BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
secur (7)
system (4)
applic (4)
data (4)
use (4)

Stem untrust$ (all stems)

21 papers:

STOCSTOC-2014-MillerS #protocol #quantum #robust #using
Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
OSDIOSDI-2014-BaumannPH
Shielding Applications from an Untrusted Cloud with Haven (AB, MP, GCH), pp. 267–283.
ASPLOSASPLOS-2013-CheckowayS #api #why
Iago attacks: why the system call API is a bad untrusted RPC interface (SC, HS), pp. 253–264.
ASPLOSASPLOS-2013-HofmannKDLW #named #operating system
InkTag: secure applications on an untrusted operating system (OSH, SK, AMD, MZL, EW), pp. 265–278.
HPCAHPCA-2013-XiaLC #architecture #physics #virtual machine
Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks (YX, YL, HC), pp. 246–257.
OSDIOSDI-2012-GiffinLSTMMR #named #privacy #web
Hails: Protecting Data Privacy in Untrusted Web Applications (DBG, AL, DS, DT, DM, JCM, AR), pp. 47–60.
DACDAC-2010-Potkonjak #synthesis #tool support #using
Synthesis of trustable ICs using untrusted CAD tools (MP), pp. 633–634.
OSDIOSDI-2010-FeldmanZFF #collaboration #named #using
SPORC: Group Collaboration using Untrusted Cloud Resources (AJF, WPZ, MJF, EWF), pp. 337–350.
AdaEuropeAdaEurope-2006-NarayananKBK #execution
Secure Execution of Computations in Untrusted Hosts (SHKN, MTK, RRB, IK), pp. 106–118.
ASEASE-2005-Dolstra #deployment
Secure sharing between untrusted users in a transparent source/binary deployment model (ED), pp. 154–163.
OSDIOSDI-2004-LiKMS #repository
Secure Untrusted Data Repository (SUNDR) (JL, MNK, DM, DS), pp. 121–136.
ICALPICALP-2003-BugliesiCPS #network
Secrecy in Untrusted Networks (MB, SC, AP, VS), pp. 969–983.
ESEC-FSEESEC-FSE-2003-LeeA #component
Policy-enforced linking of untrusted components (EL, AWA), pp. 371–374.
SOSPSOSP-2003-LieTH #hardware #implementation #operating system
Implementing an untrusted operating system on trusted hardware (DL, CAT, MH), pp. 178–192.
SOSPSOSP-2003-PatelWWLS #mobile #protocol #using
Upgrading transport protocols using untrusted mobile code (PP, AW, DW, JL, TS), pp. 1–14.
SOSPSOSP-2003-SekarVBBD #approach #execution
Model-carrying code: a practical approach for safe execution of untrusted applications (RS, VNV, SB, SB, DCD), pp. 15–28.
LICSLICS-2003-NeculaS #framework #generative
A Sound Framework for Untrusted Verification-Condition Generators (GCN, RRS), pp. 248–260.
VLDBVLDB-2002-BouganimP #data access
Chip-Secured Data Access: Confidential Data on Untrusted Servers (LB, PP), pp. 131–142.
POPLPOPL-2001-NeculaR
Oracle-based checking of untrusted software (GCN, SPR), pp. 142–154.
SOSPSOSP-2001-ZdancewicZNM #clustering
Untrusted Hosts and Confidentiality: Secure Program Partitioning (SZ, LZ, NN, ACM), pp. 1–14.
OSDIOSDI-2000-MaheshwariVS #database #how
How to Build a Trusted Database System on Untrusted Storage (UM, RV, WS), pp. 135–150.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.