228 papers:
- DAC-2015-KoJKLS #design #guidelines
- Guidelines to design parity protected write-back L1 data cache (YK, RJ, YK, KL, AS), p. 6.
- SANER-2015-ZekanST #web
- Protecting web applications via Unicode extension (BZ, MS, VT), pp. 419–428.
- CHI-2015-LugerURG #design #game studies #process #using
- Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process (EL, LU, TR, MG), pp. 457–466.
- CSCW-2015-LiCYH #online
- Massive Open Online Proctor: Protecting the Credibility of MOOCs certificates (XL, KmC, YY, AGH), pp. 1129–1137.
- CAiSE-2015-AbubahiaC #approach #clustering
- A Clustering Approach for Protecting GIS Vector Data (AA, MC), pp. 133–147.
- ICEIS-v3-2015-Piedrabuena0R #data transformation
- Enforcing Data Protection Regulations within e-Government Master Data Management Systems (FP, LG, RR), pp. 316–321.
- KDD-2015-ArlorioCLLP #assessment #authentication #data mining #mining
- Exploiting Data Mining for Authenticity Assessment and Protection of High-Quality Italian Wines from Piedmont (MA, JDC, GL, ML, LP), pp. 1671–1680.
- SAC-2015-BraunPPJ #adaptation #named #web
- LogSec: adaptive protection for the wild wild web (BB, KP, JP, MJ), pp. 2149–2156.
- SAC-2015-EllouzeRB #energy
- Energy harvesting based protection of border surveillance systems (NE, SR, NB), pp. 621–626.
- SAC-2015-HuangSZSXD #privacy #pseudo
- A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs (JH, MS, SZ, YS, CCX, QD), pp. 688–694.
- ASPLOS-2015-ColpZGSLRSW #memory management #smarttech
- Protecting Data on Smartphones and Tablets from Memory Attacks (PC, JZ, JG, SS, EdL, HR, SS, AW), pp. 177–189.
- ASPLOS-2015-HicksSKS #debugging #lightweight #named #runtime #specification
- SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs (MH, CS, STK, JMS), pp. 517–529.
- DAC-2014-CocchiBCW #hardware #integration
- Circuit Camouflage Integration for Hardware IP Protection (RPC, JPB, LWC, BJW), p. 5.
- DAC-2014-DaviKS #control flow #embedded #fine-grained #performance #towards
- Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation (LD, PK, ARS), p. 6.
- DAC-2014-RaoEST #multi #using
- Protecting SRAM-based FPGAs Against Multiple Bit Upsets Using Erasure Codes (PMBR, ME, RS, MBT), p. 6.
- DATE-2014-HamdiouiDNSBT #hardware
- Hacking and protecting IC hardware (SH, JLD, GDN, FS, GvB, MT), pp. 1–7.
- DATE-2014-KufelWHAWM #embedded
- Clock-modulation based watermark for protection of embedded processors (JK, PRW, SH, BMAH, PNW, JM), pp. 1–6.
- VLDB-2014-LiLWB #in the cloud #performance #privacy #query
- Fast Range Query Processing with Strong Privacy Protection for Cloud Computing (RL, AXL, ALW, BB), pp. 1953–1964.
- VLDB-2014-ToGS #crowdsourcing #framework #privacy
- A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing (HT, GG, CS), pp. 919–930.
- FM-2014-ButinM #analysis
- Log Analysis for Data Protection Accountability (DB, DLM), pp. 163–178.
- CHI-2014-LucaHZMSHS #authentication #smarttech
- Now you see me, now you don’t: protecting smartphone authentication from shoulder surfers (ADL, MH, EvZ, MEM, BES, HH, MS), pp. 2937–2946.
- HCI-AS-2014-Kawecka-EndlerM #enterprise #process
- Humanization of Work and Environmental Protection in Activity of Enterprise (AKE, BM), pp. 700–709.
- AdaEurope-2014-BurgstallerB #ada #algebra #source code #static analysis
- Kronecker Algebra for Static Analysis of Ada Programs with Protected Objects (BB, JB), pp. 27–42.
- CIKM-2014-SongG #difference #named #privacy #query
- Aroma: A New Data Protection Method with Differential Privacy and Accurate Query Answering (CS, TG), pp. 1569–1578.
- ICPR-2014-Gomez-BarreroRGFB #adaptation
- Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters (MGB, CR, JG, JF, CB), pp. 4483–4488.
- ICPR-2014-InaiPFFU #privacy
- Selective Concealment of Characters for Privacy Protection (KI, MP, VF, YF, SU), pp. 333–338.
- ICPR-2014-ZhangLNT #privacy
- Anonymous Camera for Privacy Protection (YZ, YL, HN, RiT), pp. 4170–4175.
- KMIS-2014-MikhaylovZFS #development
- Development of the Protection System Against Malicious Software (DM, AZ, MF, ASS), pp. 161–170.
- SAC-2014-BackesGLL
- X-pire 2.0: a user-controlled expiration date and copy protection mechanism (MB, SG, SL, SL), pp. 1633–1640.
- SAC-2014-LabdaMS #modelling #privacy #process
- Modeling of privacy-aware business processes in BPMN to protect personal data (WL, NM, PS), pp. 1399–1405.
- ASPLOS-2014-CriswellDA #operating system
- Virtual ghost: protecting applications from hostile operating systems (JC, ND, VSA), pp. 81–96.
- ASPLOS-2014-MenychtasSS #performance #scheduling
- Disengaged scheduling for fair, protected access to fast computational accelerators (KM, KS, MLS), pp. 301–316.
- ASPLOS-2014-RuwaseKGM #approach #hardware #named
- Guardrail: a high fidelity approach to protecting hardware devices from buggy drivers (OR, MAK, PBG, TCM), pp. 655–670.
- HPCA-2014-ElwellRAP #architecture #memory management
- A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks (JE, RR, NBAG, DP), pp. 201–212.
- HPCA-2014-PalframanKL #fault
- Precision-aware soft error protection for GPUs (DJP, NSK, MHL), pp. 49–59.
- HPCA-2014-WangFS #memory management
- Timing channel protection for a shared memory controller (YW, AF, GES), pp. 225–236.
- OSDI-2014-BelayPKGKB #latency #named #operating system #throughput
- IX: A Protected Dataplane Operating System for High Throughput and Low Latency (AB, GP, AK, SG, CK, EB), pp. 49–65.
- OSDI-2014-StefanYMRHKM #javascript
- Protecting Users by Confining JavaScript with COWL (DS, EZY, PM, AR, DH, BK, DM), pp. 131–146.
- QoSA-2013-YuanMSGG #architecture #self
- Architecture-based self-protecting software systems (EY, SM, BRS, DG, JG), pp. 33–42.
- DAC-2013-ChandrikakuttyUTW #hardware #monitoring #network
- High-performance hardware monitors to protect network processors from data plane attacks (HC, DU, RT, TW), p. 6.
- DATE-2013-BayrakVRNBI
- An EDA-friendly protection scheme against side-channel attacks (AGB, NV, FR, DN, PB, PI), pp. 410–415.
- DATE-2013-GuoWLLLC #named
- DA-RAID-5: a disturb aware data protection technique for NAND flash storage systems (JG, WW, YZ, SL, HL, YC), pp. 380–385.
- DATE-2013-GuoYZC #hybrid #low cost
- Low cost power failure protection for MLC NAND flash storage systems with PRAM/DRAM hybrid buffer (JG, JY, YZ, YC), pp. 859–864.
- DATE-2013-ManiatakosMM #array #memory management #optimisation
- AVF-driven parity optimization for MBU protection of in-core memory arrays (MM, MKM, YM), pp. 1480–1485.
- DATE-2013-NikolaouSNOI #array #memory management #question
- Memory array protection: check on read or check on write? (PN, YS, LN, EÖ, SI), pp. 214–219.
- VLDB-2013-XueZZXYTJZ #named #predict #privacy
- DesTeller: A System for Destination Prediction Based on Trajectories with Privacy Protection (AYX, RZ, YZ, XX, JY, YT), pp. 1198–1201.
- ICPC-2013-BasileC #towards
- Towards a unified software attack model to assess software protections (CB, MC), pp. 219–222.
- CHI-2013-Erete #perspective
- Protecting the home: exploring the roles of technology and citizen activism from a burglar’s perspective (SLE), pp. 2507–2516.
- CIKM-2013-ZhangLL #performance #privacy #robust #streaming
- An efficient and robust privacy protection technique for massive streaming choice-based information (JZ, XL, YL), pp. 1169–1172.
- SAC-2013-ImmichCC #adaptation #fault
- Adaptive video-aware FEC-based mechanism with unequal error protection scheme (RI, EC, MC), pp. 981–988.
- SAC-2013-JangJHJKJ #android
- Protecting Android applications with steganography-based software watermarking (JJ, HJ, JH, JJ, DK, SKJ), pp. 1657–1658.
- SPLC-2013-ClementsKSW #strict
- A PLE-based auditing method for protecting restricted content in derived products (PCC, CWK, JS, AW), pp. 218–226.
- HPCA-2013-KayaalpSNPA #architecture #named #reuse
- SCRAP: Architecture for signature-based protection from Code Reuse Attacks (MK, TS, JN, DP, NBAG), pp. 258–269.
- HPCA-2013-XiaLC #architecture #physics #virtual machine
- Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks (YX, YL, HC), pp. 246–257.
- LCTES-2013-KhudiaM #control flow #low cost #using
- Low cost control flow protection using abstract control signatures (DSK, SAM), pp. 3–12.
- DATE-2012-BeaumontHN #architecture #execution #hardware #replication #security #using
- SAFER PATH: Security architecture using fragmented execution and replication for protection against trojaned hardware (MRB, BDH, TN), pp. 1000–1005.
- CHI-2012-MerrittM
- Protecting artificial team-mates: more seems like less (TRM, KM), pp. 2793–2802.
- CIKM-2012-VlachosWS #clustering
- Right-protected data publishing with hierarchical clustering preservation (MV, AW, JS), pp. 654–663.
- ICPR-2012-CoronaTG #classification #multi #named #web #web service
- SuStorID: A multiple classifier system for the protection of web services (IC, RT, GG), pp. 2375–2378.
- RE-2012-SalehiePOAN #adaptation #runtime #security
- Requirements-driven adaptive security: Protecting variable assets at runtime (MS, LP, IO, RA, BN), pp. 111–120.
- SAC-2012-HuaS #kernel #lightweight #memory management #named
- Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation (JH, KS), pp. 1470–1477.
- SAC-2012-WangYLQG
- Hypervisor-based protection of sensitive files in a compromised system (JW, MY, BL, ZQ, HG), pp. 1765–1770.
- LCTES-2012-KhudiaWM #embedded #fault #performance #using
- Efficient soft error protection for commodity embedded microprocessors using profile information (DSK, GW, SAM), pp. 99–108.
- OSDI-2012-DunnLJKSXSW #privacy
- Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels (AMD, MZL, SJ, SK, MS, YX, VS, EW), pp. 61–75.
- OSDI-2012-GiffinLSTMMR #named #privacy #web
- Hails: Protecting Data Privacy in Untrusted Web Applications (DBG, AL, DS, DT, DM, JCM, AR), pp. 47–60.
- DAC-2011-YangBC #detection #embedded #energy #fault #using
- Energy-efficient MIMO detection using unequal error protection for embedded joint decoding system (YSY, PB, GC), pp. 579–584.
- DATE-2011-NicolaidisBZ
- Eliminating speed penalty in ECC protected memories (MN, TB, NEZ), pp. 1614–1619.
- ICDAR-2011-DuL #identification #privacy
- Preservative License Plate De-identification for Privacy Protection (LD, HL), pp. 468–472.
- SIGMOD-2011-GaoYJZWY #distance #privacy
- Neighborhood-privacy protected shortest distance computing in cloud (JG, JXY, RJ, JZ, TW, DY), pp. 409–420.
- VLDB-2011-BlausteinCSAR #graph
- Surrogate Parenthood: Protected and Informative Graphs (BTB, AC, LS, MDA, AR), pp. 518–527.
- ICEIS-v3-2011-ZhuL11a #automation #modelling #simulation
- Modeling and Simulation of the Automatic Train Protection in WLAN based CBTC Systems (XZ, JL), pp. 449–458.
- CIKM-2011-BaigLLW #independence #multi #privacy
- Cloning for privacy protection in multiple independent data publications (MMB, JL, JL, HW), pp. 885–894.
- CIKM-2011-MajumdarRIV #information management #privacy #quality
- Privacy protected knowledge management in services with emphasis on quality data (DM, RC, SI, KV), pp. 1889–1894.
- KDD-2011-LeeOYK #privacy #semantics #using
- Protecting location privacy using location semantics (BL, JO, HY, JK), pp. 1289–1297.
- SIGIR-2011-ChenBSCG #named #performance #personalisation #privacy #web
- UPS: efficient privacy protection in personalized web search (GC, HB, LS, KC, YG), pp. 615–624.
- SAC-2011-ChiangH #embedded #operating system
- Supporting dynamic update and resource protection in an embedded operating system (MLC, HYH), pp. 616–620.
- SAC-2011-JinL #performance
- Efficient traitor tracing for clone attack in content protection (HJ, JBL), pp. 1544–1549.
- SAC-2011-JohnsBSP #reliability
- Reliable protection against session fixation attacks (MJ, BB, MS, JP), pp. 1531–1537.
- SAC-2011-LinXYYZGQCG #anti #hardware #named #using
- SPAD: software protection through anti-debugging using hardware virtualization (QL, MX, MY, PY, MZ, SG, ZQ, KC, HG), pp. 623–624.
- SAC-2011-RahmanHA11a #named #privacy #quantifier #towards
- ProQuPri: towards anonymity protection with privacy quantification for context-aware applications (FR, MEH, SIA), pp. 453–454.
- SAC-2011-ZhuYXLYGQLCG #monitoring #named #security
- VASP: virtualization assisted security monitor for cross-platform protection (MZ, MY, MX, BL, PY, SG, ZQ, LL, YC, HG), pp. 554–559.
- HPCA-2011-YoonMCRJE #fault #memory management #named
- FREE-p: Protecting non-volatile memory against both hard and soft errors (DHY, NM, JC, PR, NPJ, ME), pp. 466–477.
- SOSP-2011-PopaRZB #named #query
- CryptDB: protecting confidentiality with encrypted query processing (RAP, CMSR, NZ, HB), pp. 85–100.
- SOSP-2011-ZhangCCZ #multitenancy #named #virtual machine
- CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization (FZ, JC, HC, BZ), pp. 203–216.
- CASE-2010-KimHS #outsourcing
- Risk-averse outsourcing strategies for optimal intellectual property protection (BK, KH, KS), pp. 978–983.
- DATE-2010-NeukirchnerSSE #self
- A software update service with self-protection capabilities (MN, SS, HS, RE), pp. 903–908.
- VLDB-2010-PangDX #privacy #query
- Embellishing Text Search Queries To Protect User Privacy (HP, XD, XX), pp. 598–607.
- VLDB-2011-YuanCY10 #network #personalisation #privacy #social
- Personalized Privacy Protection in Social Networks (MY, LC, PSY), pp. 141–150.
- ICPR-2010-FengY #analysis
- Binary Discriminant Analysis for Face Template Protection (YCF, PCY), pp. 874–877.
- ICPR-2010-OudaTN
- Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes (OO, NT, TN), pp. 882–885.
- ICPR-2010-WangYLZLCT #distance #novel
- A Novel Fingerprint Template Protection Scheme Based on Distance Projection Coding (RW, XY, XL, SZ, PL, KC, JT), pp. 886–889.
- OOPSLA-2010-MatsakisG #type system
- A time-aware type system for data-race protection and guaranteed initialization (NDM, TRG), pp. 634–651.
- ASPLOS-2010-HuangDS #multi #named #performance
- Orthrus: efficient software integrity protection on multi-cores (RCH, DYD, GES), pp. 371–384.
- LCTES-2010-ShrivastavaLJ #embedded #equation #fault
- Cache vulnerability equations for protecting data in embedded processor caches from soft errors (AS, JL, RJ), pp. 143–152.
- OSDI-2010-TangMK #operating system #trust
- Trust and Protection in the Illinois Browser Operating System (ST, HM, STK), pp. 17–32.
- VMCAI-2010-Giacobazzi #abstract interpretation
- Abstract Interpretation-Based Protection (RG), pp. 23–24.
- DATE-2009-GhermanECSB
- System-level hardware-based protection of memories against soft-errors (VG, SE, MC, NS, YB), pp. 1222–1225.
- DATE-2009-SuCGSP #memory management #named #operating system
- SecBus: Operating System controlled hierarchical page-based memory bus protection (LS, SC, PG, CS, RP), pp. 570–573.
- CHI-2009-PinelleBNM #coordination #evaluation
- An evaluation of coordination techniques for protecting objects and territories in tabletop groupware (DP, MB, MAN, RLM), pp. 2129–2138.
- DHM-2009-YangDZ #bibliography #modelling #perspective
- Human Head Modeling and Personal Head Protective Equipment: A Literature Review (J(Y, JD, ZZ), pp. 661–670.
- HIMI-II-2009-MinC #approach #generative #personalisation #privacy
- An Interactive-Content Technique Based Approach to Generating Personalized Advertisement for Privacy Protection (WHM, YGC), pp. 185–191.
- CIKM-2009-LeeLLZ #privacy
- Navigational path privacy protection: navigational path privacy protection (KCKL, WCL, HVL, BZ), pp. 691–700.
- SAC-2009-CeccatoTPM #orthogonal
- Remote software protection by orthogonal client replacement (MC, PT, MDP, AM), pp. 448–455.
- SAC-2009-FungCDX #privacy
- Privacy protection for RFID data (BCMF, MC, BCD, HX), pp. 1528–1535.
- SAC-2009-MonjurA #framework #privacy #towards
- Towards a landmark influence framework to protect location privacy (MM, SIA), pp. 219–220.
- ESEC-FSE-2009-VarmaSS #memory management
- Backward-compatible constant-time exception-protected memory (PV, RKS, HJS), pp. 71–80.
- PPoPP-2009-AbadiHM #hardware #memory management #off the shelf #transaction #using
- Transactional memory with strong atomicity using off-the-shelf memory protection hardware (MA, TH, MM), pp. 185–196.
- DAC-2008-RoyKM #hardware
- Protecting bus-based hardware IP by secret sharing (JAR, FK, ILM), pp. 846–851.
- DATE-2008-GizopoulosRMS #case study #fault
- Soft Errors: System Effects, Protection Techniques and Case Studies (DG, KR, SM, PS).
- DATE-2008-WapplerM
- Software Protection Mechanisms for Dependable Systems (UW, MM), pp. 947–952.
- ICALP-C-2008-CanettiEGL #how
- How to Protect Yourself without Perfect Shredding (RC, DE, SG, DYL), pp. 511–523.
- ICEIS-DISI-2008-VoS #component #framework
- A Framework for Protecting EJB Applications from Malicious Components (HV, MS), pp. 264–269.
- CIKM-2008-PanXM #mobile #privacy
- Protecting location privacy against location-dependent attack in mobile services (XP, JX, XM), pp. 1475–1476.
- ASPLOS-2008-ChenGLSWBDP #approach #named #operating system
- Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems (XC, TG, ECL, PS, CAW, DB, JSD, DRKP), pp. 2–13.
- HPCA-2008-RogersYCPS #distributed #memory management #multi
- Single-level integrity and confidentiality protection for distributed shared memory multiprocessors (BR, CY, SC, MP, YS), pp. 161–172.
- TestCom-FATES-2008-ShuCLLSL #framework #named #network #paradigm #security #testing
- VCSTC: Virtual Cyber Security Testing Capability — An Application Oriented Paradigm for Network Infrastructure Protection (GS, DC, ZL, NL, LS, DL), pp. 119–134.
- ASE-2007-ClauseDOP #effectiveness #memory management #using
- Effective memory protection using dynamic tainting (JAC, ID, AO, MP), pp. 284–292.
- CASE-2007-WeiJL #automation #industrial #on the
- On Protecting Industrial Automation and Control Systems against Electronic Attacks (DW, MAJ, YL), pp. 176–181.
- DAC-2007-KumarSCKS #embedded #memory management
- A System For Coarse Grained Memory Protection In Tiny Embedded Processors (RK, AS, AC, EK, MBS), pp. 218–223.
- DATE-2007-LeveugleAMTMMFRT #evaluation #fault #modelling
- Experimental evaluation of protections against laser-induced faults and consequences on fault modeling (RL, AA, VM, ET, PM, CM, NF, JBR, AT), pp. 1587–1592.
- DATE-2007-MehraraASCBA #fault #low cost
- Low-cost protection for SER upsets and silicon defects (MM, MA, SS, KC, VB, TMA), pp. 1146–1151.
- CSMR-2007-MerloLA #automation #injection #php
- Automated Protection of PHP Applications Against SQL-injection Attacks (EM, DL, GA), pp. 191–202.
- SCAM-2007-MolinaS #approximate #open source #performance #source code #using
- Fast Approximate Matching of Programs for Protecting Libre/Open Source Software by Using Spatial Indexes (AJMM, TS), pp. 111–122.
- CHI-2007-KumaraguruRACHN #design #email #embedded #evaluation #people
- Protecting people from phishing: the design and evaluation of an embedded training email system (PK, YR, AA, LFC, JIH, EN), pp. 905–914.
- DHM-2007-HuDYY #3d
- Investigation on Ergonomics Characteristics of Protective Clothing Based on Capture of Three-Dimensional Body Movements (HH, LD, CY, XY), pp. 856–864.
- HCI-AS-2007-ZhangOD #automation #communication #evaluation #performance
- Performance Evaluation for Automatic Protection Switching in a CDMA-TDD Wireless Communication System (LZ, HO, TD), pp. 1200–1209.
- SIGIR-2007-JiangSL #privacy
- Protecting source privacy in federated search (WJ, LS, JL), pp. 761–762.
- SAC-2007-LoukidesS #privacy
- Capturing data usefulness and privacy protection in K-anonymisation (GL, JS), pp. 370–374.
- SAC-2007-ZhouHP #database #image #using
- An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image (XZ, MH, ZP), pp. 254–258.
- SOSP-2007-WangFHJ #abstraction #communication #web
- Protection and communication abstractions for web browsers in MashupOS (HJW, XF, JH, CJ), pp. 1–16.
- CASE-2006-CvetanovicCAGB #component #novel
- A Novel Protective Cover in Assembling of Micro Components in a SEM Chamber (AC, AC, DA, IG, WB), pp. 242–246.
- DAC-2006-StojanovicBDW #effectiveness #implementation #queue
- A cost-effective implementation of an ECC-protected instruction queue for out-of-order microprocessors (VS, RIB, JD, RW), pp. 705–708.
- DATE-2006-Kim #fault
- Area-efficient error protection for caches (SK), pp. 1282–1287.
- DATE-DF-2006-AkselrodAA #architecture #debugging #framework #independence #multi #security
- Platform independent debug port controller architecture with security protection for multi-processor system-on-chip ICs (DA, AA, YA), pp. 30–35.
- FASE-2006-KochP #self
- Engineering Self-protection for Autonomous Systems (MK, KP), pp. 33–47.
- ICPR-v4-2006-LinHH #embedded #video
- An embedded watermark technique in video for copyright protection (YRL, HYH, WHH), pp. 795–798.
- POPL-2006-LuP #encapsulation #representation
- Protecting representation with effect encapsulation (YL, JP), pp. 359–371.
- ASPLOS-2006-KharbutliJSVP
- Comprehensively and efficiently protecting the heap (MK, XJ, YS, GV, MP), pp. 207–218.
- ASPLOS-2006-ShyamCPBA #fault #low cost #pipes and filters
- Ultra low-cost defect protection for microprocessor pipelines (SS, KC, SP, VB, TMA), pp. 73–82.
- HPCA-2006-ShiFGLZY #architecture #in memory #memory management #named #security
- InfoShield: a security architecture for protecting information usage in memory (WS, JBF, GG, HHSL, YZ, JY), pp. 222–231.
- HPDC-2006-BaiardiRMV #monitoring #policy #virtual machine
- Policy Driven Virtual Machine Monitor for Protected Grids (FB, LR, PM, AV), pp. 313–316.
- CBSE-2005-Beznosov #architecture #case study #component #design #experience #implementation #web #web service
- Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services (KB), pp. 337–352.
- DAC-2005-NieKT #incremental #layout
- A watermarking system for IP protection by a post layout incremental router (TN, TK, MT), pp. 218–221.
- ICEIS-v1-2005-Mattsson #database #encryption #enterprise #implementation
- A Practical Implementation of Transparent Encryption and Separation of Duties in Enterprise Databases — Protection against External and Internal Attacks on Databases (UTM), pp. 146–153.
- SAC-2005-Hutchinson #future of #information management
- The future of systematic information protection (BH), p. 1.
- SAC-2005-PowerSPS #query
- Protecting sensitive patient data via query modification (DJP, MS, EAP, ACS), pp. 224–230.
- SOSP-2005-WitchelRA #linux #memory management #named #using
- Mondrix: memory isolation for linux using mondriaan memory protection (EW, JR, KA), pp. 31–44.
- DATE-v1-2004-ZambrenoCSN #flexibility #hardware #using
- Flexible Software Protection Using Hardware/Software Codesign Techniques (JZ, ANC, RS, BN), pp. 636–641.
- VLDB-2004-SionAP
- Resilient Rights Protection for Sensor Streams (RS, MJA, SP), pp. 732–743.
- ICPR-v4-2004-KitaharaKH #privacy
- Stealth Vision for Protecting Privacy (IK, KK, NH), pp. 404–407.
- OOPSLA-2004-Fong #verification #virtual machine
- Pluggable verification modules: an extensible protection mechanism for the JVM (PWLF), pp. 404–418.
- SAC-2004-WaldmannSE #authentication
- Protected transmission of biometric user authentication data for oncard-matching (UW, DS, CE), pp. 425–430.
- ASPLOS-2004-ZhuangZP #framework #information management #named
- HIDE: an infrastructure for efficiently protecting information leakage on the address bus (XZ, TZ, SP), pp. 72–84.
- LCTES-2004-SaputraCBVKI #embedded
- Code protection for resource-constrained embedded devices (HS, GC, RRB, NV, MTK, MJI), pp. 240–248.
- DAC-2003-BeniniMMOPP #analysis #design #difference #energy
- Energy-aware design techniques for differential power analysis protection (LB, AM, EM, EO, FP, MP), pp. 36–41.
- SIGMOD-2003-SionAP #relational
- Rights Protection for Relational Data (RS, MJA, SP), pp. 98–109.
- FME-2003-AtiyaKW #semantics
- A Circus Semantics for Ravenscar Protected Objects (DAA, SK, JW), pp. 617–635.
- ICEIS-v1-2003-BarkerD #database #implementation
- Extended Protected Databases: A Practical Implementation (SB, PD), pp. 456–459.
- SAC-2003-TraoreK #collaboration
- A Protection Scheme for Collaborative Environments (IT, SK), pp. 331–337.
- ESEC-FSE-2003-YongH #c #pointer #source code
- Protecting C programs from attacks via invalid pointer dereferences (SHY, SH), pp. 307–316.
- RE-2002-AlvarezOP #quality #requirements #reuse
- Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection (JATÁ, AO, MP), pp. 95–103.
- ASPLOS-2002-WitchelCA #memory management
- Mondrian memory protection (EW, JC, KA), pp. 304–316.
- OSDI-2002-HawblitzelE #flexibility #java #named
- Luna: A Flexible Java Protection System (CH, TvE), pp. 391–401.
- CBSE-2001-PopovSRR #component
- Protective Wrapping of OTS Components (PP, LS, SR, AR), p. 8.
- DAC-2001-Qu #component #detection
- Publicly Detectable Techniques for the Protection of Virtual Components (GQ), pp. 474–479.
- DATE-2001-QuasemG #fault #simulation
- Exact fault simulation for systems on Silicon that protects each core’s intellectual property (MSQ, SKG), p. 804.
- DAC-2000-DalpassoBB #hardware
- Hardware/software IP protection (MD, AB, LB), pp. 593–596.
- AdaEurope-2000-WellingsJSKWM #ada #object-oriented #programming
- Object-Oriented Programming and Protected Objects in Ada 95 (AJW, BJ, BS, JK, TW, SM), pp. 16–28.
- ICSE-2000-KirschS #tutorial
- Intellectual property protection for software in the United States and Europe (tutorial session): the changing roles of patents and copyrights (GJK, YS), p. 827.
- OSDI-2000-StrunkGSSG #self
- Self-Securing Storage: Protecting Data in Compromised Systems (JDS, GRG, MLS, CANS, GRG), pp. 165–180.
- CL-2000-Barker #logic programming
- Data Protection by Logic Programming (SB), pp. 1300–1314.
- DAC-1999-HongP #behaviour #synthesis
- Behavioral Synthesis Techniques for Intellectual Property Protection (IH, MP), pp. 849–854.
- DAC-1999-LachMP #multi #robust
- Robust FPGA Intellectual Property Protection Through Multiple Small Watermarks (JL, WHMS, MP), pp. 831–836.
- AdaEurope-1999-LundqvistAM #ada #formal method
- A Formal Model of the Ada Ravenscar Tasking Profile; Protected Objects (KL, LA, SM), pp. 12–25.
- TOOLS-PACIFIC-1999-NobleCP #alias
- Object Ownership for Dynamic Alias Protection (JN, DGC, JP), pp. 176–187.
- SOSP-1999-ChiuehVP #performance #segmentation
- Integrating segmentation and paging protection for safe, efficient and transparent software extensions (TcC, GV, PP), pp. 140–153.
- DAC-1998-KahngLMMMPTWW
- Watermarking Techniques for Intellectual Property Protection (ABK, JL, WHMS, SM, ILM, MP, PT, HW, GW), pp. 776–781.
- CSMR-1998-JensenH #configuration management #reuse
- Protection Reconfiguration for Reusable Software (CDJ, DH), pp. 74–81.
- STOC-1998-GertnerIKM #information retrieval #privacy
- Protecting Data Privacy in Private Information Retrieval Schemes (YG, YI, EK, TM), pp. 151–160.
- ICALP-1998-Abadi
- Protection in Programming-Language Translations (MA), pp. 868–883.
- SIGAda-1998-KiddleW
- Extensible Protected Types (OPK, AJW), pp. 229–239.
- SIGAda-1998-LiBY #ada
- Transforming Ada Serving Tasks into Protected Objects (BL, BX, HY), pp. 240–245.
- SIGAda-1998-MacosM
- The Rendezvous is Dead — Long Live the Protected Object (DM, FM), pp. 287–293.
- ECOOP-1998-NobleVP #alias #flexibility
- Flexible Alias Protection (JN, JV, JP), pp. 158–185.
- OOPSLA-1998-ClarkePN #alias #flexibility
- Ownership Types for Flexible Alias Protection (DGC, JP, JN), pp. 48–64.
- HPCA-1998-MackenzieKFLLAK #performance
- Exploiting Two-Case Delivery for Fast Protected Messaging (KM, JK, MF, WL, VL, AA, MFK), pp. 231–242.
- TRI-Ada-1997-KaiserP #case study #implementation #reliability #resource management
- Comparing the Reliability Provided by Tasks or Protected Objects for Implementing a Resource Allocation Service: a Case Study (CK, JFPP), pp. 51–65.
- HPCA-1997-LimHPS #clustering #communication #performance
- Message Proxies for Efficient, Protected Communication on SMP Clusters (BHL, PH, PP, MS), pp. 116–127.
- STOC-1996-DworkLN #self
- Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version) (CD, JBL, MN), pp. 489–498.
- AdaEurope-1996-MundieFK #embedded #implementation
- Implementing Protected Types on Embedded Targets (DM, JF, EK), pp. 287–297.
- HPCA-1996-BlumrichDFL #interface #network
- Protected, User-Level DMA for the SHRIMP Network Interface (MAB, CD, EWF, KL), pp. 154–165.
- STOC-1995-BellareGG #encryption #incremental
- Incremental cryptography and application to virus protection (MB, OG, SG), pp. 45–56.
- DAC-1994-Fernandez #industrial
- Intellectual Property Protection in the EDA Industry (DSF), pp. 161–163.
- FME-1994-Simpson #automation #specification
- A Formal Specification of an Automatic Train Protection System (AS), pp. 602–617.
- SEKE-1994-ZhuHM #information management #testing
- Knowledge engineering helps testing protection software (HZ, PAVH, JHRM), pp. 116–123.
- ECOOP-1994-Hagimont #distributed #object-oriented
- Protection in the Guide Object-Oriented Distributed System (DH), pp. 280–298.
- TRI-Ada-1993-Nycum
- Protecting Intellectual Property Rights in Software (SHN), pp. 410–421.
- SOSP-1993-HoskingM #memory management #object-oriented
- Protection Traps and Alternatives for Memory Management of an Object-Oriented Language (ALH, JEBM), pp. 106–119.
- TRI-Ada-C-1992-Reed #ada #case study #experience #implementation
- Experiences in Implementing Ada 9X Protected Records and Requeue (PR), pp. 62–67.
- OOPSLA-1992-RichardsonSC #fine-grained #named #performance
- CACL: Efficient Fine-Grained Protection for Objects (JER, PMS, LFC), pp. 263–275.
- SOSP-WIP-1991-Druschel92 #architecture #composition #kernel #orthogonal #why
- Modularity and Protection are Orthogonal, or “Why µ-kernel Architectures are Flawed” (Abstract) (PD), p. 22.
- PODS-1991-MalvestutoMR #2d #information management #statistics
- Suppressing Marginal Cells to Protect Sensitive Information in a Two-Dimensional Statistical Table (FMM, MM, MR), pp. 252–258.
- VLDB-1991-SullivanS #data type #database #fault tolerance #using
- Using Write Protected Data Structures To Improve Software Fault Tolerance in Highly Available Database Management Systems (MS, MS), pp. 171–180.
- OOPSLA-1991-Hogg #alias #named #object-oriented
- Islands: Aliasing Protection in Object-Oriented Languages (JH), pp. 271–285.
- CAV-1991-BarbeauB #approach #fault #petri net #using #verification
- The Lotos Model of a Fault Protected System and its Verification Using a Petri Net Based Approach (MB, GvB), pp. 103–113.
- DAC-1989-SilvaGKN #version control
- Protection and Versioning for OCT (MJS, DG, RHK, RN), pp. 264–269.
- CHI-1989-Samuelson #user interface
- Protecting user interfaces through copyright: the debate (PS), pp. 97–104.
- STOC-1987-Goldreich #formal method #simulation #towards
- Towards a Theory of Software Protection and Simulation by Oblivious RAMs (OG), pp. 182–194.
- CADE-1984-MinkerP
- Applications of Protected Circumscription (JM, DP), pp. 414–425.
- VLDB-1982-Leiss #database #statistics
- Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise (ELL), pp. 189–196.
- ASPLOS-1982-Jones #design
- Systematic Protection Mechanism Design (DWJ), pp. 77–80.
- ASPLOS-1982-Wilkes #hardware #implementation #memory management
- Hardware Support for Memory Protection: Capability Implementations (MVW), pp. 107–116.
- SOSP-1981-Bishop
- Hierarchical Take-Grant Protection Systems (MB), pp. 109–122.
- SOSP-1979-BishopS #information management
- The Transfer of Information and Authority in a Protection System (MB, LS), pp. 45–54.
- VLDB-1978-HuberL #information management
- Information Protection by Method Base Systems (RH, PCL), pp. 420–426.
- ICSE-1978-Cook #memory management
- Measuring Memory Protection (DC), pp. 281–287.
- SIGMOD-1977-YuC #case study #database #statistics
- A Study on the Protection of Statistical Data Bases (CTY, FYLC), pp. 169–181.
- VLDB-1977-BancilhonS #database #relational
- Protection of Information in Relational Data Bases (FB, NS), pp. 494–500.
- SOSP-1977-NeedhamW
- The Cambridge CAP Computer and its Protection System (RMN, RDHW), pp. 1–10.
- SOSP-1977-Snyder #analysis #on the #synthesis
- On the Synthesis and Analysis of Protection Systems (LS), pp. 141–150.
- VLDB-1976-HartsonH #database #semantics
- A Semantic Model for Data Base Protection Languages (HRH, DKH), pp. 27–42.
- ICSE-1976-Voges #aspect-oriented #design #validation
- Aspects of Design, Test and Validation of the Software for a Computerized Reactor Protection System (UV), pp. 606–610.
- SOSP-1975-CohenJ #operating system
- Protection in the HYDRA Operating System (ESC, DJ), pp. 141–160.
- SOSP-1975-HarrisonRU #on the #operating system
- On Protection in Operating System (MAH, WLR, JDU), pp. 14–24.
- SOSP-1973-Saltzer #information management #multi
- Protection and the Control of Information Sharing in MULTICS (JHS), p. 119.
- SOSP-J-1973-SchroederS72 #architecture #hardware #implementation
- A Hardware Architecture for Implementing Protection Rings (MDS, JHS), pp. 157–170.
- SOSP-1971-SchroederS #architecture #hardware #implementation
- A Hardware Architecture for Implementing Protection Rings (Abstract) (MDS, JHS), pp. 42–54.
- SOSP-1967-Graham68 #information management
- Protection in an information processing utility (RMG), pp. 365–369.