BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
secur (7)
system (4)
applic (4)
data (4)
use (4)

Stem untrust$ (all stems)

21 papers:

STOCSTOC-2014-MillerS #protocol #quantum #robust #using
Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
Shielding Applications from an Untrusted Cloud with Haven (AB, MP, GCH), pp. 267–283.
ASPLOSASPLOS-2013-CheckowayS #api #why
Iago attacks: why the system call API is a bad untrusted RPC interface (SC, HS), pp. 253–264.
ASPLOSASPLOS-2013-HofmannKDLW #named #operating system
InkTag: secure applications on an untrusted operating system (OSH, SK, AMD, MZL, EW), pp. 265–278.
HPCAHPCA-2013-XiaLC #architecture #physics #virtual machine
Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks (YX, YL, HC), pp. 246–257.
OSDIOSDI-2012-GiffinLSTMMR #named #privacy #web
Hails: Protecting Data Privacy in Untrusted Web Applications (DBG, AL, DS, DT, DM, JCM, AR), pp. 47–60.
DACDAC-2010-Potkonjak #synthesis #tool support #using
Synthesis of trustable ICs using untrusted CAD tools (MP), pp. 633–634.
OSDIOSDI-2010-FeldmanZFF #collaboration #named #using
SPORC: Group Collaboration using Untrusted Cloud Resources (AJF, WPZ, MJF, EWF), pp. 337–350.
AdaEuropeAdaEurope-2006-NarayananKBK #execution
Secure Execution of Computations in Untrusted Hosts (SHKN, MTK, RRB, IK), pp. 106–118.
ASEASE-2005-Dolstra #deployment
Secure sharing between untrusted users in a transparent source/binary deployment model (ED), pp. 154–163.
OSDIOSDI-2004-LiKMS #repository
Secure Untrusted Data Repository (SUNDR) (JL, MNK, DM, DS), pp. 121–136.
ICALPICALP-2003-BugliesiCPS #network
Secrecy in Untrusted Networks (MB, SC, AP, VS), pp. 969–983.
ESEC-FSEESEC-FSE-2003-LeeA #component
Policy-enforced linking of untrusted components (EL, AWA), pp. 371–374.
SOSPSOSP-2003-LieTH #hardware #implementation #operating system
Implementing an untrusted operating system on trusted hardware (DL, CAT, MH), pp. 178–192.
SOSPSOSP-2003-PatelWWLS #mobile #protocol #using
Upgrading transport protocols using untrusted mobile code (PP, AW, DW, JL, TS), pp. 1–14.
SOSPSOSP-2003-SekarVBBD #approach #execution
Model-carrying code: a practical approach for safe execution of untrusted applications (RS, VNV, SB, SB, DCD), pp. 15–28.
LICSLICS-2003-NeculaS #framework #generative
A Sound Framework for Untrusted Verification-Condition Generators (GCN, RRS), pp. 248–260.
VLDBVLDB-2002-BouganimP #data access
Chip-Secured Data Access: Confidential Data on Untrusted Servers (LB, PP), pp. 131–142.
Oracle-based checking of untrusted software (GCN, SPR), pp. 142–154.
SOSPSOSP-2001-ZdancewicZNM #clustering
Untrusted Hosts and Confidentiality: Secure Program Partitioning (SZ, LZ, NN, ACM), pp. 1–14.
OSDIOSDI-2000-MaheshwariVS #database #how
How to Build a Trusted Database System on Untrusted Storage (UM, RV, WS), pp. 135–150.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.