default search action
CSAW 2008: Alexandria, VA, USA
- Trent Jaeger:
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-300-6
Trust and privacy
- Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark, Thuy D. Nguyen:
A security architecture for transient trust. 1-8 - Lillian Røstad, Øystein Nytrø:
Personalized access control for a personally controlled health record. 9-16
Host Security architecture
- Amir Jerbi, Ethan Hadar, Carrie Gates, Dmitry Grebenev:
An access control reference architecture. 17-24 - Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou:
Deconstructing new cache designs for thwarting software cache-based side channel attacks. 25-34 - Sandra Julieta Rueda, Yogesh Sreenivasan, Trent Jaeger:
Flexible security configuration for virtual machines. 35-44
Network security architecture
- Matthew Burnside, Angelos D. Keromytis:
Asynchronous policy evaluation and enforcement. 45-50 - Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, Daniel Rebolledo:
Using rhythmic nonces for puzzle-based DoS resistance. 51-58 - Jon A. Solworth:
Beacon certificate push revocation. 59-66
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.