-
3
-
-
85092623905
-
-
Adobe Systems Inc. Jan
-
Adobe Systems Inc. LiveCycle Rights Management. http://www.adobe.com/products/livecycle/rightsmanagement/, Jan. 2011.
-
(2011)
LiveCycle Rights Management
-
-
-
5
-
-
4444265683
-
Xen and the Art of Virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. In SOSP, 2003.
-
(2003)
SOSP
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
6
-
-
63149115968
-
Flexible Hardware Acceleration for Instruction-Grain Lifeguards
-
S. Chen, M. Kozuch, P. B. Gibbons, M. Ryan, T. Strigkos, T. C. Mowry, O. Ruwase, E. Vlachos, B. Falsafi, and V. Ramachandran. Flexible Hardware Acceleration for Instruction-Grain Lifeguards. IEEE Micro Magazine, 29, 2009.
-
(2009)
IEEE Micro Magazine
, vol.29
-
-
Chen, S.1
Kozuch, M.2
Gibbons, P. B.3
Ryan, M.4
Strigkos, T.5
Mowry, T. C.6
Ruwase, O.7
Vlachos, E.8
Falsafi, B.9
Ramachandran, V.10
-
7
-
-
67650799825
-
Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems
-
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. K. Ports. Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems. In ASPLOS, 2008.
-
(2008)
ASPLOS
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E. C.3
Subrahmanyam, P.4
Waldspurger, C. A.5
Boneh, D.6
Dwoskin, J.7
Ports, D. R. K.8
-
8
-
-
35348907867
-
Raksha: A Flexible Information Flow Architecture for Software Security
-
M. Dalton, H. Kannan, and C. Kozyrakis. Raksha: A Flexible Information Flow Architecture for Software Security. In ISCA, 2007.
-
(2007)
ISCA
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
9
-
-
84943385246
-
The Transmeta Code Morphing Software: Using Speculation, Recovery, and Adaptive Retranslation to Address Real-Life Challenges
-
J. C. Dehnert, B. K. Grant, J. P. Banning, R. Johnson, T. Kistler, A. Klaiber, and J. Mattson. The Transmeta Code Morphing Software: Using Speculation, Recovery, and Adaptive Retranslation to Address Real-Life Challenges. In CGO, 2003.
-
(2003)
CGO
-
-
Dehnert, J. C.1
Grant, B. K.2
Banning, J. P.3
Johnson, R.4
Kistler, T.5
Klaiber, A.6
Mattson, J.7
-
10
-
-
50249086141
-
Differential Privacy
-
C. Dwork. Differential Privacy. In ICALP, 2006.
-
(2006)
ICALP
-
-
Dwork, C.1
-
11
-
-
84885664275
-
Labels and Event Processes in the Asbestos Operating System
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and Event Processes in the Asbestos Operating System. In SOSP, 2005.
-
(2005)
SOSP
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
12
-
-
85092675521
-
-
EMC Corp. Jan
-
EMC Corp. Documentum Informaton Rights Management. http://www.emc.com/products/detail/software/information-rights-management.htm, Jan. 2011.
-
(2011)
Documentum Informaton Rights Management
-
-
-
13
-
-
84857354215
-
-
Technical Report UCB/EECS-2010-92, UC Berkeley, June
-
A. Ermolinskiy, S. Katti, S. Shenker, L. Fowler, and M. McCauley. Towards Practical Taint Tracking. Technical Report UCB/EECS-2010-92, UC Berkeley, June 2010.
-
(2010)
Towards Practical Taint Tracking
-
-
Ermolinskiy, A.1
Katti, S.2
Shenker, S.3
Fowler, L.4
McCauley, M.5
-
14
-
-
34748845128
-
Practical Taint-Based Protection using Demand Emulation
-
A. Ho, M. Fetterman, C. Clark, A. Warfield, and S. Hand. Practical Taint-Based Protection using Demand Emulation. In EuroSys, 2006.
-
(2006)
EuroSys
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
16
-
-
70449976325
-
Decoupling Dynamic Information Flow Tracking with a Dedicated Coprocessor
-
H. Kannan, M. Dalton, and C. Kozyrakis. Decoupling Dynamic Information Flow Tracking with a Dedicated Coprocessor. In DSN, 2009.
-
(2009)
DSN
-
-
Kannan, H.1
Dalton, M.2
Kozyrakis, C.3
-
17
-
-
57749192483
-
Information Flow Control for Standard OS Abstractions
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information Flow Control for Standard OS Abstractions. In SOSP, 2007.
-
(2007)
SOSP
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M. F.5
Kohler, E.6
Morris, R.7
-
18
-
-
57349180506
-
Quantitative Information Flow as Network Flow Capacity
-
S. McCamant and M. D. Ernst. Quantitative Information Flow as Network Flow Capacity. In PLDI, 2008.
-
(2008)
PLDI
-
-
McCamant, S.1
Ernst, M. D.2
-
19
-
-
77955186544
-
TrustVisor: Efficient TCB Reduction and Attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB Reduction and Attestation. In IEEE Security and Privacy, 2010.
-
(2010)
IEEE Security and Privacy
-
-
McCune, J. M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
20
-
-
80052414760
-
-
Microsoft Corp. Jan
-
Microsoft Corp. Windows Rights Management Services. http://www.microsoft.com/windowsserver2008/en/us/ad-rms-overview.aspx, Jan. 2011.
-
(2011)
Windows Rights Management Services
-
-
-
22
-
-
77952255139
-
A Real System Evaluation of Hardware Atomicity for Software Speculation
-
N. Neelakantam, D. R. Ditzel, and C. Zilles. A Real System Evaluation of Hardware Atomicity for Software Speculation. In ASPLOS, 2010.
-
(2010)
ASPLOS
-
-
Neelakantam, N.1
Ditzel, D. R.2
Zilles, C.3
-
25
-
-
70450227330
-
Laminar: Practical Fine-Grained Decentralized Information Flow Control
-
I. Roy, D. E. Porter, M. D. Bond, K. S. McKinley, and E. Witchel. Laminar: Practical Fine-Grained Decentralized Information Flow Control. In PLDI, 2009.
-
(2009)
PLDI
-
-
Roy, I.1
Porter, D. E.2
Bond, M. D.3
McKinley, K. S.4
Witchel, E.5
-
26
-
-
70349160649
-
Pointless Tainting?: Evaluating the Practicality of Pointer Tainting
-
A. Slowinska and H. Bos. Pointless Tainting?: Evaluating the Practicality of Pointer Tainting. In EuroSys, 2009.
-
(2009)
EuroSys
-
-
Slowinska, A.1
Bos, H.2
-
27
-
-
85069458084
-
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable
-
R. Ta-Min, L. Litty, and D. Lie. Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable. In OSDI, 2006.
-
(2006)
OSDI
-
-
Ta-Min, R.1
Litty, L.2
Lie, D.3
-
29
-
-
1642406477
-
Scale and Performance in the Denali Isolation Kernel
-
A. Whitaker, M. Shaw, and S. D. Gribble. Scale and Performance in the Denali Isolation Kernel. In OSDI, 2002.
-
(2002)
OSDI
-
-
Whitaker, A.1
Shaw, M.2
Gribble, S. D.3
-
31
-
-
85038810709
-
Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks. In USENIX Security, 2006.
-
(2006)
USENIX Security
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
33
-
-
77952354362
-
Neon: System Support for Derived Data Management
-
Q. Zhang, J. McCullough, J. Ma, N. Schear, M. Vrable, A. Vahdat, A. C. Snoeren, G. M. Voelker, and S. Savage. Neon: System Support for Derived Data Management. In VEE, 2010.
-
(2010)
VEE
-
-
Zhang, Q.1
McCullough, J.2
Ma, J.3
Schear, N.4
Vrable, M.5
Vahdat, A.6
Snoeren, A. C.7
Voelker, G. M.8
Savage, S.9
|