Cryptographic Enforcement of Information Flow Policies Without Public Information. / Crampton, Jason; Farley, Naomi; Gutin, Gregory; Jones, Mark; Poettering, Bertram.

13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . ed. / Tal Malkin; Vladimir Kolesnikov; Allison Bishop Lewko; Michalis Polychronakis. 2016. p. 389-408 (Lecture Notes in Computer Science; Vol. 9092).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

E-pub ahead of print

Standard

Cryptographic Enforcement of Information Flow Policies Without Public Information. / Crampton, Jason; Farley, Naomi; Gutin, Gregory; Jones, Mark; Poettering, Bertram.

13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . ed. / Tal Malkin; Vladimir Kolesnikov; Allison Bishop Lewko; Michalis Polychronakis. 2016. p. 389-408 (Lecture Notes in Computer Science; Vol. 9092).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Crampton, J, Farley, N, Gutin, G, Jones, M & Poettering, B 2016, Cryptographic Enforcement of Information Flow Policies Without Public Information. in T Malkin, V Kolesnikov, A Bishop Lewko & M Polychronakis (eds), 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . Lecture Notes in Computer Science, vol. 9092, pp. 389-408. https://doi.org/10.1007/978-3-319-28166-7_19

APA

Crampton, J., Farley, N., Gutin, G., Jones, M., & Poettering, B. (2016). Cryptographic Enforcement of Information Flow Policies Without Public Information. In T. Malkin, V. Kolesnikov, A. Bishop Lewko, & M. Polychronakis (Eds.), 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) (pp. 389-408). (Lecture Notes in Computer Science; Vol. 9092). https://doi.org/10.1007/978-3-319-28166-7_19

Vancouver

Crampton J, Farley N, Gutin G, Jones M, Poettering B. Cryptographic Enforcement of Information Flow Policies Without Public Information. In Malkin T, Kolesnikov V, Bishop Lewko A, Polychronakis M, editors, 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . 2016. p. 389-408. (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-319-28166-7_19

Author

Crampton, Jason ; Farley, Naomi ; Gutin, Gregory ; Jones, Mark ; Poettering, Bertram. / Cryptographic Enforcement of Information Flow Policies Without Public Information. 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . editor / Tal Malkin ; Vladimir Kolesnikov ; Allison Bishop Lewko ; Michalis Polychronakis. 2016. pp. 389-408 (Lecture Notes in Computer Science).

BibTeX

@inproceedings{8e8e80243865493f8fb4dac80c8ea32f,
title = "Cryptographic Enforcement of Information Flow Policies Without Public Information",
author = "Jason Crampton and Naomi Farley and Gregory Gutin and Mark Jones and Bertram Poettering",
year = "2016",
month = jan,
day = "9",
doi = "10.1007/978-3-319-28166-7_19",
language = "English",
isbn = "978-3-319-28165-0",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "389--408",
editor = "Tal Malkin and Kolesnikov, {Vladimir } and {Bishop Lewko}, {Allison } and Polychronakis, {Michalis }",
booktitle = "13th International Conference on Applied Cryptography and Network Security (ACNS 2015)",

}

RIS

TY - GEN

T1 - Cryptographic Enforcement of Information Flow Policies Without Public Information

AU - Crampton, Jason

AU - Farley, Naomi

AU - Gutin, Gregory

AU - Jones, Mark

AU - Poettering, Bertram

PY - 2016/1/9

Y1 - 2016/1/9

UR - http://www.springer.com/gp/book/9783319281650?token=prtst0416p

U2 - 10.1007/978-3-319-28166-7_19

DO - 10.1007/978-3-319-28166-7_19

M3 - Conference contribution

SN - 978-3-319-28165-0

T3 - Lecture Notes in Computer Science

SP - 389

EP - 408

BT - 13th International Conference on Applied Cryptography and Network Security (ACNS 2015)

A2 - Malkin, Tal

A2 - Kolesnikov, Vladimir

A2 - Bishop Lewko, Allison

A2 - Polychronakis, Michalis

ER -