Login / Signup
Secure Composition of Untrusted Code: Wrappers and Causality Types.
Peter Sewell
Jan Vitek
Published in:
CSFW (2000)
Keyphrases
</>
source code
third party
sensitive data
security mechanisms
protection scheme
databases
neural network
data mining
privacy preserving
personal information
causal models
web service composition
causal reasoning
cryptographic protocols