Search dblp for Publications

export results for "toc:db/conf/ccs/csaw2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/BurnsideK08,
  author       = {Matthew Burnside and
                  Angelos D. Keromytis},
  editor       = {Trent Jaeger},
  title        = {Asynchronous policy evaluation and enforcement},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture,
                  {CSAW} 2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {45--50},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456508.1456517},
  doi          = {10.1145/1456508.1456517},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BurnsideK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChanGJPR08,
  author       = {Ellick Chan and
                  Carl A. Gunter and
                  Sonia Jahid and
                  Evgeni Peryshkin and
                  Daniel Rebolledo},
  editor       = {Trent Jaeger},
  title        = {Using rhythmic nonces for puzzle-based DoS resistance},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture,
                  {CSAW} 2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {51--58},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456508.1456518},
  doi          = {10.1145/1456508.1456518},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChanGJPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IrvineLCN08,
  author       = {Cynthia E. Irvine and
                  Timothy E. Levin and
                  Paul C. Clark and
                  Thuy D. Nguyen},
  editor       = {Trent Jaeger},
  title        = {A security architecture for transient trust},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture,
                  {CSAW} 2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456508.1456510},
  doi          = {10.1145/1456508.1456510},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/IrvineLCN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JerbiHGG08,
  author       = {Amir Jerbi and
                  Ethan Hadar and
                  Carrie Gates and
                  Dmitry Grebenev},
  editor       = {Trent Jaeger},
  title        = {An access control reference architecture},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture,
                  {CSAW} 2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {17--24},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456508.1456513},
  doi          = {10.1145/1456508.1456513},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JerbiHGG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KongASZ08,
  author       = {Jingfei Kong and
                  Onur Acii{\c{c}}mez and
                  Jean{-}Pierre Seifert and
                  Huiyang Zhou},
  editor       = {Trent Jaeger},
  title        = {Deconstructing new cache designs for thwarting software cache-based
                  side channel attacks},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture,
                  {CSAW} 2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456508.1456514},
  doi          = {10.1145/1456508.1456514},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KongASZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RostadN08,
  author       = {Lillian R{\o}stad and
                  {\O}ystein Nytr{\o}},
  editor       = {Trent Jaeger},
  title        = {Personalized access control for a personally controlled health record},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture,
                  {CSAW} 2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {9--16},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456508.1456511},
  doi          = {10.1145/1456508.1456511},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RostadN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RuedaSJ08,
  author       = {Sandra Julieta Rueda and
                  Yogesh Sreenivasan and
                  Trent Jaeger},
  editor       = {Trent Jaeger},
  title        = {Flexible security configuration for virtual machines},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture,
                  {CSAW} 2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456508.1456515},
  doi          = {10.1145/1456508.1456515},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RuedaSJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Solworth08,
  author       = {Jon A. Solworth},
  editor       = {Trent Jaeger},
  title        = {Beacon certificate push revocation},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture,
                  {CSAW} 2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {59--66},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456508.1456519},
  doi          = {10.1145/1456508.1456519},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Solworth08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008csaw,
  editor       = {Trent Jaeger},
  title        = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture,
                  {CSAW} 2008, Alexandria, VA, USA, October 31, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  isbn         = {978-1-60558-300-6},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2008csaw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics