@dblp

From Trusted to Secure: Building and Executing Applications That Enforce System Security.

, , , und . USENIX Annual Technical Conference, Seite 205-218. USENIX, (2007)

Links und Ressourcen

Tags