Composing expressive run-time security policies. (2008)

by L Bauer, J Ligatti, D Walker
Venue:ACM Transactions on Software Engineering and Methodology,