Login / Signup
Policy-enforced linking of untrusted components.
Eunyoung Lee
Andrew W. Appel
Published in:
ESEC / SIGSOFT FSE (2003)
Keyphrases
</>
third party
optimal policy
policy making
information retrieval
decision trees
bayesian networks
privacy preserving
software components