Login / Signup

Maintaining Authorization Hook Placements Across Program Versions.

Nirupama TaleleDivya MuthukumaranFrank CapobiancoTrent JaegerGang Tan
Published in: SecDev (2016)
Keyphrases
  • access control
  • genetic algorithm
  • security policies
  • computer programs
  • real time
  • data sets
  • information systems
  • database systems
  • hidden markov models
  • fine grained
  • conflict resolution
  • static analysis