Login / Signup
On Runtime Enforcement via Suppressions.
Luca Aceto
Ian Cassar
Adrian Francalanza
Anna Ingólfsdóttir
Published in:
CoRR (2018)
Keyphrases
</>
access control
sensitive information
multi agent
digital rights
real world
computer vision
database systems
cell suppression