Inproceedings,

Implementing Security Policies using the Safe Areas of Computation Approach.

, and .
ACSAC, page 90-99. IEEE Computer Society, (2000)

Meta data

Tags

Users

  • @dblp

Comments and Reviews