X Li, B Li, H Wang, J Zhang, H Yang… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
There are essential differences in the tracing to attacks versus violations. Attack tracing
cannot be used, and there is no directly applicable model of violation tracing. To assist cloud …