Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/csaw2008.bht:"
@inproceedings{DBLP:conf/ccs/BurnsideK08, author = {Matthew Burnside and Angelos D. Keromytis}, editor = {Trent Jaeger}, title = {Asynchronous policy evaluation and enforcement}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture, {CSAW} 2008, Alexandria, VA, USA, October 31, 2008}, pages = {45--50}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456508.1456517}, doi = {10.1145/1456508.1456517}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BurnsideK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChanGJPR08, author = {Ellick Chan and Carl A. Gunter and Sonia Jahid and Evgeni Peryshkin and Daniel Rebolledo}, editor = {Trent Jaeger}, title = {Using rhythmic nonces for puzzle-based DoS resistance}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture, {CSAW} 2008, Alexandria, VA, USA, October 31, 2008}, pages = {51--58}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456508.1456518}, doi = {10.1145/1456508.1456518}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChanGJPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IrvineLCN08, author = {Cynthia E. Irvine and Timothy E. Levin and Paul C. Clark and Thuy D. Nguyen}, editor = {Trent Jaeger}, title = {A security architecture for transient trust}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture, {CSAW} 2008, Alexandria, VA, USA, October 31, 2008}, pages = {1--8}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456508.1456510}, doi = {10.1145/1456508.1456510}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/IrvineLCN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JerbiHGG08, author = {Amir Jerbi and Ethan Hadar and Carrie Gates and Dmitry Grebenev}, editor = {Trent Jaeger}, title = {An access control reference architecture}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture, {CSAW} 2008, Alexandria, VA, USA, October 31, 2008}, pages = {17--24}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456508.1456513}, doi = {10.1145/1456508.1456513}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JerbiHGG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KongASZ08, author = {Jingfei Kong and Onur Acii{\c{c}}mez and Jean{-}Pierre Seifert and Huiyang Zhou}, editor = {Trent Jaeger}, title = {Deconstructing new cache designs for thwarting software cache-based side channel attacks}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture, {CSAW} 2008, Alexandria, VA, USA, October 31, 2008}, pages = {25--34}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456508.1456514}, doi = {10.1145/1456508.1456514}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KongASZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RostadN08, author = {Lillian R{\o}stad and {\O}ystein Nytr{\o}}, editor = {Trent Jaeger}, title = {Personalized access control for a personally controlled health record}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture, {CSAW} 2008, Alexandria, VA, USA, October 31, 2008}, pages = {9--16}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456508.1456511}, doi = {10.1145/1456508.1456511}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RostadN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RuedaSJ08, author = {Sandra Julieta Rueda and Yogesh Sreenivasan and Trent Jaeger}, editor = {Trent Jaeger}, title = {Flexible security configuration for virtual machines}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture, {CSAW} 2008, Alexandria, VA, USA, October 31, 2008}, pages = {35--44}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456508.1456515}, doi = {10.1145/1456508.1456515}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RuedaSJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Solworth08, author = {Jon A. Solworth}, editor = {Trent Jaeger}, title = {Beacon certificate push revocation}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture, {CSAW} 2008, Alexandria, VA, USA, October 31, 2008}, pages = {59--66}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456508.1456519}, doi = {10.1145/1456508.1456519}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Solworth08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2008csaw, editor = {Trent Jaeger}, title = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture, {CSAW} 2008, Alexandria, VA, USA, October 31, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-60558-300-6}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2008csaw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.