C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
CSAW
2007
2008
2007
2008
Keyphrases
Publications
2008
Amir Jerbi
,
Ethan Hadar
,
Carrie Gates
,
Dmitry Grebenev
An access control reference architecture.
CSAW
(2008)
Sandra Julieta Rueda
,
Yogesh Sreenivasan
,
Trent Jaeger
Flexible security configuration for virtual machines.
CSAW
(2008)
Cynthia E. Irvine
,
Timothy E. Levin
,
Paul C. Clark
,
Thuy D. Nguyen
A security architecture for transient trust.
CSAW
(2008)
Jingfei Kong
,
Onur Aciiçmez
,
Jean-Pierre Seifert
,
Huiyang Zhou
Deconstructing new cache designs for thwarting software cache-based side channel attacks.
CSAW
(2008)
Ellick Chan
,
Carl A. Gunter
,
Sonia Jahid
,
Evgeni Peryshkin
,
Daniel Rebolledo
Using rhythmic nonces for puzzle-based DoS resistance.
CSAW
(2008)
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008
CSAW
(2008)
Matthew Burnside
,
Angelos D. Keromytis
Asynchronous policy evaluation and enforcement.
CSAW
(2008)
Jon A. Solworth
Beacon certificate push revocation.
CSAW
(2008)
Lillian Røstad
,
Øystein Nytrø
Personalized access control for a personally controlled health record.
CSAW
(2008)
2007
Lieven Desmet
,
Wouter Joosen
,
Fabio Massacci
,
Katsiaryna Naliuka
,
Pieter Philippaerts
,
Frank Piessens
,
Dries Vanoverberghe
A flexible security architecture to support third-party applications on mobile devices.
CSAW
(2007)
Kevin R. B. Butler
,
Stephen E. McLaughlin
,
Patrick D. McDaniel
Non-volatile memory and disks: avenues for policy architectures.
CSAW
(2007)
Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007
CSAW
(2007)
Daniel J. Bernstein
Some thoughts on security after ten years of qmail 1.0.
CSAW
(2007)
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Sushil Jajodia
,
Stefano Paraboschi
,
Pierangela Samarati
A data outsourcing architecture combining cryptography and access control.
CSAW
(2007)
Christian Payne
A cryptographic access control architecture secure against privileged attackers.
CSAW
(2007)
Jodie P. Boyer
,
Ragib Hasan
,
Lars E. Olson
,
Nikita Borisov
,
Carl A. Gunter
,
David Raila
Improving multi-tier security using redundant authentication.
CSAW
(2007)
Onur Aciiçmez
Yet another MicroArchitectural Attack: : exploiting I-Cache.
CSAW
(2007)
William Enck
,
Sandra Julieta Rueda
,
Joshua Schiffman
,
Yogesh Sreenivasan
,
Luke St. Clair
,
Trent Jaeger
,
Patrick D. McDaniel
Protecting users from "themselves".
CSAW
(2007)
Jeffrey Choi Robinson
,
W. Scott Harrison
,
Nadine Hanebutte
,
Paul W. Oman
,
Jim Alves-Foss
Implementing middleware for content filtering and information flow control.
CSAW
(2007)
Timothy E. Levin
,
Cynthia E. Irvine
,
Clark Weissman
,
Thuy D. Nguyen
Analysis of three multilevel security architectures.
CSAW
(2007)