


default search action
CSAW 2008: Alexandria, VA, USA
- Trent Jaeger:

Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-300-6
Trust and privacy
- Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark, Thuy D. Nguyen:

A security architecture for transient trust. 1-8 - Lillian Røstad, Øystein Nytrø

:
Personalized access control for a personally controlled health record. 9-16
Host Security architecture
- Amir Jerbi, Ethan Hadar

, Carrie Gates, Dmitry Grebenev:
An access control reference architecture. 17-24 - Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou

:
Deconstructing new cache designs for thwarting software cache-based side channel attacks. 25-34 - Sandra Julieta Rueda

, Yogesh Sreenivasan, Trent Jaeger:
Flexible security configuration for virtual machines. 35-44
Network security architecture
- Matthew Burnside, Angelos D. Keromytis:

Asynchronous policy evaluation and enforcement. 45-50 - Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, Daniel Rebolledo:

Using rhythmic nonces for puzzle-based DoS resistance. 51-58 - Jon A. Solworth:

Beacon certificate push revocation. 59-66

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














