Author:
Chu Yang-Hua,Feigenbaum Joan,LaMacchia Brian,Resnick Paul,Strauss Martin
Reference5 articles.
1. G. Necula, Proof-carrying code, in: Proc. of the 1997 ACM Symposium on Principles of Programming Languages, in press.
2. G. Necula, P. Lee, Safe kernel extensions without run-time checking, in: Proc. of the 1996 Usenix Symposium on Operating System Design and Implementation, pp. 229–243.
3. Blaze M., Feigenbaum J., Lacy J., Decentralized trust management, Proc. of the 1996 IEEE Symposium on Security and Privacy, 164–173. Also available as a DIMACS Technical Report from
4. PICS: Internet access controls without censorship;Resnick,1996
5. Blaze M., Feigenbaum J., Resnick P., Strauss M., Managing trust in an information-labeling system, European Trans. on Telecommunications
Cited by
69 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献