Login / Signup

A security domain model to assess software for exploitable covert channels.

Alan B. ShafferMikhail AugustonCynthia E. IrvineTimothy E. Levin
Published in: PLAS (2008)
Keyphrases