Sign in

Using Standard Verifier to Check Secure Information Flow in Java Bytecode.

Cinzia BernardeschiNicoletta De FrancescoGiuseppe Lettieri
Published in: COMPSAC (2002)
Keyphrases
  • information flow
  • information flows
  • social networks
  • supply chain
  • information security
  • communication networks
  • multi threaded
  • query optimization
  • database
  • databases
  • data mining
  • java bytecode