Search dblp for Publications

export results for "toc:db/conf/ccs/stc2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/BaileyS10,
  author    = {Katelin A. Bailey and
               Sean W. Smith},
  editor    = {Shouhuai Xu and
               N. Asokan and
               Ahmad{-}Reza Sadeghi},
  title     = {Trusted virtual containers on demand},
  booktitle = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2010, Chicago, IL, USA, October 4, 2010},
  pages     = {63--72},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1867645},
  timestamp = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/BaileyS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BugielE10,
  author    = {Sven Bugiel and
               Jan{-}Erik Ekberg},
  editor    = {Shouhuai Xu and
               N. Asokan and
               Ahmad{-}Reza Sadeghi},
  title     = {Implementing an application-specific credential platform using late-launched
               mobile trusted module},
  booktitle = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2010, Chicago, IL, USA, October 4, 2010},
  pages     = {21--30},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1867641},
  timestamp = {Mon, 09 Jan 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/BugielE10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DietrichW10,
  author    = {Kurt Dietrich and
               Johannes Winter},
  editor    = {Shouhuai Xu and
               N. Asokan and
               Ahmad{-}Reza Sadeghi},
  title     = {Towards customizable, application specific mobile trusted modules},
  booktitle = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2010, Chicago, IL, USA, October 4, 2010},
  pages     = {31--40},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1867642},
  timestamp = {Mon, 09 Jan 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/DietrichW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GebhardtDT10,
  author    = {Carl Gebhardt and
               Chris I. Dalton and
               Allan Tomlinson},
  editor    = {Shouhuai Xu and
               N. Asokan and
               Ahmad{-}Reza Sadeghi},
  title     = {Separating hypervisor trusted computing base supported by hardware},
  booktitle = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2010, Chicago, IL, USA, October 4, 2010},
  pages     = {79--84},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1867648},
  timestamp = {Mon, 09 Jan 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/GebhardtDT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GoldmanSPS10,
  author    = {Kenneth A. Goldman and
               Reiner Sailer and
               Dimitrios E. Pendarakis and
               Deepa Srinivasan},
  editor    = {Shouhuai Xu and
               N. Asokan and
               Ahmad{-}Reza Sadeghi},
  title     = {Scalable integrity monitoring in virtualized environments},
  booktitle = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2010, Chicago, IL, USA, October 4, 2010},
  pages     = {73--78},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1867647},
  timestamp = {Mon, 09 Jan 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/GoldmanSPS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HeiserAEKKR10,
  author    = {Gernot Heiser and
               June Andronick and
               Kevin Elphinstone and
               Gerwin Klein and
               Ihor Kuz and
               Leonid Ryzhyk},
  editor    = {Shouhuai Xu and
               N. Asokan and
               Ahmad{-}Reza Sadeghi},
  title     = {The road to trustworthy systems},
  booktitle = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2010, Chicago, IL, USA, October 4, 2010},
  pages     = {3--10},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1867638},
  timestamp = {Mon, 09 Jan 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/HeiserAEKKR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IlievS10,
  author    = {Alexander Iliev and
               Sean W. Smith},
  editor    = {Shouhuai Xu and
               N. Asokan and
               Ahmad{-}Reza Sadeghi},
  title     = {Small, stupid, and scalable: secure computing with faerieplay},
  booktitle = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2010, Chicago, IL, USA, October 4, 2010},
  pages     = {41--52},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1867643},
  timestamp = {Mon, 09 Jan 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/IlievS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeestSHT10,
  author    = {Vincent van der Leest and
               Geert Jan Schrijen and
               Helena Handschuh and
               Pim Tuyls},
  editor    = {Shouhuai Xu and
               N. Asokan and
               Ahmad{-}Reza Sadeghi},
  title     = {Hardware intrinsic security from {D} flip-flops},
  booktitle = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2010, Chicago, IL, USA, October 4, 2010},
  pages     = {53--62},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1867644},
  timestamp = {Mon, 09 Jan 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/LeestSHT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LieL10,
  author    = {David Lie and
               Lionel Litty},
  editor    = {Shouhuai Xu and
               N. Asokan and
               Ahmad{-}Reza Sadeghi},
  title     = {Using hypervisors to secure commodity operating systems},
  booktitle = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2010, Chicago, IL, USA, October 4, 2010},
  pages     = {11--20},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1867639},
  timestamp = {Mon, 09 Jan 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/LieL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LohrPRSW10,
  author    = {Hans L{\"{o}}hr and
               Thomas P{\"{o}}ppelmann and
               Johannes Rave and
               Martin Steegmanns and
               Marcel Winandy},
  editor    = {Shouhuai Xu and
               N. Asokan and
               Ahmad{-}Reza Sadeghi},
  title     = {Trusted virtual domains on OpenSolaris: usable secure desktop environments},
  booktitle = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2010, Chicago, IL, USA, October 4, 2010},
  pages     = {91--96},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1867650},
  timestamp = {Mon, 09 Jan 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/LohrPRSW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Oorschot10,
  author    = {Paul C. van Oorschot},
  editor    = {Shouhuai Xu and
               N. Asokan and
               Ahmad{-}Reza Sadeghi},
  title     = {System security, platform security and usability},
  booktitle = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2010, Chicago, IL, USA, October 4, 2010},
  pages     = {1--2},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1867636},
  timestamp = {Mon, 09 Jan 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Oorschot10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShubinaBIS10,
  author    = {Anna Shubina and
               Sergey Bratus and
               Wyllys Ingersol and
               Sean W. Smith},
  editor    = {Shouhuai Xu and
               N. Asokan and
               Ahmad{-}Reza Sadeghi},
  title     = {The diversity of TPMs and its effects on development: a case study
               of integrating the {TPM} into OpenSolaris},
  booktitle = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2010, Chicago, IL, USA, October 4, 2010},
  pages     = {85--90},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1867649},
  timestamp = {Mon, 09 Jan 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/ShubinaBIS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010stc,
  editor    = {Shouhuai Xu and
               N. Asokan and
               Ahmad{-}Reza Sadeghi},
  title     = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2010, Chicago, IL, USA, October 4, 2010},
  publisher = {{ACM}},
  year      = {2010},
  url       = {https://doi.org/10.1145/1867635},
  doi       = {10.1145/1867635},
  isbn      = {978-1-4503-0095-7},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/2010stc.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics