The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2008 (conf/ccs/2008csaw)


  1. A security architecture for transient trust. [Citation Graph (, )][DBLP]


  2. Personalized access control for a personally controlled health record. [Citation Graph (, )][DBLP]


  3. An access control reference architecture. [Citation Graph (, )][DBLP]


  4. Deconstructing new cache designs for thwarting software cache-based side channel attacks. [Citation Graph (, )][DBLP]


  5. Flexible security configuration for virtual machines. [Citation Graph (, )][DBLP]


  6. Asynchronous policy evaluation and enforcement. [Citation Graph (, )][DBLP]


  7. Using rhythmic nonces for puzzle-based DoS resistance. [Citation Graph (, )][DBLP]


  8. Beacon certificate push revocation. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002