Login / Signup

Resilient Authenticated Execution of Critical Applications in Untrusted Environments.

Michael S. KirkpatrickGabriel GhinitaElisa Bertino
Published in: IEEE Trans. Dependable Secur. Comput. (2012)
Keyphrases
  • highly dynamic environments
  • third party
  • real world
  • data flow
  • dynamic environments
  • highly dynamic
  • information retrieval
  • social networks
  • privacy preserving
  • control flow
  • execution model