Login / Signup

Policy-enforced linking of untrusted components.

Eunyoung LeeAndrew W. Appel
Published in: ESEC / SIGSOFT FSE (2003)
Keyphrases
  • third party
  • optimal policy
  • policy making
  • information retrieval
  • decision trees
  • bayesian networks
  • privacy preserving
  • software components