-
1
-
-
78650017523
-
Predictive black-box mitigation of timing channels
-
ACM
-
A. Askarov, D. Zhang, and A. Myers. Predictive black-box mitigation of timing channels. In Proc. CCS, New York, NY, 2010. ACM.
-
Proc. CCS, New York, NY, 2010
-
-
Askarov, A.1
Zhang, D.2
Myers, A.3
-
3
-
-
84877717989
-
-
chapter 6. IBM Press, Indianopolis, IN, 1st edition
-
R. Bond, K. See, C. Wong, and Y.-K. Chan. Understanding DB2 9 Security, chapter 6. IBM Press, Indianopolis, IN, 1st edition.
-
Understanding DB2 9 Security
-
-
Bond, R.1
See, K.2
Wong, C.3
Chan, Y.-K.4
-
4
-
-
84877718980
-
New Facebook photo hacks
-
University of Cambridge Computer Laboratory, May 20
-
J. Bonneau. New Facebook photo hacks. In Light Blue Touchpaper. University of Cambridge Computer Laboratory, May 20, 2009. http://www. lightbluetouchpaper.org/2009/02/11/new-facebook-photo-hacks/.
-
(2009)
Light Blue Touchpaper
-
-
Bonneau, J.1
-
5
-
-
84861595370
-
Publishing set-valued data via differential privacy
-
Aug.
-
R. Chen, N. Mohammed, B. Fung, B. Desai, and L. Xiong. Publishing set-valued data via differential privacy. Proc. VLDB, 4(11), Aug. 2011.
-
(2011)
Proc. VLDB
, vol.4
, Issue.11
-
-
Chen, R.1
Mohammed, N.2
Fung, B.3
Desai, B.4
Xiong, L.5
-
6
-
-
84877688954
-
Abstractions for usable information flow control in Aeolus
-
W. Cheng, D. Ports, D. Schultz, V. Popic, A. Blankstein, J. Cowling, D. Curtis, L. Shrira, and B. Liskov. Abstractions for usable information flow control in Aeolus. In Proc. USENIX ATC, Boston, MA, June 2012.
-
Proc. USENIX ATC, Boston, MA, June 2012
-
-
Cheng, W.1
Ports, D.2
Schultz, D.3
Popic, V.4
Blankstein, A.5
Cowling, J.6
Curtis, D.7
Shrira, L.8
Liskov, B.9
-
7
-
-
84857175091
-
Static checking of dynamically-varying security policies in database-backed applications
-
A. Chlipala. Static checking of dynamically-varying security policies in database-backed applications. In Proc. OSDI, Oct. 2010.
-
Proc. OSDI, Oct. 2010
-
-
Chlipala, A.1
-
8
-
-
84877700103
-
Sif: Enforcing confidentiality and integrity in web applications
-
S. Chong, K. Vikram, and A. Myers. Sif: Enforcing confidentiality and integrity in web applications. In Proc. USENIX Security, Boston, MA, Aug. 2007.
-
Proc. USENIX Security, Boston, MA, Aug. 2007
-
-
Chong, S.1
Vikram, K.2
Myers, A.3
-
9
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. Denning. A lattice model of secure information flow. Commun. ACM, 19, May 1976.
-
(1976)
Commun. ACM
, pp. 19
-
-
Denning, D.1
-
11
-
-
84885664275
-
Labels and event processes in the Asbestos operating system
-
ACM
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In Proc. SOSP, Brighton, UK, 2005. ACM.
-
Proc. SOSP, Brighton, UK, 2005
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
12
-
-
85084164495
-
The ND2DB attack: Database content extraction using timing attacks on the indexing algorithms
-
USENIX Association
-
A. Futoransky, D. Saura, and A. Waissbein. The ND2DB attack: Database content extraction using timing attacks on the indexing algorithms. In WOOT, Boston, MA, Aug. 2007. USENIX Association.
-
WOOT, Boston, MA, Aug. 2007
-
-
Futoransky, A.1
Saura, D.2
Waissbein, A.3
-
13
-
-
78650518102
-
Boosting the accuracy of differentially private histograms through consistency
-
Sept.
-
M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB, 3(1-2), Sept. 2010.
-
(2010)
Proc. VLDB
, vol.3
, Issue.1-2
-
-
Hay, M.1
Rastogi, V.2
Miklau, G.3
Suciu, D.4
-
14
-
-
34247356882
-
CarTel: A distributed mobile sensor computing system
-
ACM
-
B. Hull, V. Bychkovsky, Y. Zhang, K. Chen, M. Goraczko, A. K. Miu, E. Shih, H. Balakrishnan, and S. Madden. CarTel: A distributed mobile sensor computing system. In SenSys, Boulder, CO, November 2006. ACM.
-
SenSys, Boulder, CO, November 2006
-
-
Hull, B.1
Bychkovsky, V.2
Zhang, Y.3
Chen, K.4
Goraczko, M.5
Miu, A.K.6
Shih, E.7
Balakrishnan, H.8
Madden, S.9
-
16
-
-
0026158295
-
Storage channels in disk arm optimization
-
IEEE, May
-
P. Karger and J. Wray. Storage channels in disk arm optimization. In Proc. Security and Privacy. IEEE, May 1991.
-
(1991)
Proc. Security and Privacy
-
-
Karger, P.1
Wray, J.2
-
18
-
-
57749192483
-
Information flow control for standard OS abstractions
-
ACM
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, F. Kaashoek, E. Kohler, and R. Morris. Information flow control for standard OS abstractions. In Proc. SOSP, New York, NY, 2007. ACM.
-
Proc. SOSP, New York, NY, 2007
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, F.5
Kohler, E.6
Morris, R.7
-
19
-
-
28144453801
-
Practical information-flow control in web-based information systems
-
IEEE
-
P. Li and S. Zdancewic. Practical information-flow control in web-based information systems. In Proc. CSFW. IEEE, 2005.
-
(2005)
Proc. CSFW
-
-
Li, P.1
Zdancewic, S.2
-
20
-
-
84877699797
-
Hide and seek in time: Robust covert timing channels
-
Springer
-
Y. Liu, D. Ghosal, F. Armknecht, A.-R. Sadeghi, S. Schulz, and S. Katzenbeisser. Hide and seek in time: Robust covert timing channels. In Proc. ESORICS, Berlin, Heidelberg, 2009. Springer.
-
Proc. ESORICS, Berlin, Heidelberg, 2009
-
-
Liu, Y.1
Ghosal, D.2
Armknecht, F.3
Sadeghi, A.-R.4
Schulz, S.5
Katzenbeisser, S.6
-
21
-
-
0025442003
-
The SeaView security model
-
June
-
T. F. Lunt, D. E. Denning, R. R. Schell, M. Heckman, and W. R. Shockley. The SeaView security model. IEEE Trans. Softw. Eng., 16, June 1990.
-
(1990)
IEEE Trans. Softw. Eng.
, pp. 16
-
-
Lunt, T.F.1
Denning, D.E.2
Schell, R.R.3
Heckman, M.4
Shockley, W.R.5
-
22
-
-
34248181923
-
l-diversity: Privacy beyond k-anonymity
-
March
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data, 1, March 2007.
-
(2007)
ACM Trans. Knowl. Discov. Data
, pp. 1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
23
-
-
84877712762
-
Security glitch exposes WellPoint customers' financial, medical data
-
June 29
-
T. Murphy. Security glitch exposes WellPoint customers' financial, medical data. USA Today, June 29, 2010. URL http://www.usatoday.com/money/ industries/health/2010-06-29-wellpoint-data-breach-N.htm.
-
(2010)
USA Today
-
-
Murphy, T.1
-
26
-
-
84877702221
-
-
Sept.
-
PostgreSQL Global Development Group. PostgreSQL 9.1 Documentation, Sept. 2011. http://www.postgresql.org/docs/9.1/static/.
-
(2011)
PostgreSQL 9.1 Documentation
-
-
-
28
-
-
0003353218
-
Polyinstantation for cover stories
-
Springer
-
R. Sandhu and S. Jajodia. Polyinstantation for cover stories. In Proc. ESORICS. Springer, 1992.
-
(1992)
Proc. ESORICS
-
-
Sandhu, R.1
Jajodia, S.2
-
30
-
-
84877723783
-
Thieves found Citigroup site an easy entry
-
June 13
-
N. Schwartz and E. Dash. Thieves found Citigroup site an easy entry. The New York Times, June 13, 2011. URL https: //www.nytimes.com/2011/06/14/ technology/14security.html.
-
(2011)
The New York Times
-
-
Schwartz, N.1
Dash, E.2
-
34
-
-
84877698434
-
-
Transaction Processing Performance Council, San Jose, CA, 1.8 edition, February
-
TPC Benchmark W (Web Commerce) Specification. Transaction Processing Performance Council, San Jose, CA, 1.8 edition, February 2000.
-
(2000)
TPC Benchmark W (Web Commerce) Specification
-
-
-
35
-
-
84904097779
-
-
Transaction Processing Performance Council, San Jose, CA, 5.11 edition, February
-
TPC Benchmark C Specification. Transaction Processing Performance Council, San Jose, CA, 5.11 edition, February 2010.
-
(2010)
TPC Benchmark C Specification
-
-
-
36
-
-
84888352157
-
Making information flow explicit in HiStar
-
USENIX
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières. Making information flow explicit in HiStar. In Proc. OSDI, Berkeley, CA, 2006. USENIX.
-
Proc. OSDI, Berkeley, CA, 2006
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
|