Login / Signup

Isolating untrusted software extensions by custom scoping rules.

Philip W. L. FongSimon A. Orr
Published in: Comput. Lang. Syst. Struct. (2010)
Keyphrases