Login / Signup

A model of information flow control to determine whether malfunctions cause the privacy invasion.

David EvansDavid M. EyersJean Bacon
Published in: MPM@EuroSys (2012)
Keyphrases