Secure Composition of Untrusted Code: Box pi, Wrappers, and Causality.
Peter SewellJan VitekPublished in: J. Comput. Secur. (2003)
Keyphrases
- sensitive data
- third party
- semi structured
- web service composition
- data extraction
- covert channel
- information extraction
- source code
- privacy preserving
- security policies
- causal models
- protection scheme
- security requirements
- user authentication
- key distribution
- causal reasoning
- security protocols
- key management
- security mechanisms
- data mining
- bayesian networks