Search dblp for Publications

export results for "toc:db/conf/safeconfig/safeconfig2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/safeconfig/BabicXYI09,
  author       = {Anitra Babic and
                  Huijun Xiong and
                  Danfeng Yao and
                  Liviu Iftode},
  editor       = {Ehab Al{-}Shaer and
                  Mohamed G. Gouda and
                  Jorge Lobo and
                  Sanjai Narain and
                  Felix Wu},
  title        = {Building robust authentication systems with activity-based personal
                  questions},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security
                  Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009},
  pages        = {19--24},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655062.1655067},
  doi          = {10.1145/1655062.1655067},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/BabicXYI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/CravenLLRS09,
  author       = {Robert Craven and
                  Jorge Lobo and
                  Emil Lupu and
                  Alessandra Russo and
                  Morris Sloman},
  editor       = {Ehab Al{-}Shaer and
                  Mohamed G. Gouda and
                  Jorge Lobo and
                  Sanjai Narain and
                  Felix Wu},
  title        = {Security policy refinement using data integration: a position paper},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security
                  Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009},
  pages        = {25--28},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655062.1655068},
  doi          = {10.1145/1655062.1655068},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/CravenLLRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/GoodloeG09,
  author       = {Alwyn Goodloe and
                  Carl A. Gunter},
  editor       = {Ehab Al{-}Shaer and
                  Mohamed G. Gouda and
                  Jorge Lobo and
                  Sanjai Narain and
                  Felix Wu},
  title        = {Completeness of discovery protocols},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security
                  Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009},
  pages        = {29--36},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655062.1655070},
  doi          = {10.1145/1655062.1655070},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/GoodloeG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/HoqueRA009,
  author       = {Md. Endadul Hoque and
                  Farzana Rahman and
                  Sheikh Iqbal Ahamed and
                  Lin Liu},
  editor       = {Ehab Al{-}Shaer and
                  Mohamed G. Gouda and
                  Jorge Lobo and
                  Sanjai Narain and
                  Felix Wu},
  title        = {Trust based security auto-configuration for smart assisted living
                  environments},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security
                  Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655062.1655065},
  doi          = {10.1145/1655062.1655065},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/HoqueRA009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/KrothapalliSSYR09,
  author       = {Sunil Krothapalli and
                  Xin Sun and
                  Yu{-}Wei Eric Sung and
                  Suan Aik Yeo and
                  Sanjay G. Rao},
  editor       = {Ehab Al{-}Shaer and
                  Mohamed G. Gouda and
                  Jorge Lobo and
                  Sanjai Narain and
                  Felix Wu},
  title        = {A toolkit for automating and visualizing {VLAN} configuration},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security
                  Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009},
  pages        = {63--70},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655062.1655075},
  doi          = {10.1145/1655062.1655075},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/KrothapalliSSYR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/MontanariC09,
  author       = {Mirko Montanari and
                  Roy H. Campbell},
  editor       = {Ehab Al{-}Shaer and
                  Mohamed G. Gouda and
                  Jorge Lobo and
                  Sanjai Narain and
                  Felix Wu},
  title        = {Multi-aspect security configuration assessment},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security
                  Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655062.1655064},
  doi          = {10.1145/1655062.1655064},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/MontanariC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/OkhraviKN09,
  author       = {Hamed Okhravi and
                  Ryan H. Kagin and
                  David M. Nicol},
  editor       = {Ehab Al{-}Shaer and
                  Mohamed G. Gouda and
                  Jorge Lobo and
                  Sanjai Narain and
                  Felix Wu},
  title        = {PolicyGlobe: a framework for integrating network and operating system
                  security policies},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security
                  Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009},
  pages        = {53--62},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655062.1655074},
  doi          = {10.1145/1655062.1655074},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/OkhraviKN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/SamakEA09,
  author       = {Taghrid Samak and
                  Adel El{-}Atawy and
                  Ehab Al{-}Shaer},
  editor       = {Ehab Al{-}Shaer and
                  Mohamed G. Gouda and
                  Jorge Lobo and
                  Sanjai Narain and
                  Felix Wu},
  title        = {Towards network security policy generation for configuration analysis
                  and testing},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security
                  Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009},
  pages        = {45--52},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655062.1655072},
  doi          = {10.1145/1655062.1655072},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/SamakEA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/TanviruzzamanAHO09,
  author       = {Mohammad Tanviruzzaman and
                  Sheikh Iqbal Ahamed and
                  Chowdhury Sharif Hasan and
                  Casey O'Brien},
  editor       = {Ehab Al{-}Shaer and
                  Mohamed G. Gouda and
                  Jorge Lobo and
                  Sanjai Narain and
                  Felix Wu},
  title        = {ePet: when cellular phone learns to recognize its owner},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security
                  Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655062.1655066},
  doi          = {10.1145/1655062.1655066},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/TanviruzzamanAHO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/Voellmy09,
  author       = {Andreas Voellmy},
  editor       = {Ehab Al{-}Shaer and
                  Mohamed G. Gouda and
                  Jorge Lobo and
                  Sanjai Narain and
                  Felix Wu},
  title        = {Proof of an interdomain policy: a load-balancing multi-homed network},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security
                  Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009},
  pages        = {37--44},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655062.1655071},
  doi          = {10.1145/1655062.1655071},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/Voellmy09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/WatsonWL09,
  author       = {Jason Watson and
                  Michael Whitney and
                  Heather Richter Lipford},
  editor       = {Ehab Al{-}Shaer and
                  Mohamed G. Gouda and
                  Jorge Lobo and
                  Sanjai Narain and
                  Felix Wu},
  title        = {Configuring audience-oriented privacy policies},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security
                  Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009},
  pages        = {71--78},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655062.1655076},
  doi          = {10.1145/1655062.1655076},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/WatsonWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/safeconfig/2009,
  editor       = {Ehab Al{-}Shaer and
                  Mohamed G. Gouda and
                  Jorge Lobo and
                  Sanjai Narain and
                  Felix Wu},
  title        = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security
                  Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {http://dl.acm.org/citation.cfm?id=1655062},
  isbn         = {978-1-60558-778-3},
  timestamp    = {Thu, 21 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics