Reconciling Belief and Vulnerability in Information Flow (English)
- New search for: Hamadou, Sardaouna
- New search for: Sassone, Vladimiro
- New search for: Palamidessi, Catuscia
- New search for: Hamadou, Sardaouna
- New search for: Sassone, Vladimiro
- New search for: Palamidessi, Catuscia
In:
SP, IEEE Symposium on Security and Privacy, 2010
;
79-92
;
2010
-
ISBN:
- Conference paper / Print
-
Title:Reconciling Belief and Vulnerability in Information Flow
-
Contributors:
-
Published in:
-
Publisher:
- New search for: IEEE Computer Society
-
Place of publication:Los Alamitos
-
Publication date:2010
-
Size:14 Seiten, 38 Quellen
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Reflections on the 30th Anniversary of the IEEE Symposium on Security and PrivacyNeumann, Peter G. / Bishop, Matt / Peisert, Sean / Schaefer, Marv et al. | 2010
- 45
-
Synthesizing Near-Optimal Malware Specifications from Suspicious BehaviorsFredrikson, Matt / Jha, Somesh / Christodorescu, Mihai / Sailer, Reiner / Yan, Xifeng et al. | 2010
- 79
-
Reconciling Belief and Vulnerability in Information FlowHamadou, Sardaouna / Sassone, Vladimiro / Palamidessi, Catuscia et al. | 2010
- 143
-
TrustVisor: efficient TCB reduction and attestationMcCune, Jonathan M. / Li, Yanlin / Qu, Ning / Zhou, Zongwei / Anupam, Datta / Gligor, Virgil / Perrig, Adrian et al. | 2010
- 207
-
Investigation of triangular spamming: a stealthy and efficient spamming techniqueQian, Zhiyun / Mao, Z.Morley / Xie, Yinglian / Yu, Fang et al. | 2010
- 239
-
SCiFI - a system for secure face identificationOsadchy, Margarita / Pinkas, Benny / Jarrous, Ayman / Moskovich, Boaz et al. | 2010
- 257
-
Round-Efficient Broadcast Authentication Protocols for Fixed Topology ClassesChan, Haowen / Perrig, Adrian et al. | 2010
- 365
-
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure SizeFranklin, Jason / Chaki, Sagar / Datta, Anupam / Seshadri, Arvind et al. | 2010
- 380
-
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow IntegrityWang, Zhi / Jiang, Xuxian et al. | 2010
- 447
-
Experimental Security Analysis of a Modern AutomobileKoscher, Karl / Czeskis, Alexei / Roesner, Franziska / Patel, Shwetak / Kohno, Tadayoshi / Checkoway, Stephen / McCoy, Damon / Kantor, Brian / Anderson, Danny / Shacham, Hovav et al. | 2010
- 532
-
[Publisher's information]| 2010
- C1
-
[Front cover]| 2010
- i
-
[Title page i]| 2010
- iii
-
[Title page iii]| 2010
- iv
-
[Copyright notice]| 2010
- v
-
Table of contents| 2010
- xi
-
Organizing Committee| 2010
- xii
-
Program Committee| 2010
- xiii
-
Additional reviewers| 2010