Technical Perspective: Making Untrusted Code Useful
The following paper combines two important themes in secure computing: assurance and information flow control. For high assurance, a system's Trusted Computing Base…
Technical Perspective: Making Untrusted Code Useful
Usable Security: How to Get It
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved