Abstract
Information flow techniques typically classify information according to suitable security levels and enforce policies that are based on binary relatio......
小提示:本篇文献需要登录阅读全文,点击跳转登录