Login / Signup
Secure sharing between untrusted users in a transparent source/binary deployment model.
Eelco Dolstra
Published in:
ASE (2005)
Keyphrases
</>
computational model
probabilistic model
high level
formal model
statistical model
similarity measure
neural network
probability distribution
user model
security model
multiple users
access control
multi class
management system
social media
user interface
objective function