228 papers:
DAC-2015-KoJKLS #design #guidelines- Guidelines to design parity protected write-back L1 data cache (YK, RJ, YK, KL, AS), p. 6.
SANER-2015-ZekanST #web- Protecting web applications via Unicode extension (BZ, MS, VT), pp. 419–428.
CHI-2015-LugerURG #design #game studies #process #using- Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process (EL, LU, TR, MG), pp. 457–466.
CSCW-2015-LiCYH #online- Massive Open Online Proctor: Protecting the Credibility of MOOCs certificates (XL, KmC, YY, AGH), pp. 1129–1137.
CAiSE-2015-AbubahiaC #approach #clustering- A Clustering Approach for Protecting GIS Vector Data (AA, MC), pp. 133–147.
ICEIS-v3-2015-Piedrabuena0R #data transformation- Enforcing Data Protection Regulations within e-Government Master Data Management Systems (FP, LG, RR), pp. 316–321.
KDD-2015-ArlorioCLLP #assessment #authentication #data mining #mining- Exploiting Data Mining for Authenticity Assessment and Protection of High-Quality Italian Wines from Piedmont (MA, JDC, GL, ML, LP), pp. 1671–1680.
SAC-2015-BraunPPJ #adaptation #named #web- LogSec: adaptive protection for the wild wild web (BB, KP, JP, MJ), pp. 2149–2156.
SAC-2015-EllouzeRB #energy- Energy harvesting based protection of border surveillance systems (NE, SR, NB), pp. 621–626.
SAC-2015-HuangSZSXD #privacy #pseudo- A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs (JH, MS, SZ, YS, CCX, QD), pp. 688–694.
ASPLOS-2015-ColpZGSLRSW #memory management #smarttech- Protecting Data on Smartphones and Tablets from Memory Attacks (PC, JZ, JG, SS, EdL, HR, SS, AW), pp. 177–189.
ASPLOS-2015-HicksSKS #debugging #lightweight #named #runtime #specification- SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs (MH, CS, STK, JMS), pp. 517–529.
DAC-2014-CocchiBCW #hardware #integration- Circuit Camouflage Integration for Hardware IP Protection (RPC, JPB, LWC, BJW), p. 5.
DAC-2014-DaviKS #control flow #embedded #fine-grained #performance #towards- Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation (LD, PK, ARS), p. 6.
DAC-2014-RaoEST #multi #using- Protecting SRAM-based FPGAs Against Multiple Bit Upsets Using Erasure Codes (PMBR, ME, RS, MBT), p. 6.
DATE-2014-HamdiouiDNSBT #hardware- Hacking and protecting IC hardware (SH, JLD, GDN, FS, GvB, MT), pp. 1–7.
DATE-2014-KufelWHAWM #embedded- Clock-modulation based watermark for protection of embedded processors (JK, PRW, SH, BMAH, PNW, JM), pp. 1–6.
VLDB-2014-LiLWB #in the cloud #performance #privacy #query- Fast Range Query Processing with Strong Privacy Protection for Cloud Computing (RL, AXL, ALW, BB), pp. 1953–1964.
VLDB-2014-ToGS #crowdsourcing #framework #privacy- A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing (HT, GG, CS), pp. 919–930.
FM-2014-ButinM #analysis- Log Analysis for Data Protection Accountability (DB, DLM), pp. 163–178.
CHI-2014-LucaHZMSHS #authentication #smarttech- Now you see me, now you don’t: protecting smartphone authentication from shoulder surfers (ADL, MH, EvZ, MEM, BES, HH, MS), pp. 2937–2946.
HCI-AS-2014-Kawecka-EndlerM #enterprise #process- Humanization of Work and Environmental Protection in Activity of Enterprise (AKE, BM), pp. 700–709.
AdaEurope-2014-BurgstallerB #ada #algebra #source code #static analysis- Kronecker Algebra for Static Analysis of Ada Programs with Protected Objects (BB, JB), pp. 27–42.
CIKM-2014-SongG #difference #named #privacy #query- Aroma: A New Data Protection Method with Differential Privacy and Accurate Query Answering (CS, TG), pp. 1569–1578.
ICPR-2014-Gomez-BarreroRGFB #adaptation- Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters (MGB, CR, JG, JF, CB), pp. 4483–4488.
ICPR-2014-InaiPFFU #privacy- Selective Concealment of Characters for Privacy Protection (KI, MP, VF, YF, SU), pp. 333–338.
ICPR-2014-ZhangLNT #privacy- Anonymous Camera for Privacy Protection (YZ, YL, HN, RiT), pp. 4170–4175.
KMIS-2014-MikhaylovZFS #development- Development of the Protection System Against Malicious Software (DM, AZ, MF, ASS), pp. 161–170.
SAC-2014-BackesGLL- X-pire 2.0: a user-controlled expiration date and copy protection mechanism (MB, SG, SL, SL), pp. 1633–1640.
SAC-2014-LabdaMS #modelling #privacy #process- Modeling of privacy-aware business processes in BPMN to protect personal data (WL, NM, PS), pp. 1399–1405.
ASPLOS-2014-CriswellDA #operating system- Virtual ghost: protecting applications from hostile operating systems (JC, ND, VSA), pp. 81–96.
ASPLOS-2014-MenychtasSS #performance #scheduling- Disengaged scheduling for fair, protected access to fast computational accelerators (KM, KS, MLS), pp. 301–316.
ASPLOS-2014-RuwaseKGM #approach #hardware #named- Guardrail: a high fidelity approach to protecting hardware devices from buggy drivers (OR, MAK, PBG, TCM), pp. 655–670.
HPCA-2014-ElwellRAP #architecture #memory management- A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks (JE, RR, NBAG, DP), pp. 201–212.
HPCA-2014-PalframanKL #fault- Precision-aware soft error protection for GPUs (DJP, NSK, MHL), pp. 49–59.
HPCA-2014-WangFS #memory management- Timing channel protection for a shared memory controller (YW, AF, GES), pp. 225–236.
OSDI-2014-BelayPKGKB #latency #named #operating system #throughput- IX: A Protected Dataplane Operating System for High Throughput and Low Latency (AB, GP, AK, SG, CK, EB), pp. 49–65.
OSDI-2014-StefanYMRHKM #javascript- Protecting Users by Confining JavaScript with COWL (DS, EZY, PM, AR, DH, BK, DM), pp. 131–146.
QoSA-2013-YuanMSGG #architecture #self- Architecture-based self-protecting software systems (EY, SM, BRS, DG, JG), pp. 33–42.
DAC-2013-ChandrikakuttyUTW #hardware #monitoring #network- High-performance hardware monitors to protect network processors from data plane attacks (HC, DU, RT, TW), p. 6.
DATE-2013-BayrakVRNBI- An EDA-friendly protection scheme against side-channel attacks (AGB, NV, FR, DN, PB, PI), pp. 410–415.
DATE-2013-GuoWLLLC #named- DA-RAID-5: a disturb aware data protection technique for NAND flash storage systems (JG, WW, YZ, SL, HL, YC), pp. 380–385.
DATE-2013-GuoYZC #hybrid #low cost- Low cost power failure protection for MLC NAND flash storage systems with PRAM/DRAM hybrid buffer (JG, JY, YZ, YC), pp. 859–864.
DATE-2013-ManiatakosMM #array #memory management #optimisation- AVF-driven parity optimization for MBU protection of in-core memory arrays (MM, MKM, YM), pp. 1480–1485.
DATE-2013-NikolaouSNOI #array #memory management #question- Memory array protection: check on read or check on write? (PN, YS, LN, EÖ, SI), pp. 214–219.
VLDB-2013-XueZZXYTJZ #named #predict #privacy- DesTeller: A System for Destination Prediction Based on Trajectories with Privacy Protection (AYX, RZ, YZ, XX, JY, YT), pp. 1198–1201.
ICPC-2013-BasileC #towards- Towards a unified software attack model to assess software protections (CB, MC), pp. 219–222.
CHI-2013-Erete #perspective- Protecting the home: exploring the roles of technology and citizen activism from a burglar’s perspective (SLE), pp. 2507–2516.
CIKM-2013-ZhangLL #performance #privacy #robust #streaming- An efficient and robust privacy protection technique for massive streaming choice-based information (JZ, XL, YL), pp. 1169–1172.
SAC-2013-ImmichCC #adaptation #fault- Adaptive video-aware FEC-based mechanism with unequal error protection scheme (RI, EC, MC), pp. 981–988.
SAC-2013-JangJHJKJ #android- Protecting Android applications with steganography-based software watermarking (JJ, HJ, JH, JJ, DK, SKJ), pp. 1657–1658.
SPLC-2013-ClementsKSW #strict- A PLE-based auditing method for protecting restricted content in derived products (PCC, CWK, JS, AW), pp. 218–226.
HPCA-2013-KayaalpSNPA #architecture #named #reuse- SCRAP: Architecture for signature-based protection from Code Reuse Attacks (MK, TS, JN, DP, NBAG), pp. 258–269.
HPCA-2013-XiaLC #architecture #physics #virtual machine- Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks (YX, YL, HC), pp. 246–257.
LCTES-2013-KhudiaM #control flow #low cost #using- Low cost control flow protection using abstract control signatures (DSK, SAM), pp. 3–12.
DATE-2012-BeaumontHN #architecture #execution #hardware #replication #security #using- SAFER PATH: Security architecture using fragmented execution and replication for protection against trojaned hardware (MRB, BDH, TN), pp. 1000–1005.
CHI-2012-MerrittM- Protecting artificial team-mates: more seems like less (TRM, KM), pp. 2793–2802.
CIKM-2012-VlachosWS #clustering- Right-protected data publishing with hierarchical clustering preservation (MV, AW, JS), pp. 654–663.
ICPR-2012-CoronaTG #classification #multi #named #web #web service- SuStorID: A multiple classifier system for the protection of web services (IC, RT, GG), pp. 2375–2378.
RE-2012-SalehiePOAN #adaptation #runtime #security- Requirements-driven adaptive security: Protecting variable assets at runtime (MS, LP, IO, RA, BN), pp. 111–120.
SAC-2012-HuaS #kernel #lightweight #memory management #named- Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation (JH, KS), pp. 1470–1477.
SAC-2012-WangYLQG- Hypervisor-based protection of sensitive files in a compromised system (JW, MY, BL, ZQ, HG), pp. 1765–1770.
LCTES-2012-KhudiaWM #embedded #fault #performance #using- Efficient soft error protection for commodity embedded microprocessors using profile information (DSK, GW, SAM), pp. 99–108.
OSDI-2012-DunnLJKSXSW #privacy- Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels (AMD, MZL, SJ, SK, MS, YX, VS, EW), pp. 61–75.
OSDI-2012-GiffinLSTMMR #named #privacy #web- Hails: Protecting Data Privacy in Untrusted Web Applications (DBG, AL, DS, DT, DM, JCM, AR), pp. 47–60.
DAC-2011-YangBC #detection #embedded #energy #fault #using- Energy-efficient MIMO detection using unequal error protection for embedded joint decoding system (YSY, PB, GC), pp. 579–584.
DATE-2011-NicolaidisBZ- Eliminating speed penalty in ECC protected memories (MN, TB, NEZ), pp. 1614–1619.
ICDAR-2011-DuL #identification #privacy- Preservative License Plate De-identification for Privacy Protection (LD, HL), pp. 468–472.
SIGMOD-2011-GaoYJZWY #distance #privacy- Neighborhood-privacy protected shortest distance computing in cloud (JG, JXY, RJ, JZ, TW, DY), pp. 409–420.
VLDB-2011-BlausteinCSAR #graph- Surrogate Parenthood: Protected and Informative Graphs (BTB, AC, LS, MDA, AR), pp. 518–527.
ICEIS-v3-2011-ZhuL11a #automation #modelling #simulation- Modeling and Simulation of the Automatic Train Protection in WLAN based CBTC Systems (XZ, JL), pp. 449–458.
CIKM-2011-BaigLLW #independence #multi #privacy- Cloning for privacy protection in multiple independent data publications (MMB, JL, JL, HW), pp. 885–894.
CIKM-2011-MajumdarRIV #information management #privacy #quality- Privacy protected knowledge management in services with emphasis on quality data (DM, RC, SI, KV), pp. 1889–1894.
KDD-2011-LeeOYK #privacy #semantics #using- Protecting location privacy using location semantics (BL, JO, HY, JK), pp. 1289–1297.
SIGIR-2011-ChenBSCG #named #performance #personalisation #privacy #web- UPS: efficient privacy protection in personalized web search (GC, HB, LS, KC, YG), pp. 615–624.
SAC-2011-ChiangH #embedded #operating system- Supporting dynamic update and resource protection in an embedded operating system (MLC, HYH), pp. 616–620.
SAC-2011-JinL #performance- Efficient traitor tracing for clone attack in content protection (HJ, JBL), pp. 1544–1549.
SAC-2011-JohnsBSP #reliability- Reliable protection against session fixation attacks (MJ, BB, MS, JP), pp. 1531–1537.
SAC-2011-LinXYYZGQCG #anti #hardware #named #using- SPAD: software protection through anti-debugging using hardware virtualization (QL, MX, MY, PY, MZ, SG, ZQ, KC, HG), pp. 623–624.
SAC-2011-RahmanHA11a #named #privacy #quantifier #towards- ProQuPri: towards anonymity protection with privacy quantification for context-aware applications (FR, MEH, SIA), pp. 453–454.
SAC-2011-ZhuYXLYGQLCG #monitoring #named #security- VASP: virtualization assisted security monitor for cross-platform protection (MZ, MY, MX, BL, PY, SG, ZQ, LL, YC, HG), pp. 554–559.
HPCA-2011-YoonMCRJE #fault #memory management #named- FREE-p: Protecting non-volatile memory against both hard and soft errors (DHY, NM, JC, PR, NPJ, ME), pp. 466–477.
SOSP-2011-PopaRZB #named #query- CryptDB: protecting confidentiality with encrypted query processing (RAP, CMSR, NZ, HB), pp. 85–100.
SOSP-2011-ZhangCCZ #multitenancy #named #virtual machine- CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization (FZ, JC, HC, BZ), pp. 203–216.
CASE-2010-KimHS #outsourcing- Risk-averse outsourcing strategies for optimal intellectual property protection (BK, KH, KS), pp. 978–983.
DATE-2010-NeukirchnerSSE #self- A software update service with self-protection capabilities (MN, SS, HS, RE), pp. 903–908.
VLDB-2010-PangDX #privacy #query- Embellishing Text Search Queries To Protect User Privacy (HP, XD, XX), pp. 598–607.
VLDB-2011-YuanCY10 #network #personalisation #privacy #social- Personalized Privacy Protection in Social Networks (MY, LC, PSY), pp. 141–150.
ICPR-2010-FengY #analysis- Binary Discriminant Analysis for Face Template Protection (YCF, PCY), pp. 874–877.
ICPR-2010-OudaTN- Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes (OO, NT, TN), pp. 882–885.
ICPR-2010-WangYLZLCT #distance #novel- A Novel Fingerprint Template Protection Scheme Based on Distance Projection Coding (RW, XY, XL, SZ, PL, KC, JT), pp. 886–889.
OOPSLA-2010-MatsakisG #type system- A time-aware type system for data-race protection and guaranteed initialization (NDM, TRG), pp. 634–651.
ASPLOS-2010-HuangDS #multi #named #performance- Orthrus: efficient software integrity protection on multi-cores (RCH, DYD, GES), pp. 371–384.
LCTES-2010-ShrivastavaLJ #embedded #equation #fault- Cache vulnerability equations for protecting data in embedded processor caches from soft errors (AS, JL, RJ), pp. 143–152.
OSDI-2010-TangMK #operating system #trust- Trust and Protection in the Illinois Browser Operating System (ST, HM, STK), pp. 17–32.
VMCAI-2010-Giacobazzi #abstract interpretation- Abstract Interpretation-Based Protection (RG), pp. 23–24.
DATE-2009-GhermanECSB- System-level hardware-based protection of memories against soft-errors (VG, SE, MC, NS, YB), pp. 1222–1225.
DATE-2009-SuCGSP #memory management #named #operating system- SecBus: Operating System controlled hierarchical page-based memory bus protection (LS, SC, PG, CS, RP), pp. 570–573.
CHI-2009-PinelleBNM #coordination #evaluation- An evaluation of coordination techniques for protecting objects and territories in tabletop groupware (DP, MB, MAN, RLM), pp. 2129–2138.
DHM-2009-YangDZ #bibliography #modelling #perspective- Human Head Modeling and Personal Head Protective Equipment: A Literature Review (J(Y, JD, ZZ), pp. 661–670.
HIMI-II-2009-MinC #approach #generative #personalisation #privacy- An Interactive-Content Technique Based Approach to Generating Personalized Advertisement for Privacy Protection (WHM, YGC), pp. 185–191.
CIKM-2009-LeeLLZ #privacy- Navigational path privacy protection: navigational path privacy protection (KCKL, WCL, HVL, BZ), pp. 691–700.
SAC-2009-CeccatoTPM #orthogonal- Remote software protection by orthogonal client replacement (MC, PT, MDP, AM), pp. 448–455.
SAC-2009-FungCDX #privacy- Privacy protection for RFID data (BCMF, MC, BCD, HX), pp. 1528–1535.
SAC-2009-MonjurA #framework #privacy #towards- Towards a landmark influence framework to protect location privacy (MM, SIA), pp. 219–220.
ESEC-FSE-2009-VarmaSS #memory management- Backward-compatible constant-time exception-protected memory (PV, RKS, HJS), pp. 71–80.
PPoPP-2009-AbadiHM #hardware #memory management #off the shelf #transaction #using- Transactional memory with strong atomicity using off-the-shelf memory protection hardware (MA, TH, MM), pp. 185–196.
DAC-2008-RoyKM #hardware- Protecting bus-based hardware IP by secret sharing (JAR, FK, ILM), pp. 846–851.
DATE-2008-GizopoulosRMS #case study #fault- Soft Errors: System Effects, Protection Techniques and Case Studies (DG, KR, SM, PS).
DATE-2008-WapplerM- Software Protection Mechanisms for Dependable Systems (UW, MM), pp. 947–952.
ICALP-C-2008-CanettiEGL #how- How to Protect Yourself without Perfect Shredding (RC, DE, SG, DYL), pp. 511–523.
ICEIS-DISI-2008-VoS #component #framework- A Framework for Protecting EJB Applications from Malicious Components (HV, MS), pp. 264–269.
CIKM-2008-PanXM #mobile #privacy- Protecting location privacy against location-dependent attack in mobile services (XP, JX, XM), pp. 1475–1476.
ASPLOS-2008-ChenGLSWBDP #approach #named #operating system- Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems (XC, TG, ECL, PS, CAW, DB, JSD, DRKP), pp. 2–13.
HPCA-2008-RogersYCPS #distributed #memory management #multi- Single-level integrity and confidentiality protection for distributed shared memory multiprocessors (BR, CY, SC, MP, YS), pp. 161–172.
TestCom-FATES-2008-ShuCLLSL #framework #named #network #paradigm #security #testing- VCSTC: Virtual Cyber Security Testing Capability — An Application Oriented Paradigm for Network Infrastructure Protection (GS, DC, ZL, NL, LS, DL), pp. 119–134.
ASE-2007-ClauseDOP #effectiveness #memory management #using- Effective memory protection using dynamic tainting (JAC, ID, AO, MP), pp. 284–292.
CASE-2007-WeiJL #automation #industrial #on the- On Protecting Industrial Automation and Control Systems against Electronic Attacks (DW, MAJ, YL), pp. 176–181.
DAC-2007-KumarSCKS #embedded #memory management- A System For Coarse Grained Memory Protection In Tiny Embedded Processors (RK, AS, AC, EK, MBS), pp. 218–223.
DATE-2007-LeveugleAMTMMFRT #evaluation #fault #modelling- Experimental evaluation of protections against laser-induced faults and consequences on fault modeling (RL, AA, VM, ET, PM, CM, NF, JBR, AT), pp. 1587–1592.
DATE-2007-MehraraASCBA #fault #low cost- Low-cost protection for SER upsets and silicon defects (MM, MA, SS, KC, VB, TMA), pp. 1146–1151.
CSMR-2007-MerloLA #automation #injection #php- Automated Protection of PHP Applications Against SQL-injection Attacks (EM, DL, GA), pp. 191–202.
SCAM-2007-MolinaS #approximate #open source #performance #source code #using- Fast Approximate Matching of Programs for Protecting Libre/Open Source Software by Using Spatial Indexes (AJMM, TS), pp. 111–122.
CHI-2007-KumaraguruRACHN #design #email #embedded #evaluation #people- Protecting people from phishing: the design and evaluation of an embedded training email system (PK, YR, AA, LFC, JIH, EN), pp. 905–914.
DHM-2007-HuDYY #3d- Investigation on Ergonomics Characteristics of Protective Clothing Based on Capture of Three-Dimensional Body Movements (HH, LD, CY, XY), pp. 856–864.
HCI-AS-2007-ZhangOD #automation #communication #evaluation #performance- Performance Evaluation for Automatic Protection Switching in a CDMA-TDD Wireless Communication System (LZ, HO, TD), pp. 1200–1209.
SIGIR-2007-JiangSL #privacy- Protecting source privacy in federated search (WJ, LS, JL), pp. 761–762.
SAC-2007-LoukidesS #privacy- Capturing data usefulness and privacy protection in K-anonymisation (GL, JS), pp. 370–374.
SAC-2007-ZhouHP #database #image #using- An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image (XZ, MH, ZP), pp. 254–258.
SOSP-2007-WangFHJ #abstraction #communication #web- Protection and communication abstractions for web browsers in MashupOS (HJW, XF, JH, CJ), pp. 1–16.
CASE-2006-CvetanovicCAGB #component #novel- A Novel Protective Cover in Assembling of Micro Components in a SEM Chamber (AC, AC, DA, IG, WB), pp. 242–246.
DAC-2006-StojanovicBDW #effectiveness #implementation #queue- A cost-effective implementation of an ECC-protected instruction queue for out-of-order microprocessors (VS, RIB, JD, RW), pp. 705–708.
DATE-2006-Kim #fault- Area-efficient error protection for caches (SK), pp. 1282–1287.
DATE-DF-2006-AkselrodAA #architecture #debugging #framework #independence #multi #security- Platform independent debug port controller architecture with security protection for multi-processor system-on-chip ICs (DA, AA, YA), pp. 30–35.
FASE-2006-KochP #self- Engineering Self-protection for Autonomous Systems (MK, KP), pp. 33–47.
ICPR-v4-2006-LinHH #embedded #video- An embedded watermark technique in video for copyright protection (YRL, HYH, WHH), pp. 795–798.
POPL-2006-LuP #encapsulation #representation- Protecting representation with effect encapsulation (YL, JP), pp. 359–371.
ASPLOS-2006-KharbutliJSVP- Comprehensively and efficiently protecting the heap (MK, XJ, YS, GV, MP), pp. 207–218.
ASPLOS-2006-ShyamCPBA #fault #low cost #pipes and filters- Ultra low-cost defect protection for microprocessor pipelines (SS, KC, SP, VB, TMA), pp. 73–82.
HPCA-2006-ShiFGLZY #architecture #in memory #memory management #named #security- InfoShield: a security architecture for protecting information usage in memory (WS, JBF, GG, HHSL, YZ, JY), pp. 222–231.
HPDC-2006-BaiardiRMV #monitoring #policy #virtual machine- Policy Driven Virtual Machine Monitor for Protected Grids (FB, LR, PM, AV), pp. 313–316.
CBSE-2005-Beznosov #architecture #case study #component #design #experience #implementation #web #web service- Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services (KB), pp. 337–352.
DAC-2005-NieKT #incremental #layout- A watermarking system for IP protection by a post layout incremental router (TN, TK, MT), pp. 218–221.
ICEIS-v1-2005-Mattsson #database #encryption #enterprise #implementation- A Practical Implementation of Transparent Encryption and Separation of Duties in Enterprise Databases — Protection against External and Internal Attacks on Databases (UTM), pp. 146–153.
SAC-2005-Hutchinson #future of #information management- The future of systematic information protection (BH), p. 1.
SAC-2005-PowerSPS #query- Protecting sensitive patient data via query modification (DJP, MS, EAP, ACS), pp. 224–230.
SOSP-2005-WitchelRA #linux #memory management #named #using- Mondrix: memory isolation for linux using mondriaan memory protection (EW, JR, KA), pp. 31–44.
DATE-v1-2004-ZambrenoCSN #flexibility #hardware #using- Flexible Software Protection Using Hardware/Software Codesign Techniques (JZ, ANC, RS, BN), pp. 636–641.
VLDB-2004-SionAP- Resilient Rights Protection for Sensor Streams (RS, MJA, SP), pp. 732–743.
ICPR-v4-2004-KitaharaKH #privacy- Stealth Vision for Protecting Privacy (IK, KK, NH), pp. 404–407.
OOPSLA-2004-Fong #verification #virtual machine- Pluggable verification modules: an extensible protection mechanism for the JVM (PWLF), pp. 404–418.
SAC-2004-WaldmannSE #authentication- Protected transmission of biometric user authentication data for oncard-matching (UW, DS, CE), pp. 425–430.
ASPLOS-2004-ZhuangZP #framework #information management #named- HIDE: an infrastructure for efficiently protecting information leakage on the address bus (XZ, TZ, SP), pp. 72–84.
LCTES-2004-SaputraCBVKI #embedded- Code protection for resource-constrained embedded devices (HS, GC, RRB, NV, MTK, MJI), pp. 240–248.
DAC-2003-BeniniMMOPP #analysis #design #difference #energy- Energy-aware design techniques for differential power analysis protection (LB, AM, EM, EO, FP, MP), pp. 36–41.
SIGMOD-2003-SionAP #relational- Rights Protection for Relational Data (RS, MJA, SP), pp. 98–109.
FME-2003-AtiyaKW #semantics- A Circus Semantics for Ravenscar Protected Objects (DAA, SK, JW), pp. 617–635.
ICEIS-v1-2003-BarkerD #database #implementation- Extended Protected Databases: A Practical Implementation (SB, PD), pp. 456–459.
SAC-2003-TraoreK #collaboration- A Protection Scheme for Collaborative Environments (IT, SK), pp. 331–337.
ESEC-FSE-2003-YongH #c #pointer #source code- Protecting C programs from attacks via invalid pointer dereferences (SHY, SH), pp. 307–316.
RE-2002-AlvarezOP #quality #requirements #reuse- Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection (JATÁ, AO, MP), pp. 95–103.
ASPLOS-2002-WitchelCA #memory management- Mondrian memory protection (EW, JC, KA), pp. 304–316.
OSDI-2002-HawblitzelE #flexibility #java #named- Luna: A Flexible Java Protection System (CH, TvE), pp. 391–401.
CBSE-2001-PopovSRR #component- Protective Wrapping of OTS Components (PP, LS, SR, AR), p. 8.
DAC-2001-Qu #component #detection- Publicly Detectable Techniques for the Protection of Virtual Components (GQ), pp. 474–479.
DATE-2001-QuasemG #fault #simulation- Exact fault simulation for systems on Silicon that protects each core’s intellectual property (MSQ, SKG), p. 804.
DAC-2000-DalpassoBB #hardware- Hardware/software IP protection (MD, AB, LB), pp. 593–596.
AdaEurope-2000-WellingsJSKWM #ada #object-oriented #programming- Object-Oriented Programming and Protected Objects in Ada 95 (AJW, BJ, BS, JK, TW, SM), pp. 16–28.
ICSE-2000-KirschS #tutorial- Intellectual property protection for software in the United States and Europe (tutorial session): the changing roles of patents and copyrights (GJK, YS), p. 827.
OSDI-2000-StrunkGSSG #self- Self-Securing Storage: Protecting Data in Compromised Systems (JDS, GRG, MLS, CANS, GRG), pp. 165–180.
CL-2000-Barker #logic programming- Data Protection by Logic Programming (SB), pp. 1300–1314.
DAC-1999-HongP #behaviour #synthesis- Behavioral Synthesis Techniques for Intellectual Property Protection (IH, MP), pp. 849–854.
DAC-1999-LachMP #multi #robust- Robust FPGA Intellectual Property Protection Through Multiple Small Watermarks (JL, WHMS, MP), pp. 831–836.
AdaEurope-1999-LundqvistAM #ada #formal method- A Formal Model of the Ada Ravenscar Tasking Profile; Protected Objects (KL, LA, SM), pp. 12–25.
TOOLS-PACIFIC-1999-NobleCP #alias- Object Ownership for Dynamic Alias Protection (JN, DGC, JP), pp. 176–187.
SOSP-1999-ChiuehVP #performance #segmentation- Integrating segmentation and paging protection for safe, efficient and transparent software extensions (TcC, GV, PP), pp. 140–153.
DAC-1998-KahngLMMMPTWW- Watermarking Techniques for Intellectual Property Protection (ABK, JL, WHMS, SM, ILM, MP, PT, HW, GW), pp. 776–781.
CSMR-1998-JensenH #configuration management #reuse- Protection Reconfiguration for Reusable Software (CDJ, DH), pp. 74–81.
STOC-1998-GertnerIKM #information retrieval #privacy- Protecting Data Privacy in Private Information Retrieval Schemes (YG, YI, EK, TM), pp. 151–160.
ICALP-1998-Abadi- Protection in Programming-Language Translations (MA), pp. 868–883.
SIGAda-1998-KiddleW- Extensible Protected Types (OPK, AJW), pp. 229–239.
SIGAda-1998-LiBY #ada- Transforming Ada Serving Tasks into Protected Objects (BL, BX, HY), pp. 240–245.
SIGAda-1998-MacosM- The Rendezvous is Dead — Long Live the Protected Object (DM, FM), pp. 287–293.
ECOOP-1998-NobleVP #alias #flexibility- Flexible Alias Protection (JN, JV, JP), pp. 158–185.
OOPSLA-1998-ClarkePN #alias #flexibility- Ownership Types for Flexible Alias Protection (DGC, JP, JN), pp. 48–64.
HPCA-1998-MackenzieKFLLAK #performance- Exploiting Two-Case Delivery for Fast Protected Messaging (KM, JK, MF, WL, VL, AA, MFK), pp. 231–242.
TRI-Ada-1997-KaiserP #case study #implementation #reliability #resource management- Comparing the Reliability Provided by Tasks or Protected Objects for Implementing a Resource Allocation Service: a Case Study (CK, JFPP), pp. 51–65.
HPCA-1997-LimHPS #clustering #communication #performance- Message Proxies for Efficient, Protected Communication on SMP Clusters (BHL, PH, PP, MS), pp. 116–127.
STOC-1996-DworkLN #self- Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version) (CD, JBL, MN), pp. 489–498.
AdaEurope-1996-MundieFK #embedded #implementation- Implementing Protected Types on Embedded Targets (DM, JF, EK), pp. 287–297.
HPCA-1996-BlumrichDFL #interface #network- Protected, User-Level DMA for the SHRIMP Network Interface (MAB, CD, EWF, KL), pp. 154–165.
STOC-1995-BellareGG #encryption #incremental- Incremental cryptography and application to virus protection (MB, OG, SG), pp. 45–56.
DAC-1994-Fernandez #industrial- Intellectual Property Protection in the EDA Industry (DSF), pp. 161–163.
FME-1994-Simpson #automation #specification- A Formal Specification of an Automatic Train Protection System (AS), pp. 602–617.
SEKE-1994-ZhuHM #information management #testing- Knowledge engineering helps testing protection software (HZ, PAVH, JHRM), pp. 116–123.
ECOOP-1994-Hagimont #distributed #object-oriented- Protection in the Guide Object-Oriented Distributed System (DH), pp. 280–298.
TRI-Ada-1993-Nycum- Protecting Intellectual Property Rights in Software (SHN), pp. 410–421.
SOSP-1993-HoskingM #memory management #object-oriented- Protection Traps and Alternatives for Memory Management of an Object-Oriented Language (ALH, JEBM), pp. 106–119.
TRI-Ada-C-1992-Reed #ada #case study #experience #implementation- Experiences in Implementing Ada 9X Protected Records and Requeue (PR), pp. 62–67.
OOPSLA-1992-RichardsonSC #fine-grained #named #performance- CACL: Efficient Fine-Grained Protection for Objects (JER, PMS, LFC), pp. 263–275.
SOSP-WIP-1991-Druschel92 #architecture #composition #kernel #orthogonal #why- Modularity and Protection are Orthogonal, or “Why µ-kernel Architectures are Flawed” (Abstract) (PD), p. 22.
PODS-1991-MalvestutoMR #2d #information management #statistics- Suppressing Marginal Cells to Protect Sensitive Information in a Two-Dimensional Statistical Table (FMM, MM, MR), pp. 252–258.
VLDB-1991-SullivanS #data type #database #fault tolerance #using- Using Write Protected Data Structures To Improve Software Fault Tolerance in Highly Available Database Management Systems (MS, MS), pp. 171–180.
OOPSLA-1991-Hogg #alias #named #object-oriented- Islands: Aliasing Protection in Object-Oriented Languages (JH), pp. 271–285.
CAV-1991-BarbeauB #approach #fault #petri net #using #verification- The Lotos Model of a Fault Protected System and its Verification Using a Petri Net Based Approach (MB, GvB), pp. 103–113.
DAC-1989-SilvaGKN #version control- Protection and Versioning for OCT (MJS, DG, RHK, RN), pp. 264–269.
CHI-1989-Samuelson #user interface- Protecting user interfaces through copyright: the debate (PS), pp. 97–104.
STOC-1987-Goldreich #formal method #simulation #towards- Towards a Theory of Software Protection and Simulation by Oblivious RAMs (OG), pp. 182–194.
CADE-1984-MinkerP- Applications of Protected Circumscription (JM, DP), pp. 414–425.
VLDB-1982-Leiss #database #statistics- Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise (ELL), pp. 189–196.
ASPLOS-1982-Jones #design- Systematic Protection Mechanism Design (DWJ), pp. 77–80.
ASPLOS-1982-Wilkes #hardware #implementation #memory management- Hardware Support for Memory Protection: Capability Implementations (MVW), pp. 107–116.
SOSP-1981-Bishop- Hierarchical Take-Grant Protection Systems (MB), pp. 109–122.
SOSP-1979-BishopS #information management- The Transfer of Information and Authority in a Protection System (MB, LS), pp. 45–54.
VLDB-1978-HuberL #information management- Information Protection by Method Base Systems (RH, PCL), pp. 420–426.
ICSE-1978-Cook #memory management- Measuring Memory Protection (DC), pp. 281–287.
SIGMOD-1977-YuC #case study #database #statistics- A Study on the Protection of Statistical Data Bases (CTY, FYLC), pp. 169–181.
VLDB-1977-BancilhonS #database #relational- Protection of Information in Relational Data Bases (FB, NS), pp. 494–500.
SOSP-1977-NeedhamW- The Cambridge CAP Computer and its Protection System (RMN, RDHW), pp. 1–10.
SOSP-1977-Snyder #analysis #on the #synthesis- On the Synthesis and Analysis of Protection Systems (LS), pp. 141–150.
VLDB-1976-HartsonH #database #semantics- A Semantic Model for Data Base Protection Languages (HRH, DKH), pp. 27–42.
ICSE-1976-Voges #aspect-oriented #design #validation- Aspects of Design, Test and Validation of the Software for a Computerized Reactor Protection System (UV), pp. 606–610.
SOSP-1975-CohenJ #operating system- Protection in the HYDRA Operating System (ESC, DJ), pp. 141–160.
SOSP-1975-HarrisonRU #on the #operating system- On Protection in Operating System (MAH, WLR, JDU), pp. 14–24.
SOSP-1973-Saltzer #information management #multi- Protection and the Control of Information Sharing in MULTICS (JHS), p. 119.
SOSP-J-1973-SchroederS72 #architecture #hardware #implementation- A Hardware Architecture for Implementing Protection Rings (MDS, JHS), pp. 157–170.
SOSP-1971-SchroederS #architecture #hardware #implementation- A Hardware Architecture for Implementing Protection Rings (Abstract) (MDS, JHS), pp. 42–54.
SOSP-1967-Graham68 #information management- Protection in an information processing utility (RMG), pp. 365–369.