Login / Signup
Secure Isolation of Untrusted Legacy Applications.
Shaya Potter
Jason Nieh
Matt Selsky
Published in:
LISA (2007)
Keyphrases
</>
sensitive data
third party
privacy preserving
security requirements
security issues
covert channel
data sets
legacy systems
reverse engineering
data storage
information security
sensor networks
highly efficient
key management
security protocols
authentication scheme
group communication