Login / Signup

Composing expressive runtime security policies.

Lujo BauerJay LigattiDavid Walker
Published in: ACM Trans. Softw. Eng. Methodol. (2009)
Keyphrases