BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
system (44)
data (31)
privaci (30)
base (28)
softwar (24)

Stem protect$ (all stems)

228 papers:

DACDAC-2015-KoJKLS #design #guidelines
Guidelines to design parity protected write-back L1 data cache (YK, RJ, YK, KL, AS), p. 6.
SANERSANER-2015-ZekanST #web
Protecting web applications via Unicode extension (BZ, MS, VT), pp. 419–428.
CHICHI-2015-LugerURG #design #game studies #process #using
Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process (EL, LU, TR, MG), pp. 457–466.
CSCWCSCW-2015-LiCYH #online
Massive Open Online Proctor: Protecting the Credibility of MOOCs certificates (XL, KmC, YY, AGH), pp. 1129–1137.
CAiSECAiSE-2015-AbubahiaC #approach #clustering
A Clustering Approach for Protecting GIS Vector Data (AA, MC), pp. 133–147.
ICEISICEIS-v3-2015-Piedrabuena0R #data transformation
Enforcing Data Protection Regulations within e-Government Master Data Management Systems (FP, LG, RR), pp. 316–321.
KDDKDD-2015-ArlorioCLLP #assessment #authentication #data mining #mining
Exploiting Data Mining for Authenticity Assessment and Protection of High-Quality Italian Wines from Piedmont (MA, JDC, GL, ML, LP), pp. 1671–1680.
SACSAC-2015-BraunPPJ #adaptation #named #web
LogSec: adaptive protection for the wild wild web (BB, KP, JP, MJ), pp. 2149–2156.
SACSAC-2015-EllouzeRB #energy
Energy harvesting based protection of border surveillance systems (NE, SR, NB), pp. 621–626.
SACSAC-2015-HuangSZSXD #privacy #pseudo
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs (JH, MS, SZ, YS, CCX, QD), pp. 688–694.
ASPLOSASPLOS-2015-ColpZGSLRSW #memory management #smarttech
Protecting Data on Smartphones and Tablets from Memory Attacks (PC, JZ, JG, SS, EdL, HR, SS, AW), pp. 177–189.
ASPLOSASPLOS-2015-HicksSKS #debugging #lightweight #named #runtime #specification
SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs (MH, CS, STK, JMS), pp. 517–529.
DACDAC-2014-CocchiBCW #hardware #integration
Circuit Camouflage Integration for Hardware IP Protection (RPC, JPB, LWC, BJW), p. 5.
DACDAC-2014-DaviKS #control flow #embedded #fine-grained #performance #towards
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation (LD, PK, ARS), p. 6.
DACDAC-2014-RaoEST #multi #using
Protecting SRAM-based FPGAs Against Multiple Bit Upsets Using Erasure Codes (PMBR, ME, RS, MBT), p. 6.
DATEDATE-2014-HamdiouiDNSBT #hardware
Hacking and protecting IC hardware (SH, JLD, GDN, FS, GvB, MT), pp. 1–7.
DATEDATE-2014-KufelWHAWM #embedded
Clock-modulation based watermark for protection of embedded processors (JK, PRW, SH, BMAH, PNW, JM), pp. 1–6.
VLDBVLDB-2014-LiLWB #in the cloud #performance #privacy #query
Fast Range Query Processing with Strong Privacy Protection for Cloud Computing (RL, AXL, ALW, BB), pp. 1953–1964.
VLDBVLDB-2014-ToGS #crowdsourcing #framework #privacy
A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing (HT, GG, CS), pp. 919–930.
FMFM-2014-ButinM #analysis
Log Analysis for Data Protection Accountability (DB, DLM), pp. 163–178.
CHICHI-2014-LucaHZMSHS #authentication #smarttech
Now you see me, now you don’t: protecting smartphone authentication from shoulder surfers (ADL, MH, EvZ, MEM, BES, HH, MS), pp. 2937–2946.
HCIHCI-AS-2014-Kawecka-EndlerM #enterprise #process
Humanization of Work and Environmental Protection in Activity of Enterprise (AKE, BM), pp. 700–709.
AdaEuropeAdaEurope-2014-BurgstallerB #ada #algebra #source code #static analysis
Kronecker Algebra for Static Analysis of Ada Programs with Protected Objects (BB, JB), pp. 27–42.
CIKMCIKM-2014-SongG #difference #named #privacy #query
Aroma: A New Data Protection Method with Differential Privacy and Accurate Query Answering (CS, TG), pp. 1569–1578.
ICPRICPR-2014-Gomez-BarreroRGFB #adaptation
Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters (MGB, CR, JG, JF, CB), pp. 4483–4488.
ICPRICPR-2014-InaiPFFU #privacy
Selective Concealment of Characters for Privacy Protection (KI, MP, VF, YF, SU), pp. 333–338.
ICPRICPR-2014-ZhangLNT #privacy
Anonymous Camera for Privacy Protection (YZ, YL, HN, RiT), pp. 4170–4175.
KMISKMIS-2014-MikhaylovZFS #development
Development of the Protection System Against Malicious Software (DM, AZ, MF, ASS), pp. 161–170.
SACSAC-2014-BackesGLL
X-pire 2.0: a user-controlled expiration date and copy protection mechanism (MB, SG, SL, SL), pp. 1633–1640.
SACSAC-2014-LabdaMS #modelling #privacy #process
Modeling of privacy-aware business processes in BPMN to protect personal data (WL, NM, PS), pp. 1399–1405.
ASPLOSASPLOS-2014-CriswellDA #operating system
Virtual ghost: protecting applications from hostile operating systems (JC, ND, VSA), pp. 81–96.
ASPLOSASPLOS-2014-MenychtasSS #performance #scheduling
Disengaged scheduling for fair, protected access to fast computational accelerators (KM, KS, MLS), pp. 301–316.
ASPLOSASPLOS-2014-RuwaseKGM #approach #hardware #named
Guardrail: a high fidelity approach to protecting hardware devices from buggy drivers (OR, MAK, PBG, TCM), pp. 655–670.
HPCAHPCA-2014-ElwellRAP #architecture #memory management
A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks (JE, RR, NBAG, DP), pp. 201–212.
HPCAHPCA-2014-PalframanKL #fault
Precision-aware soft error protection for GPUs (DJP, NSK, MHL), pp. 49–59.
HPCAHPCA-2014-WangFS #memory management
Timing channel protection for a shared memory controller (YW, AF, GES), pp. 225–236.
OSDIOSDI-2014-BelayPKGKB #latency #named #operating system #throughput
IX: A Protected Dataplane Operating System for High Throughput and Low Latency (AB, GP, AK, SG, CK, EB), pp. 49–65.
OSDIOSDI-2014-StefanYMRHKM #javascript
Protecting Users by Confining JavaScript with COWL (DS, EZY, PM, AR, DH, BK, DM), pp. 131–146.
QoSAQoSA-2013-YuanMSGG #architecture #self
Architecture-based self-protecting software systems (EY, SM, BRS, DG, JG), pp. 33–42.
DACDAC-2013-ChandrikakuttyUTW #hardware #monitoring #network
High-performance hardware monitors to protect network processors from data plane attacks (HC, DU, RT, TW), p. 6.
DATEDATE-2013-BayrakVRNBI
An EDA-friendly protection scheme against side-channel attacks (AGB, NV, FR, DN, PB, PI), pp. 410–415.
DATEDATE-2013-GuoWLLLC #named
DA-RAID-5: a disturb aware data protection technique for NAND flash storage systems (JG, WW, YZ, SL, HL, YC), pp. 380–385.
DATEDATE-2013-GuoYZC #hybrid #low cost
Low cost power failure protection for MLC NAND flash storage systems with PRAM/DRAM hybrid buffer (JG, JY, YZ, YC), pp. 859–864.
DATEDATE-2013-ManiatakosMM #array #memory management #optimisation
AVF-driven parity optimization for MBU protection of in-core memory arrays (MM, MKM, YM), pp. 1480–1485.
DATEDATE-2013-NikolaouSNOI #array #memory management #question
Memory array protection: check on read or check on write? (PN, YS, LN, , SI), pp. 214–219.
VLDBVLDB-2013-XueZZXYTJZ #named #predict #privacy
DesTeller: A System for Destination Prediction Based on Trajectories with Privacy Protection (AYX, RZ, YZ, XX, JY, YT), pp. 1198–1201.
ICPCICPC-2013-BasileC #towards
Towards a unified software attack model to assess software protections (CB, MC), pp. 219–222.
CHICHI-2013-Erete #perspective
Protecting the home: exploring the roles of technology and citizen activism from a burglar’s perspective (SLE), pp. 2507–2516.
CIKMCIKM-2013-ZhangLL #performance #privacy #robust #streaming
An efficient and robust privacy protection technique for massive streaming choice-based information (JZ, XL, YL), pp. 1169–1172.
SACSAC-2013-ImmichCC #adaptation #fault
Adaptive video-aware FEC-based mechanism with unequal error protection scheme (RI, EC, MC), pp. 981–988.
SACSAC-2013-JangJHJKJ #android
Protecting Android applications with steganography-based software watermarking (JJ, HJ, JH, JJ, DK, SKJ), pp. 1657–1658.
SPLCSPLC-2013-ClementsKSW #strict
A PLE-based auditing method for protecting restricted content in derived products (PCC, CWK, JS, AW), pp. 218–226.
HPCAHPCA-2013-KayaalpSNPA #architecture #named #reuse
SCRAP: Architecture for signature-based protection from Code Reuse Attacks (MK, TS, JN, DP, NBAG), pp. 258–269.
HPCAHPCA-2013-XiaLC #architecture #physics #virtual machine
Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks (YX, YL, HC), pp. 246–257.
LCTESLCTES-2013-KhudiaM #control flow #low cost #using
Low cost control flow protection using abstract control signatures (DSK, SAM), pp. 3–12.
DATEDATE-2012-BeaumontHN #architecture #execution #hardware #replication #security #using
SAFER PATH: Security architecture using fragmented execution and replication for protection against trojaned hardware (MRB, BDH, TN), pp. 1000–1005.
CHICHI-2012-MerrittM
Protecting artificial team-mates: more seems like less (TRM, KM), pp. 2793–2802.
CIKMCIKM-2012-VlachosWS #clustering
Right-protected data publishing with hierarchical clustering preservation (MV, AW, JS), pp. 654–663.
ICPRICPR-2012-CoronaTG #classification #multi #named #web #web service
SuStorID: A multiple classifier system for the protection of web services (IC, RT, GG), pp. 2375–2378.
RERE-2012-SalehiePOAN #adaptation #runtime #security
Requirements-driven adaptive security: Protecting variable assets at runtime (MS, LP, IO, RA, BN), pp. 111–120.
SACSAC-2012-HuaS #kernel #lightweight #memory management #named
Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation (JH, KS), pp. 1470–1477.
SACSAC-2012-WangYLQG
Hypervisor-based protection of sensitive files in a compromised system (JW, MY, BL, ZQ, HG), pp. 1765–1770.
LCTESLCTES-2012-KhudiaWM #embedded #fault #performance #using
Efficient soft error protection for commodity embedded microprocessors using profile information (DSK, GW, SAM), pp. 99–108.
OSDIOSDI-2012-DunnLJKSXSW #privacy
Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels (AMD, MZL, SJ, SK, MS, YX, VS, EW), pp. 61–75.
OSDIOSDI-2012-GiffinLSTMMR #named #privacy #web
Hails: Protecting Data Privacy in Untrusted Web Applications (DBG, AL, DS, DT, DM, JCM, AR), pp. 47–60.
DACDAC-2011-YangBC #detection #embedded #energy #fault #using
Energy-efficient MIMO detection using unequal error protection for embedded joint decoding system (YSY, PB, GC), pp. 579–584.
DATEDATE-2011-NicolaidisBZ
Eliminating speed penalty in ECC protected memories (MN, TB, NEZ), pp. 1614–1619.
ICDARICDAR-2011-DuL #identification #privacy
Preservative License Plate De-identification for Privacy Protection (LD, HL), pp. 468–472.
SIGMODSIGMOD-2011-GaoYJZWY #distance #privacy
Neighborhood-privacy protected shortest distance computing in cloud (JG, JXY, RJ, JZ, TW, DY), pp. 409–420.
VLDBVLDB-2011-BlausteinCSAR #graph
Surrogate Parenthood: Protected and Informative Graphs (BTB, AC, LS, MDA, AR), pp. 518–527.
ICEISICEIS-v3-2011-ZhuL11a #automation #modelling #simulation
Modeling and Simulation of the Automatic Train Protection in WLAN based CBTC Systems (XZ, JL), pp. 449–458.
CIKMCIKM-2011-BaigLLW #independence #multi #privacy
Cloning for privacy protection in multiple independent data publications (MMB, JL, JL, HW), pp. 885–894.
CIKMCIKM-2011-MajumdarRIV #information management #privacy #quality
Privacy protected knowledge management in services with emphasis on quality data (DM, RC, SI, KV), pp. 1889–1894.
KDDKDD-2011-LeeOYK #privacy #semantics #using
Protecting location privacy using location semantics (BL, JO, HY, JK), pp. 1289–1297.
SIGIRSIGIR-2011-ChenBSCG #named #performance #personalisation #privacy #web
UPS: efficient privacy protection in personalized web search (GC, HB, LS, KC, YG), pp. 615–624.
SACSAC-2011-ChiangH #embedded #operating system
Supporting dynamic update and resource protection in an embedded operating system (MLC, HYH), pp. 616–620.
SACSAC-2011-JinL #performance
Efficient traitor tracing for clone attack in content protection (HJ, JBL), pp. 1544–1549.
SACSAC-2011-JohnsBSP #reliability
Reliable protection against session fixation attacks (MJ, BB, MS, JP), pp. 1531–1537.
SACSAC-2011-LinXYYZGQCG #anti #hardware #named #using
SPAD: software protection through anti-debugging using hardware virtualization (QL, MX, MY, PY, MZ, SG, ZQ, KC, HG), pp. 623–624.
SACSAC-2011-RahmanHA11a #named #privacy #quantifier #towards
ProQuPri: towards anonymity protection with privacy quantification for context-aware applications (FR, MEH, SIA), pp. 453–454.
SACSAC-2011-ZhuYXLYGQLCG #monitoring #named #security
VASP: virtualization assisted security monitor for cross-platform protection (MZ, MY, MX, BL, PY, SG, ZQ, LL, YC, HG), pp. 554–559.
HPCAHPCA-2011-YoonMCRJE #fault #memory management #named
FREE-p: Protecting non-volatile memory against both hard and soft errors (DHY, NM, JC, PR, NPJ, ME), pp. 466–477.
SOSPSOSP-2011-PopaRZB #named #query
CryptDB: protecting confidentiality with encrypted query processing (RAP, CMSR, NZ, HB), pp. 85–100.
SOSPSOSP-2011-ZhangCCZ #multitenancy #named #virtual machine
CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization (FZ, JC, HC, BZ), pp. 203–216.
CASECASE-2010-KimHS #outsourcing
Risk-averse outsourcing strategies for optimal intellectual property protection (BK, KH, KS), pp. 978–983.
DATEDATE-2010-NeukirchnerSSE #self
A software update service with self-protection capabilities (MN, SS, HS, RE), pp. 903–908.
VLDBVLDB-2010-PangDX #privacy #query
Embellishing Text Search Queries To Protect User Privacy (HP, XD, XX), pp. 598–607.
VLDBVLDB-2011-YuanCY10 #network #personalisation #privacy #social
Personalized Privacy Protection in Social Networks (MY, LC, PSY), pp. 141–150.
ICPRICPR-2010-FengY #analysis
Binary Discriminant Analysis for Face Template Protection (YCF, PCY), pp. 874–877.
ICPRICPR-2010-OudaTN
Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes (OO, NT, TN), pp. 882–885.
ICPRICPR-2010-WangYLZLCT #distance #novel
A Novel Fingerprint Template Protection Scheme Based on Distance Projection Coding (RW, XY, XL, SZ, PL, KC, JT), pp. 886–889.
OOPSLAOOPSLA-2010-MatsakisG #type system
A time-aware type system for data-race protection and guaranteed initialization (NDM, TRG), pp. 634–651.
ASPLOSASPLOS-2010-HuangDS #multi #named #performance
Orthrus: efficient software integrity protection on multi-cores (RCH, DYD, GES), pp. 371–384.
LCTESLCTES-2010-ShrivastavaLJ #embedded #equation #fault
Cache vulnerability equations for protecting data in embedded processor caches from soft errors (AS, JL, RJ), pp. 143–152.
OSDIOSDI-2010-TangMK #operating system #trust
Trust and Protection in the Illinois Browser Operating System (ST, HM, STK), pp. 17–32.
VMCAIVMCAI-2010-Giacobazzi #abstract interpretation
Abstract Interpretation-Based Protection (RG), pp. 23–24.
DATEDATE-2009-GhermanECSB
System-level hardware-based protection of memories against soft-errors (VG, SE, MC, NS, YB), pp. 1222–1225.
DATEDATE-2009-SuCGSP #memory management #named #operating system
SecBus: Operating System controlled hierarchical page-based memory bus protection (LS, SC, PG, CS, RP), pp. 570–573.
CHICHI-2009-PinelleBNM #coordination #evaluation
An evaluation of coordination techniques for protecting objects and territories in tabletop groupware (DP, MB, MAN, RLM), pp. 2129–2138.
HCIDHM-2009-YangDZ #bibliography #modelling #perspective
Human Head Modeling and Personal Head Protective Equipment: A Literature Review (J(Y, JD, ZZ), pp. 661–670.
HCIHIMI-II-2009-MinC #approach #generative #personalisation #privacy
An Interactive-Content Technique Based Approach to Generating Personalized Advertisement for Privacy Protection (WHM, YGC), pp. 185–191.
CIKMCIKM-2009-LeeLLZ #privacy
Navigational path privacy protection: navigational path privacy protection (KCKL, WCL, HVL, BZ), pp. 691–700.
SACSAC-2009-CeccatoTPM #orthogonal
Remote software protection by orthogonal client replacement (MC, PT, MDP, AM), pp. 448–455.
SACSAC-2009-FungCDX #privacy
Privacy protection for RFID data (BCMF, MC, BCD, HX), pp. 1528–1535.
SACSAC-2009-MonjurA #framework #privacy #towards
Towards a landmark influence framework to protect location privacy (MM, SIA), pp. 219–220.
ESEC-FSEESEC-FSE-2009-VarmaSS #memory management
Backward-compatible constant-time exception-protected memory (PV, RKS, HJS), pp. 71–80.
PPoPPPPoPP-2009-AbadiHM #hardware #memory management #off the shelf #transaction #using
Transactional memory with strong atomicity using off-the-shelf memory protection hardware (MA, TH, MM), pp. 185–196.
DACDAC-2008-RoyKM #hardware
Protecting bus-based hardware IP by secret sharing (JAR, FK, ILM), pp. 846–851.
DATEDATE-2008-GizopoulosRMS #case study #fault
Soft Errors: System Effects, Protection Techniques and Case Studies (DG, KR, SM, PS).
DATEDATE-2008-WapplerM
Software Protection Mechanisms for Dependable Systems (UW, MM), pp. 947–952.
ICALPICALP-C-2008-CanettiEGL #how
How to Protect Yourself without Perfect Shredding (RC, DE, SG, DYL), pp. 511–523.
ICEISICEIS-DISI-2008-VoS #component #framework
A Framework for Protecting EJB Applications from Malicious Components (HV, MS), pp. 264–269.
CIKMCIKM-2008-PanXM #mobile #privacy
Protecting location privacy against location-dependent attack in mobile services (XP, JX, XM), pp. 1475–1476.
ASPLOSASPLOS-2008-ChenGLSWBDP #approach #named #operating system
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems (XC, TG, ECL, PS, CAW, DB, JSD, DRKP), pp. 2–13.
HPCAHPCA-2008-RogersYCPS #distributed #memory management #multi
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors (BR, CY, SC, MP, YS), pp. 161–172.
FATESTestCom-FATES-2008-ShuCLLSL #framework #named #network #paradigm #security #testing
VCSTC: Virtual Cyber Security Testing Capability — An Application Oriented Paradigm for Network Infrastructure Protection (GS, DC, ZL, NL, LS, DL), pp. 119–134.
ASEASE-2007-ClauseDOP #effectiveness #memory management #using
Effective memory protection using dynamic tainting (JAC, ID, AO, MP), pp. 284–292.
CASECASE-2007-WeiJL #automation #industrial #on the
On Protecting Industrial Automation and Control Systems against Electronic Attacks (DW, MAJ, YL), pp. 176–181.
DACDAC-2007-KumarSCKS #embedded #memory management
A System For Coarse Grained Memory Protection In Tiny Embedded Processors (RK, AS, AC, EK, MBS), pp. 218–223.
DATEDATE-2007-LeveugleAMTMMFRT #evaluation #fault #modelling
Experimental evaluation of protections against laser-induced faults and consequences on fault modeling (RL, AA, VM, ET, PM, CM, NF, JBR, AT), pp. 1587–1592.
DATEDATE-2007-MehraraASCBA #fault #low cost
Low-cost protection for SER upsets and silicon defects (MM, MA, SS, KC, VB, TMA), pp. 1146–1151.
CSMRCSMR-2007-MerloLA #automation #injection #php
Automated Protection of PHP Applications Against SQL-injection Attacks (EM, DL, GA), pp. 191–202.
SCAMSCAM-2007-MolinaS #approximate #open source #performance #source code #using
Fast Approximate Matching of Programs for Protecting Libre/Open Source Software by Using Spatial Indexes (AJMM, TS), pp. 111–122.
CHICHI-2007-KumaraguruRACHN #design #email #embedded #evaluation #people
Protecting people from phishing: the design and evaluation of an embedded training email system (PK, YR, AA, LFC, JIH, EN), pp. 905–914.
HCIDHM-2007-HuDYY #3d
Investigation on Ergonomics Characteristics of Protective Clothing Based on Capture of Three-Dimensional Body Movements (HH, LD, CY, XY), pp. 856–864.
HCIHCI-AS-2007-ZhangOD #automation #communication #evaluation #performance
Performance Evaluation for Automatic Protection Switching in a CDMA-TDD Wireless Communication System (LZ, HO, TD), pp. 1200–1209.
SIGIRSIGIR-2007-JiangSL #privacy
Protecting source privacy in federated search (WJ, LS, JL), pp. 761–762.
SACSAC-2007-LoukidesS #privacy
Capturing data usefulness and privacy protection in K-anonymisation (GL, JS), pp. 370–374.
SACSAC-2007-ZhouHP #database #image #using
An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image (XZ, MH, ZP), pp. 254–258.
SOSPSOSP-2007-WangFHJ #abstraction #communication #web
Protection and communication abstractions for web browsers in MashupOS (HJW, XF, JH, CJ), pp. 1–16.
CASECASE-2006-CvetanovicCAGB #component #novel
A Novel Protective Cover in Assembling of Micro Components in a SEM Chamber (AC, AC, DA, IG, WB), pp. 242–246.
DACDAC-2006-StojanovicBDW #effectiveness #implementation #queue
A cost-effective implementation of an ECC-protected instruction queue for out-of-order microprocessors (VS, RIB, JD, RW), pp. 705–708.
DATEDATE-2006-Kim #fault
Area-efficient error protection for caches (SK), pp. 1282–1287.
DATEDATE-DF-2006-AkselrodAA #architecture #debugging #framework #independence #multi #security
Platform independent debug port controller architecture with security protection for multi-processor system-on-chip ICs (DA, AA, YA), pp. 30–35.
FASEFASE-2006-KochP #self
Engineering Self-protection for Autonomous Systems (MK, KP), pp. 33–47.
ICPRICPR-v4-2006-LinHH #embedded #video
An embedded watermark technique in video for copyright protection (YRL, HYH, WHH), pp. 795–798.
POPLPOPL-2006-LuP #encapsulation #representation
Protecting representation with effect encapsulation (YL, JP), pp. 359–371.
ASPLOSASPLOS-2006-KharbutliJSVP
Comprehensively and efficiently protecting the heap (MK, XJ, YS, GV, MP), pp. 207–218.
ASPLOSASPLOS-2006-ShyamCPBA #fault #low cost #pipes and filters
Ultra low-cost defect protection for microprocessor pipelines (SS, KC, SP, VB, TMA), pp. 73–82.
HPCAHPCA-2006-ShiFGLZY #architecture #in memory #memory management #named #security
InfoShield: a security architecture for protecting information usage in memory (WS, JBF, GG, HHSL, YZ, JY), pp. 222–231.
HPDCHPDC-2006-BaiardiRMV #monitoring #policy #virtual machine
Policy Driven Virtual Machine Monitor for Protected Grids (FB, LR, PM, AV), pp. 313–316.
CBSECBSE-2005-Beznosov #architecture #case study #component #design #experience #implementation #web #web service
Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services (KB), pp. 337–352.
DACDAC-2005-NieKT #incremental #layout
A watermarking system for IP protection by a post layout incremental router (TN, TK, MT), pp. 218–221.
ICEISICEIS-v1-2005-Mattsson #database #encryption #enterprise #implementation
A Practical Implementation of Transparent Encryption and Separation of Duties in Enterprise Databases — Protection against External and Internal Attacks on Databases (UTM), pp. 146–153.
SACSAC-2005-Hutchinson #future of #information management
The future of systematic information protection (BH), p. 1.
SACSAC-2005-PowerSPS #query
Protecting sensitive patient data via query modification (DJP, MS, EAP, ACS), pp. 224–230.
SOSPSOSP-2005-WitchelRA #linux #memory management #named #using
Mondrix: memory isolation for linux using mondriaan memory protection (EW, JR, KA), pp. 31–44.
DATEDATE-v1-2004-ZambrenoCSN #flexibility #hardware #using
Flexible Software Protection Using Hardware/Software Codesign Techniques (JZ, ANC, RS, BN), pp. 636–641.
VLDBVLDB-2004-SionAP
Resilient Rights Protection for Sensor Streams (RS, MJA, SP), pp. 732–743.
ICPRICPR-v4-2004-KitaharaKH #privacy
Stealth Vision for Protecting Privacy (IK, KK, NH), pp. 404–407.
OOPSLAOOPSLA-2004-Fong #verification #virtual machine
Pluggable verification modules: an extensible protection mechanism for the JVM (PWLF), pp. 404–418.
SACSAC-2004-WaldmannSE #authentication
Protected transmission of biometric user authentication data for oncard-matching (UW, DS, CE), pp. 425–430.
ASPLOSASPLOS-2004-ZhuangZP #framework #information management #named
HIDE: an infrastructure for efficiently protecting information leakage on the address bus (XZ, TZ, SP), pp. 72–84.
LCTESLCTES-2004-SaputraCBVKI #embedded
Code protection for resource-constrained embedded devices (HS, GC, RRB, NV, MTK, MJI), pp. 240–248.
DACDAC-2003-BeniniMMOPP #analysis #design #difference #energy
Energy-aware design techniques for differential power analysis protection (LB, AM, EM, EO, FP, MP), pp. 36–41.
SIGMODSIGMOD-2003-SionAP #relational
Rights Protection for Relational Data (RS, MJA, SP), pp. 98–109.
FMFME-2003-AtiyaKW #semantics
A Circus Semantics for Ravenscar Protected Objects (DAA, SK, JW), pp. 617–635.
ICEISICEIS-v1-2003-BarkerD #database #implementation
Extended Protected Databases: A Practical Implementation (SB, PD), pp. 456–459.
SACSAC-2003-TraoreK #collaboration
A Protection Scheme for Collaborative Environments (IT, SK), pp. 331–337.
ESEC-FSEESEC-FSE-2003-YongH #c #pointer #source code
Protecting C programs from attacks via invalid pointer dereferences (SHY, SH), pp. 307–316.
RERE-2002-AlvarezOP #quality #requirements #reuse
Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection (JATÁ, AO, MP), pp. 95–103.
ASPLOSASPLOS-2002-WitchelCA #memory management
Mondrian memory protection (EW, JC, KA), pp. 304–316.
OSDIOSDI-2002-HawblitzelE #flexibility #java #named
Luna: A Flexible Java Protection System (CH, TvE), pp. 391–401.
CBSECBSE-2001-PopovSRR #component
Protective Wrapping of OTS Components (PP, LS, SR, AR), p. 8.
DACDAC-2001-Qu #component #detection
Publicly Detectable Techniques for the Protection of Virtual Components (GQ), pp. 474–479.
DATEDATE-2001-QuasemG #fault #simulation
Exact fault simulation for systems on Silicon that protects each core’s intellectual property (MSQ, SKG), p. 804.
DACDAC-2000-DalpassoBB #hardware
Hardware/software IP protection (MD, AB, LB), pp. 593–596.
AdaEuropeAdaEurope-2000-WellingsJSKWM #ada #object-oriented #programming
Object-Oriented Programming and Protected Objects in Ada 95 (AJW, BJ, BS, JK, TW, SM), pp. 16–28.
ICSEICSE-2000-KirschS #tutorial
Intellectual property protection for software in the United States and Europe (tutorial session): the changing roles of patents and copyrights (GJK, YS), p. 827.
OSDIOSDI-2000-StrunkGSSG #self
Self-Securing Storage: Protecting Data in Compromised Systems (JDS, GRG, MLS, CANS, GRG), pp. 165–180.
ICLPCL-2000-Barker #logic programming
Data Protection by Logic Programming (SB), pp. 1300–1314.
DACDAC-1999-HongP #behaviour #synthesis
Behavioral Synthesis Techniques for Intellectual Property Protection (IH, MP), pp. 849–854.
DACDAC-1999-LachMP #multi #robust
Robust FPGA Intellectual Property Protection Through Multiple Small Watermarks (JL, WHMS, MP), pp. 831–836.
AdaEuropeAdaEurope-1999-LundqvistAM #ada #formal method
A Formal Model of the Ada Ravenscar Tasking Profile; Protected Objects (KL, LA, SM), pp. 12–25.
TOOLSTOOLS-PACIFIC-1999-NobleCP #alias
Object Ownership for Dynamic Alias Protection (JN, DGC, JP), pp. 176–187.
SOSPSOSP-1999-ChiuehVP #performance #segmentation
Integrating segmentation and paging protection for safe, efficient and transparent software extensions (TcC, GV, PP), pp. 140–153.
DACDAC-1998-KahngLMMMPTWW
Watermarking Techniques for Intellectual Property Protection (ABK, JL, WHMS, SM, ILM, MP, PT, HW, GW), pp. 776–781.
CSMRCSMR-1998-JensenH #configuration management #reuse
Protection Reconfiguration for Reusable Software (CDJ, DH), pp. 74–81.
STOCSTOC-1998-GertnerIKM #information retrieval #privacy
Protecting Data Privacy in Private Information Retrieval Schemes (YG, YI, EK, TM), pp. 151–160.
ICALPICALP-1998-Abadi
Protection in Programming-Language Translations (MA), pp. 868–883.
AdaSIGAda-1998-KiddleW
Extensible Protected Types (OPK, AJW), pp. 229–239.
AdaSIGAda-1998-LiBY #ada
Transforming Ada Serving Tasks into Protected Objects (BL, BX, HY), pp. 240–245.
AdaSIGAda-1998-MacosM
The Rendezvous is Dead — Long Live the Protected Object (DM, FM), pp. 287–293.
ECOOPECOOP-1998-NobleVP #alias #flexibility
Flexible Alias Protection (JN, JV, JP), pp. 158–185.
OOPSLAOOPSLA-1998-ClarkePN #alias #flexibility
Ownership Types for Flexible Alias Protection (DGC, JP, JN), pp. 48–64.
HPCAHPCA-1998-MackenzieKFLLAK #performance
Exploiting Two-Case Delivery for Fast Protected Messaging (KM, JK, MF, WL, VL, AA, MFK), pp. 231–242.
AdaTRI-Ada-1997-KaiserP #case study #implementation #reliability #resource management
Comparing the Reliability Provided by Tasks or Protected Objects for Implementing a Resource Allocation Service: a Case Study (CK, JFPP), pp. 51–65.
HPCAHPCA-1997-LimHPS #clustering #communication #performance
Message Proxies for Efficient, Protected Communication on SMP Clusters (BHL, PH, PP, MS), pp. 116–127.
STOCSTOC-1996-DworkLN #self
Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version) (CD, JBL, MN), pp. 489–498.
AdaEuropeAdaEurope-1996-MundieFK #embedded #implementation
Implementing Protected Types on Embedded Targets (DM, JF, EK), pp. 287–297.
HPCAHPCA-1996-BlumrichDFL #interface #network
Protected, User-Level DMA for the SHRIMP Network Interface (MAB, CD, EWF, KL), pp. 154–165.
STOCSTOC-1995-BellareGG #encryption #incremental
Incremental cryptography and application to virus protection (MB, OG, SG), pp. 45–56.
DACDAC-1994-Fernandez #industrial
Intellectual Property Protection in the EDA Industry (DSF), pp. 161–163.
FMFME-1994-Simpson #automation #specification
A Formal Specification of an Automatic Train Protection System (AS), pp. 602–617.
SEKESEKE-1994-ZhuHM #information management #testing
Knowledge engineering helps testing protection software (HZ, PAVH, JHRM), pp. 116–123.
ECOOPECOOP-1994-Hagimont #distributed #object-oriented
Protection in the Guide Object-Oriented Distributed System (DH), pp. 280–298.
AdaTRI-Ada-1993-Nycum
Protecting Intellectual Property Rights in Software (SHN), pp. 410–421.
SOSPSOSP-1993-HoskingM #memory management #object-oriented
Protection Traps and Alternatives for Memory Management of an Object-Oriented Language (ALH, JEBM), pp. 106–119.
AdaTRI-Ada-C-1992-Reed #ada #case study #experience #implementation
Experiences in Implementing Ada 9X Protected Records and Requeue (PR), pp. 62–67.
OOPSLAOOPSLA-1992-RichardsonSC #fine-grained #named #performance
CACL: Efficient Fine-Grained Protection for Objects (JER, PMS, LFC), pp. 263–275.
SOSPSOSP-WIP-1991-Druschel92 #architecture #composition #kernel #orthogonal #why
Modularity and Protection are Orthogonal, or “Why µ-kernel Architectures are Flawed” (Abstract) (PD), p. 22.
PODSPODS-1991-MalvestutoMR #2d #information management #statistics
Suppressing Marginal Cells to Protect Sensitive Information in a Two-Dimensional Statistical Table (FMM, MM, MR), pp. 252–258.
VLDBVLDB-1991-SullivanS #data type #database #fault tolerance #using
Using Write Protected Data Structures To Improve Software Fault Tolerance in Highly Available Database Management Systems (MS, MS), pp. 171–180.
OOPSLAOOPSLA-1991-Hogg #alias #named #object-oriented
Islands: Aliasing Protection in Object-Oriented Languages (JH), pp. 271–285.
CAVCAV-1991-BarbeauB #approach #fault #petri net #using #verification
The Lotos Model of a Fault Protected System and its Verification Using a Petri Net Based Approach (MB, GvB), pp. 103–113.
DACDAC-1989-SilvaGKN #version control
Protection and Versioning for OCT (MJS, DG, RHK, RN), pp. 264–269.
CHICHI-1989-Samuelson #user interface
Protecting user interfaces through copyright: the debate (PS), pp. 97–104.
STOCSTOC-1987-Goldreich #formal method #simulation #towards
Towards a Theory of Software Protection and Simulation by Oblivious RAMs (OG), pp. 182–194.
CADECADE-1984-MinkerP
Applications of Protected Circumscription (JM, DP), pp. 414–425.
VLDBVLDB-1982-Leiss #database #statistics
Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise (ELL), pp. 189–196.
ASPLOSASPLOS-1982-Jones #design
Systematic Protection Mechanism Design (DWJ), pp. 77–80.
ASPLOSASPLOS-1982-Wilkes #hardware #implementation #memory management
Hardware Support for Memory Protection: Capability Implementations (MVW), pp. 107–116.
SOSPSOSP-1981-Bishop
Hierarchical Take-Grant Protection Systems (MB), pp. 109–122.
SOSPSOSP-1979-BishopS #information management
The Transfer of Information and Authority in a Protection System (MB, LS), pp. 45–54.
VLDBVLDB-1978-HuberL #information management
Information Protection by Method Base Systems (RH, PCL), pp. 420–426.
ICSEICSE-1978-Cook #memory management
Measuring Memory Protection (DC), pp. 281–287.
SIGMODSIGMOD-1977-YuC #case study #database #statistics
A Study on the Protection of Statistical Data Bases (CTY, FYLC), pp. 169–181.
VLDBVLDB-1977-BancilhonS #database #relational
Protection of Information in Relational Data Bases (FB, NS), pp. 494–500.
SOSPSOSP-1977-NeedhamW
The Cambridge CAP Computer and its Protection System (RMN, RDHW), pp. 1–10.
SOSPSOSP-1977-Snyder #analysis #on the #synthesis
On the Synthesis and Analysis of Protection Systems (LS), pp. 141–150.
VLDBVLDB-1976-HartsonH #database #semantics
A Semantic Model for Data Base Protection Languages (HRH, DKH), pp. 27–42.
ICSEICSE-1976-Voges #aspect-oriented #design #validation
Aspects of Design, Test and Validation of the Software for a Computerized Reactor Protection System (UV), pp. 606–610.
SOSPSOSP-1975-CohenJ #operating system
Protection in the HYDRA Operating System (ESC, DJ), pp. 141–160.
SOSPSOSP-1975-HarrisonRU #on the #operating system
On Protection in Operating System (MAH, WLR, JDU), pp. 14–24.
SOSPSOSP-1973-Saltzer #information management #multi
Protection and the Control of Information Sharing in MULTICS (JHS), p. 119.
SOSPSOSP-J-1973-SchroederS72 #architecture #hardware #implementation
A Hardware Architecture for Implementing Protection Rings (MDS, JHS), pp. 157–170.
SOSPSOSP-1971-SchroederS #architecture #hardware #implementation
A Hardware Architecture for Implementing Protection Rings (Abstract) (MDS, JHS), pp. 42–54.
SOSPSOSP-1967-Graham68 #information management
Protection in an information processing utility (RMG), pp. 365–369.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.