Check out the new USENIX Web site.

next up previous
Up: A Comparison of Methods Previous: References

About this document ...

A Comparison of Methods for Implementing Adaptive Security Policies

This document was generated using the LaTeX2HTML translator Version .95.3 (Nov 17 1995) Copyright © 1993, 1994, Nikos Drakos, Computer Based Learning Unit, University of Leeds.

The command line arguments were:
latex2html -split 2 trade-off-paper.tex.

The translation was initiated by Brian Loe on Tue Dec 9 09:16:53 CST 1997


Brian Loe
Tue Dec 9 09:16:53 CST 1997