dc.contributor.author |
Bichhawat, Abhishek |
|
dc.contributor.author |
Rajani, Vineet |
|
dc.contributor.author |
Garg, Deepak |
|
dc.contributor.author |
Hammer, Christian |
|
dc.coverage.spatial |
Netherlands |
|
dc.date.accessioned |
2012-09-29T14:45:08Z |
|
dc.date.available |
2012-09-29T14:45:08Z |
|
dc.date.issued |
2021-06 |
|
dc.identifier.citation |
Bichhawat, Abhishek; Rajani, Vineet; Garg, Deepak and Hammer, Christian, "Permissive runtime information flow control in the presence of exceptions", Journal of Computer Security, DOI: 10.3233/JCS-211385, vol. 29, no. 4, pp. 361-401, Jun. 2021. |
en_US |
dc.identifier.issn |
0926-227X |
|
dc.identifier.uri |
https://doi.org/10.3233/JCS-211385 |
|
dc.identifier.uri |
https://repository.iitgn.ac.in/handle/123456789/6775 |
|
dc.description.statementofresponsibility |
by Bichhawat, Abhishek, Rajani, Vineet, Garg, Deepak and Hammer, Christian |
|
dc.format.extent |
vol. 29, no. 4, pp. 361-401 |
|
dc.language.iso |
en_US |
en_US |
dc.publisher |
IOS Press |
en_US |
dc.subject |
Runtime information flow control |
en_US |
dc.subject |
permissive-upgrade |
en_US |
dc.subject |
control-flow graphs |
en_US |
dc.subject |
immediate post-dominator analysis |
en_US |
dc.subject |
exceptions |
en_US |
dc.title |
Permissive runtime information flow control in the presence of exceptions |
en_US |
dc.type |
Article |
en_US |
dc.relation.journal |
Journal of Computer Security |
|