Reasoning About Secure Interoperation Using Soft Constraints

doi 10.1007/0-387-24098-5_13
Full Text
Abstract

Available in full text

Date

Unknown

Authors
Publisher

Springer-Verlag