@dblp

From Trusted to Secure: Building and Executing Applications That Enforce System Security.

, , , and . USENIX Annual Technical Conference, page 205-218. USENIX, (2007)

Links and resources

Tags