|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 56 occurrences of 40 keywords
|
|
|
Results
Found 20 publication records. Showing 20 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Amir Jerbi, Ethan Hadar, Carrie Gates, Dmitry Grebenev |
An access control reference architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008, pp. 17-24, 2008, ACM, 978-1-60558-300-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
architecture centric evolution, security, access control, reference architecture |
1 | Sandra Julieta Rueda, Yogesh Sreenivasan, Trent Jaeger |
Flexible security configuration for virtual machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008, pp. 35-44, 2008, ACM, 978-1-60558-300-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, virtual machines, policy, compliance |
1 | Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark, Thuy D. Nguyen |
A security architecture for transient trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008, pp. 1-8, 2008, ACM, 978-1-60558-300-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtualization, multilevel security, emergency management, separation kernel |
1 | Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou |
Deconstructing new cache designs for thwarting software cache-based side channel attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008, pp. 25-34, 2008, ACM, 978-1-60558-300-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
microarchitectural analysis, cryptanalysis, side-channel analysis, timing attack, cache architecture, cache attack |
1 | Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, Daniel Rebolledo |
Using rhythmic nonces for puzzle-based DoS resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008, pp. 51-58, 2008, ACM, 978-1-60558-300-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security |
1 | Trent Jaeger (eds.) |
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![ACM, 978-1-60558-300-6 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Matthew Burnside, Angelos D. Keromytis |
Asynchronous policy evaluation and enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008, pp. 45-50, 2008, ACM, 978-1-60558-300-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, scalability, access control, policy |
1 | Jon A. Solworth |
Beacon certificate push revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008, pp. 59-66, 2008, ACM, 978-1-60558-300-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, certificate, public key infrastructure (pki), revocation |
1 | Lillian Røstad, Øystein Nytrø |
Personalized access control for a personally controlled health record. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008, pp. 9-16, 2008, ACM, 978-1-60558-300-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control |
1 | Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe |
A flexible security architecture to support third-party applications on mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 19-28, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
mobile code, security architecture |
1 | Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel |
Non-volatile memory and disks: avenues for policy architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 77-84, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
NVRAM, security, storage, labels |
1 | Peng Ning, Vijay Atluri (eds.) |
Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![ACM, 978-1-59593-890-9 The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Daniel J. Bernstein |
Some thoughts on security after ten years of qmail 1.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 1-10, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
eliminating bugs, eliminating code, eliminating trusted code |
1 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
A data outsourcing architecture combining cryptography and access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 63-69, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
outsourced architecture, access control, cryptography |
1 | Christian Payne |
A cryptographic access control architecture secure against privileged attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 70-76, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, operating system security, cryptographic file systems |
1 | Jodie P. Boyer, Ragib Hasan, Lars E. Olson 0001, Nikita Borisov, Carl A. Gunter, David Raila |
Improving multi-tier security using redundant authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 54-62, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Building Automation Systems, authentication |
1 | Onur Aciiçmez |
Yet another MicroArchitectural Attack: : exploiting I-Cache. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 11-18, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
MicroArchitectural analysis, RSA, side channel analysis, instruction cache, Montgomery Multiplication, modular exponentiation |
1 | William Enck, Sandra Julieta Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel |
Protecting users from "themselves". ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 29-36, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, policy |
1 | Jeffrey Choi Robinson, W. Scott Harrison, Nadine Hanebutte, Paul W. Oman, Jim Alves-Foss |
Implementing middleware for content filtering and information flow control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 47-53, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
GIOP, MILS, security, CORBA, safety, MLS, common criteria, high assurance, guards, IIOP |
1 | Timothy E. Levin, Cynthia E. Irvine, Clark Weissman, Thuy D. Nguyen |
Analysis of three multilevel security architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 37-46, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
partitioning kernel, principle of least privilege, architecture, multilevel security, security kernel, separation kernel |
Displaying result #1 - #20 of 20 (100 per page; Change: )
|
|