Login / Signup

Research on Proof-Carrying Code for Untrusted-Code Security.

George C. NeculaPeter Lee
Published in: IEEE Symposium on Security and Privacy (1997)
Keyphrases
  • source code
  • security policies
  • database
  • case study
  • open source
  • information security
  • sensitive data
  • error correcting
  • data sets
  • access control
  • intrusion detection
  • third party
  • error detection
  • code generation