|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 56 occurrences of 40 keywords
|
|
|
Results
Found 20 publication records. Showing 20 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Amir Jerbi, Ethan Hadar, Carrie Gates, Dmitry Grebenev |
An access control reference architecture. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
architecture centric evolution, security, access control, reference architecture |
1 | Sandra Julieta Rueda, Yogesh Sreenivasan, Trent Jaeger |
Flexible security configuration for virtual machines. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
access control, virtual machines, policy, compliance |
1 | Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark, Thuy D. Nguyen |
A security architecture for transient trust. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
virtualization, multilevel security, emergency management, separation kernel |
1 | Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou |
Deconstructing new cache designs for thwarting software cache-based side channel attacks. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
microarchitectural analysis, cryptanalysis, side-channel analysis, timing attack, cache architecture, cache attack |
1 | Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, Daniel Rebolledo |
Using rhythmic nonces for puzzle-based DoS resistance. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
security |
1 | Trent Jaeger (eds.) |
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008 |
CSAW |
2008 |
DBLP BibTeX RDF |
|
1 | Matthew Burnside, Angelos D. Keromytis |
Asynchronous policy evaluation and enforcement. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
security, scalability, access control, policy |
1 | Jon A. Solworth |
Beacon certificate push revocation. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
authentication, certificate, public key infrastructure (pki), revocation |
1 | Lillian Røstad, Øystein Nytrø |
Personalized access control for a personally controlled health record. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
access control |
1 | Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe |
A flexible security architecture to support third-party applications on mobile devices. |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
mobile code, security architecture |
1 | Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel |
Non-volatile memory and disks: avenues for policy architectures. |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
NVRAM, security, storage, labels |
1 | Peng Ning, Vijay Atluri (eds.) |
Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007 |
CSAW |
2007 |
DBLP BibTeX RDF |
|
1 | Daniel J. Bernstein |
Some thoughts on security after ten years of qmail 1.0. |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
eliminating bugs, eliminating code, eliminating trusted code |
1 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
A data outsourcing architecture combining cryptography and access control. |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
outsourced architecture, access control, cryptography |
1 | Christian Payne |
A cryptographic access control architecture secure against privileged attackers. |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
access control, operating system security, cryptographic file systems |
1 | Jodie P. Boyer, Ragib Hasan, Lars E. Olson 0001, Nikita Borisov, Carl A. Gunter, David Raila |
Improving multi-tier security using redundant authentication. |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
Building Automation Systems, authentication |
1 | Onur Aciiçmez |
Yet another MicroArchitectural Attack: : exploiting I-Cache. |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
MicroArchitectural analysis, RSA, side channel analysis, instruction cache, Montgomery Multiplication, modular exponentiation |
1 | William Enck, Sandra Julieta Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel |
Protecting users from "themselves". |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
access control, policy |
1 | Jeffrey Choi Robinson, W. Scott Harrison, Nadine Hanebutte, Paul W. Oman, Jim Alves-Foss |
Implementing middleware for content filtering and information flow control. |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
GIOP, MILS, security, CORBA, safety, MLS, common criteria, high assurance, guards, IIOP |
1 | Timothy E. Levin, Cynthia E. Irvine, Clark Weissman, Thuy D. Nguyen |
Analysis of three multilevel security architectures. |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
partitioning kernel, principle of least privilege, architecture, multilevel security, security kernel, separation kernel |
Displaying result #1 - #20 of 20 (100 per page; Change: )
|
|