Login / Signup
Research on Proof-Carrying Code for Untrusted-Code Security.
George C. Necula
Peter Lee
Published in:
IEEE Symposium on Security and Privacy (1997)
Keyphrases
</>
source code
security policies
database
case study
open source
information security
sensitive data
error correcting
data sets
access control
intrusion detection
third party
error detection
code generation