• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Resilient Authenticated Execution of Critical Applications in Untrusted Environments.

Michael S. KirkpatrickGabriel GhinitaElisa Bertino
Published in: IEEE Trans. Dependable Secur. Comput. (2012)
Keyphrases
  • highly dynamic environments
  • third party
  • real world
  • data flow
  • dynamic environments
  • highly dynamic
  • information retrieval
  • social networks
  • privacy preserving
  • control flow
  • execution model