Login / Signup
JIGSAW: Protecting Resource Access by Inferring Programmer Expectations.
Hayawardh Vijayakumar
Xinyang Ge
Mathias Payer
Trent Jaeger
Published in:
USENIX Security Symposium (2014)
Keyphrases
</>
access control
resource allocation
resource management
resource constraints
data mining
remote access
real time
decision making
programming language
web resources
random access
resource selection