BibTeX records: Donald Ray

download as .bib file

@phdthesis{DBLP:phd/basesearch/Ray16a,
  author       = {Donald Ray},
  title        = {A Quantified Model of Security Policies, with an Application for Injection-Attack
                  Prevention},
  school       = {University of South Florida, Tampa, {USA}},
  year         = {2016},
  url          = {https://digitalcommons.usf.edu/etd/6133},
  timestamp    = {Thu, 29 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Ray16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RayL15,
  author       = {Donald Ray and
                  Jay Ligatti},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {A Theory of Gray Security Policies},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {481--499},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_24},
  doi          = {10.1007/978-3-319-24177-7\_24},
  timestamp    = {Sat, 19 Oct 2019 20:00:24 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RayL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/RayL14,
  author       = {Donald Ray and
                  Jay Ligatti},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Defining Injection Attacks},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {425--441},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_26},
  doi          = {10.1007/978-3-319-13257-0\_26},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/RayL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/RayL12,
  author       = {Donald Ray and
                  Jay Ligatti},
  editor       = {John Field and
                  Michael Hicks},
  title        = {Defining code-injection attacks},
  booktitle    = {Proceedings of the 39th {ACM} {SIGPLAN-SIGACT} Symposium on Principles
                  of Programming Languages, {POPL} 2012, Philadelphia, Pennsylvania,
                  USA, January 22-28, 2012},
  pages        = {179--190},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2103656.2103678},
  doi          = {10.1145/2103656.2103678},
  timestamp    = {Thu, 24 Jun 2021 16:19:31 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/RayL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics