Secure sharing between untrusted users in a transparent source/binary deployment model

Eelco Dolstra. Secure sharing between untrusted users in a transparent source/binary deployment model. In David F. Redmiles, Thomas Ellman, Andrea Zisman, editors, 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), November 7-11, 2005, Long Beach, CA, USA. pages 154-163, ACM, 2005. [doi]

@inproceedings{Dolstra05:0,
  title = {Secure sharing between untrusted users in a transparent source/binary deployment model},
  author = {Eelco  Dolstra},
  year = {2005},
  doi = {10.1145/1101908.1101933},
  url = {http://doi.acm.org/10.1145/1101908.1101933},
  tags = {deployment, source-to-source, open-source},
  researchr = {https://researchr.org/publication/Dolstra05%3A0},
  cites = {0},
  citedby = {0},
  pages = {154-163},
  booktitle = {20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
  editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
  publisher = {ACM},
}