Browse Items (1 total)

  • Tags: mutation control

Security-critical software applications contain confidential information which has to be protected from leaking to unauthorized systems. With language-based techniques, the confidentiality of applications can be enforced. Such techniques are for…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2