Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/safeconfig/safeconfig2009.bht:"
@inproceedings{DBLP:conf/safeconfig/BabicXYI09, author = {Anitra Babic and Huijun Xiong and Danfeng Yao and Liviu Iftode}, editor = {Ehab Al{-}Shaer and Mohamed G. Gouda and Jorge Lobo and Sanjai Narain and Felix Wu}, title = {Building robust authentication systems with activity-based personal questions}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009}, pages = {19--24}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655062.1655067}, doi = {10.1145/1655062.1655067}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/BabicXYI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/CravenLLRS09, author = {Robert Craven and Jorge Lobo and Emil Lupu and Alessandra Russo and Morris Sloman}, editor = {Ehab Al{-}Shaer and Mohamed G. Gouda and Jorge Lobo and Sanjai Narain and Felix Wu}, title = {Security policy refinement using data integration: a position paper}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009}, pages = {25--28}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655062.1655068}, doi = {10.1145/1655062.1655068}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/CravenLLRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/GoodloeG09, author = {Alwyn Goodloe and Carl A. Gunter}, editor = {Ehab Al{-}Shaer and Mohamed G. Gouda and Jorge Lobo and Sanjai Narain and Felix Wu}, title = {Completeness of discovery protocols}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009}, pages = {29--36}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655062.1655070}, doi = {10.1145/1655062.1655070}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/GoodloeG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/HoqueRA009, author = {Md. Endadul Hoque and Farzana Rahman and Sheikh Iqbal Ahamed and Lin Liu}, editor = {Ehab Al{-}Shaer and Mohamed G. Gouda and Jorge Lobo and Sanjai Narain and Felix Wu}, title = {Trust based security auto-configuration for smart assisted living environments}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009}, pages = {7--12}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655062.1655065}, doi = {10.1145/1655062.1655065}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/HoqueRA009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/KrothapalliSSYR09, author = {Sunil Krothapalli and Xin Sun and Yu{-}Wei Eric Sung and Suan Aik Yeo and Sanjay G. Rao}, editor = {Ehab Al{-}Shaer and Mohamed G. Gouda and Jorge Lobo and Sanjai Narain and Felix Wu}, title = {A toolkit for automating and visualizing {VLAN} configuration}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009}, pages = {63--70}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655062.1655075}, doi = {10.1145/1655062.1655075}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/KrothapalliSSYR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/MontanariC09, author = {Mirko Montanari and Roy H. Campbell}, editor = {Ehab Al{-}Shaer and Mohamed G. Gouda and Jorge Lobo and Sanjai Narain and Felix Wu}, title = {Multi-aspect security configuration assessment}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009}, pages = {1--6}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655062.1655064}, doi = {10.1145/1655062.1655064}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/MontanariC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/OkhraviKN09, author = {Hamed Okhravi and Ryan H. Kagin and David M. Nicol}, editor = {Ehab Al{-}Shaer and Mohamed G. Gouda and Jorge Lobo and Sanjai Narain and Felix Wu}, title = {PolicyGlobe: a framework for integrating network and operating system security policies}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009}, pages = {53--62}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655062.1655074}, doi = {10.1145/1655062.1655074}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/OkhraviKN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/SamakEA09, author = {Taghrid Samak and Adel El{-}Atawy and Ehab Al{-}Shaer}, editor = {Ehab Al{-}Shaer and Mohamed G. Gouda and Jorge Lobo and Sanjai Narain and Felix Wu}, title = {Towards network security policy generation for configuration analysis and testing}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009}, pages = {45--52}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655062.1655072}, doi = {10.1145/1655062.1655072}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/SamakEA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/TanviruzzamanAHO09, author = {Mohammad Tanviruzzaman and Sheikh Iqbal Ahamed and Chowdhury Sharif Hasan and Casey O'Brien}, editor = {Ehab Al{-}Shaer and Mohamed G. Gouda and Jorge Lobo and Sanjai Narain and Felix Wu}, title = {ePet: when cellular phone learns to recognize its owner}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009}, pages = {13--18}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655062.1655066}, doi = {10.1145/1655062.1655066}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/TanviruzzamanAHO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/Voellmy09, author = {Andreas Voellmy}, editor = {Ehab Al{-}Shaer and Mohamed G. Gouda and Jorge Lobo and Sanjai Narain and Felix Wu}, title = {Proof of an interdomain policy: a load-balancing multi-homed network}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009}, pages = {37--44}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655062.1655071}, doi = {10.1145/1655062.1655071}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/Voellmy09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/WatsonWL09, author = {Jason Watson and Michael Whitney and Heather Richter Lipford}, editor = {Ehab Al{-}Shaer and Mohamed G. Gouda and Jorge Lobo and Sanjai Narain and Felix Wu}, title = {Configuring audience-oriented privacy policies}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009}, pages = {71--78}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655062.1655076}, doi = {10.1145/1655062.1655076}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/WatsonWL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/safeconfig/2009, editor = {Ehab Al{-}Shaer and Mohamed G. Gouda and Jorge Lobo and Sanjai Narain and Felix Wu}, title = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009}, publisher = {{ACM}}, year = {2009}, url = {http://dl.acm.org/citation.cfm?id=1655062}, isbn = {978-1-60558-778-3}, timestamp = {Thu, 21 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.