Login / Signup
A Flexible Containment Mechanism for Executing Untrusted Code.
David S. Peterson
Matt Bishop
Raju Pandey
Published in:
USENIX Security Symposium (2002)
Keyphrases
</>
source code
third party
data structure
neural network
information systems
high level
privacy preserving
transitive closure
selection mechanism
java programs
outer sheath