf:type schema:Person
    46 N200a9ae1be624f82b65cdaf573fa2e32 schema:familyName Wang
    47 schema:givenName XiaoFeng
    48 rdf:type schema:Person
    49 N23f3694b35c94f7bbb0b07d5487a6265 rdf:first sg:person.07767513703.93
    50 rdf:rest N4cc07ab6e0ff40e6b543b982858948ed
    51 N2697a4334f294f48b151381e24b758ea rdf:first Nbf855ef77d80485cbd255f8c9706a02a
    52 rdf:rest Nb290440f095648169bc04de232470c4e
    53 N2e573ba4b65d454cb0f10f8732066cfb schema:isbn 978-3-319-28864-2
    54 978-3-319-28865-9
    55 schema:name Security and Privacy in Communication Networks
    56 rdf:type schema:Book
    57 N311151af5eb74f739487cce3fb4106d9 schema:name dimensions_id
    58 schema:value pub.1033171113
    59 rdf:type schema:PropertyValue
    60 N3576ba67b57744f8a96e8a44cdafaa84 schema:name University of Nice Sophia Antipolis, CNRS, I3S, UMR 7271
    61 rdf:type schema:Organization
    62 N4513fda458ac4218bbb71f15e46f8b2f rdf:first sg:person.011565365437.36
    63 rdf:rest N23f3694b35c94f7bbb0b07d5487a6265
    64 N45bec2758265495b91e52871b22966e4 schema:location Cham
    65 schema:name Springer International Publishing
    66 rdf:type schema:Organisation
    67 N4cc07ab6e0ff40e6b543b982858948ed rdf:first sg:person.011747351366.02
    68 rdf:rest N8aa7d323270f49d79ee09bedbd452311
    69 N602cbdf83f8c4416938a763538d0aaec schema:name University of Nice Sophia Antipolis, CNRS, I3S, UMR 7271
    70 rdf:type schema:Organization
    71 N604a6a9310a54e1ea08fd0a0026f3ca5 schema:name Springer Nature - SN SciGraph project
    72 rdf:type schema:Organization
    73 N69684d06cc3b41568e06cc85abdeb69b schema:name University of Nice Sophia Antipolis, CNRS, I3S, UMR 7271
    74 rdf:type schema:Organization
    75 N8aa7d323270f49d79ee09bedbd452311 rdf:first sg:person.015344032460.53
    76 rdf:rest rdf:nil
    77 N9565ad93292c4a2f891ca3dc3b78d605 schema:name doi
    78 schema:value 10.1007/978-3-319-28865-9_24
    79 rdf:type schema:PropertyValue
    80 Na9646947974a4d869efa2437fe003cf1 schema:name University of Nice Sophia Antipolis, CNRS, I3S, UMR 7271
    81 rdf:type schema:Organization
    82 Naae1db4b8fa64843ad41e91a7f88e190 rdf:first N0bcb1e4b5f0f4ee0979e0c944db2b54f
    83 rdf:rest rdf:nil
    84 Nb290440f095648169bc04de232470c4e rdf:first N200a9ae1be624f82b65cdaf573fa2e32
    85 rdf:rest Naae1db4b8fa64843ad41e91a7f88e190
    86 Nbf855ef77d80485cbd255f8c9706a02a schema:familyName Thuraisingham
    87 schema:givenName Bhavani
    88 rdf:type schema:Person
    89 Nc3de168c9a9e49a2ad6873aeb606534b schema:name readcube_id
    90 schema:value 9e058263c99bf6ccb24754f9750d0521ff5d41ca80197e65752e8e3b73388e3f
    91 rdf:type schema:PropertyValue
    92 anzsrc-for:18 schema:inDefinedTermSet anzsrc-for:
    93 schema:name Law and Legal Studies
    94 rdf:type schema:DefinedTerm
    95 anzsrc-for:1801 schema:inDefinedTermSet anzsrc-for:
    96 schema:name Law
    97 rdf:type schema:DefinedTerm
    98 sg:person.011565365437.36 schema:affiliation N602cbdf83f8c4416938a763538d0aaec
    99 schema:familyName Bertrand
    100 schema:givenName Yoann
    101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011565365437.36
    102 rdf:type schema:Person
    103 sg:person.011747351366.02 schema:affiliation Na9646947974a4d869efa2437fe003cf1
    104 schema:familyName Boudaoud
    105 schema:givenName Karima
    106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011747351366.02
    107 rdf:type schema:Person
    108 sg:person.015344032460.53 schema:affiliation N3576ba67b57744f8a96e8a44cdafaa84
    109 schema:familyName Riveill
    110 schema:givenName Michel
    111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015344032460.53
    112 rdf:type schema:Person
    113 sg:person.07767513703.93 schema:affiliation N69684d06cc3b41568e06cc85abdeb69b
    114 schema:familyName Blay-Fornarino
    115 schema:givenName Mireille
    116 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07767513703.93
    117 rdf:type schema:Person
    118 sg:pub.10.1007/978-1-4614-2053-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007197624
    119 https://doi.org/10.1007/978-1-4614-2053-8
    120 rdf:type schema:CreativeWork
    121 sg:pub.10.1007/978-3-319-12280-9_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052610061
    122 https://doi.org/10.1007/978-3-319-12280-9_23
    123 rdf:type schema:CreativeWork
    124 sg:pub.10.1007/978-3-540-74835-9_35 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016144601
    125 https://doi.org/10.1007/978-3-540-74835-9_35
    126 rdf:type schema:CreativeWork
    127 sg:pub.10.1007/978-3-540-76929-3_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004447763
    128 https://doi.org/10.1007/978-3-540-76929-3_12
    129 rdf:type schema:CreativeWork
    130 sg:pub.10.1007/978-3-642-16949-6_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042689376
    131 https://doi.org/10.1007/978-3-642-16949-6_14
    132 rdf:type schema:CreativeWork
    133 sg:pub.10.1007/978-3-642-29414-3_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023485977
    134 https://doi.org/10.1007/978-3-642-29414-3_19
    135 rdf:type schema:CreativeWork
    136 https://app.dimensions.ai/details/publication/pub.1007197624 schema:CreativeWork
    137 https://doi.org/10.1016/j.comnet.2011.09.014 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029398977
    138 rdf:type schema:CreativeWork
    139 https://doi.org/10.1016/j.entcs.2007.01.064 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011330204
    140 rdf:type schema:CreativeWork
    141 https://doi.org/10.1109/2.485845 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061105558
    142 rdf:type schema:CreativeWork
    143 https://doi.org/10.1109/ares.2009.152 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095343168
    144 rdf:type schema:CreativeWork
    145 https://doi.org/10.1109/ntms.2011.5721143 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094366030
    146 rdf:type schema:CreativeWork
    147 https://doi.org/10.1109/proc.1975.9939 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061443155
    148 rdf:type schema:CreativeWork
    149 https://doi.org/10.1145/2523514.2523549 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045332049
    150 rdf:type schema:CreativeWork
    151 https://doi.org/10.1145/361011.361070 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041075202
    152 rdf:type schema:CreativeWork
    153 https://doi.org/10.1145/984334.984339 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010383533
    154 rdf:type schema:CreativeWork
     




    Preview window. Press ESC to close (or click here)


    ...