Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Handling inheritance violation for secure interoperation of heterogeneous systems
Hejiao Huang, Helene Kirchner, Songyun Liu, Weili Wu
International Journal of Security and Networks (IJSN), 2009 Vol.4 No.4, pp.223 - 233
16 - 14 =

Thank you for your feedback.