Login / Signup
Resilient Authenticated Execution of Critical Applications in Untrusted Environments.
Michael S. Kirkpatrick
Gabriel Ghinita
Elisa Bertino
Published in:
IEEE Trans. Dependable Secur. Comput. (2012)
Keyphrases
</>
highly dynamic environments
third party
real world
data flow
dynamic environments
highly dynamic
information retrieval
social networks
privacy preserving
control flow
execution model