Runtime verification using policy-based approach to control information flow

Author: Sarrab Mohamed  

Publisher: Inderscience Publishers

ISSN: 1747-8405

Source: International Journal of Security and Networks, Vol.8, Iss.4, 2013-12, pp. : 212-230

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract