Java bytecode verification for secure information flow.
Marco AvvenutiCinzia BernardeschiNicoletta De FrancescoPublished in: ACM SIGPLAN Notices (2003)
Keyphrases
- information flow
- java bytecode
- method invocation
- virtual machine
- programming language
- java virtual machine
- garbage collection
- efficient execution
- intermediate representation
- information flows
- social networks
- information security
- communication networks
- operating system
- supply chain
- object oriented
- memory management
- java card
- query language