The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2008 (conf/ccs/2008vmsec)


  1. Secure control of portable images in a virtual computing utility. [Citation Graph (, )][DBLP]


  2. VEP: a virtual machine for extended proof-carrying code. [Citation Graph (, )][DBLP]


  3. Efficiently tracking application interactions using lightweight virtualization. [Citation Graph (, )][DBLP]


  4. Using virtual machines to do cross-layer damage assessment. [Citation Graph (, )][DBLP]


  5. Boxing clever with IOMMUs. [Citation Graph (, )][DBLP]


  6. Binding software to specific native hardware in a VM environment: the puf challenge and opportunity. [Citation Graph (, )][DBLP]


  7. Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002