Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
The growing dependence of our society and economy on networked information systems makes it essential to protect our confidential data from being leaked by malicious code. Downloading and executing code (possibly from untrusted sources) has become a daily event. Modern operating systems load code fo...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English English |
Published: |
2008
|
Online Access: | http://psasir.upm.edu.my/id/eprint/5256/1/FSKTM_2008_20a.pdf http://psasir.upm.edu.my/id/eprint/5256/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!