Search dblp for Publications

export results for "toc:db/conf/ccs/ccsw2011.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/BensonDS11,
  author       = {Karyn Benson and
                  Rafael Dowsley and
                  Hovav Shacham},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Do you know where your cloud files are?},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {73--82},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046677},
  doi          = {10.1145/2046660.2046677},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BensonDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BleikertzGM11,
  author       = {S{\"{o}}ren Bleikertz and
                  Thomas Gro{\ss} and
                  Sebastian M{\"{o}}dersheim},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Automated verification of virtualized infrastructures},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {47--58},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046672},
  doi          = {10.1145/2046660.2046672},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BleikertzGM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Brown11,
  author       = {Timothy G. Brown},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Cloud security: myth or reality?},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {59--60},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046674},
  doi          = {10.1145/2046660.2046674},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Brown11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BrownC11,
  author       = {Andrew Brown and
                  Jeffrey S. Chase},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Trusted platform-as-a-service: a foundation for trustworthy cloud-hosted
                  applications},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {15--20},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046665},
  doi          = {10.1145/2046660.2046665},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BrownC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DanezisL11,
  author       = {George Danezis and
                  Benjamin Livshits},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Towards ensuring client-side computational integrity},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {125--130},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046683},
  doi          = {10.1145/2046660.2046683},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DanezisL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GoodrichMOT11,
  author       = {Michael T. Goodrich and
                  Michael Mitzenmacher and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Oblivious {RAM} simulation with efficient worst-case access overhead},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {95--100},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046680},
  doi          = {10.1145/2046660.2046680},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GoodrichMOT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GordonB11,
  author       = {David G. Gordon and
                  Travis D. Breaux},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Managing multi-jurisdictional requirements in the cloud: towards a
                  computational legal landscape},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {83--94},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046678},
  doi          = {10.1145/2046660.2046678},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GordonB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IdziorekTJ11,
  author       = {Joseph Idziorek and
                  Mark Tannian and
                  Douglas Jacobson},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Detecting fraudulent use of cloud resources},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {61--72},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046676},
  doi          = {10.1145/2046660.2046676},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/IdziorekTJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KarameCM11,
  author       = {Ghassan Karame and
                  Srdjan Capkun and
                  Ueli Maurer},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Privacy-preserving outsourcing of brute-force key searches},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {101--112},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046681},
  doi          = {10.1145/2046660.2046681},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KarameCM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kaufman11,
  author       = {Charlie Kaufman},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {What's different about security in a public cloud?},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {27--28},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046668},
  doi          = {10.1145/2046660.2046668},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Kaufman11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Manferdelli11,
  author       = {John Manferdelli},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Clouds and their discontents},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046662},
  doi          = {10.1145/2046660.2046662},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Manferdelli11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaehrigLV11,
  author       = {Michael Naehrig and
                  Kristin E. Lauter and
                  Vinod Vaikuntanathan},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Can homomorphic encryption be practical?},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {113--124},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2046682},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NaehrigLV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SekarM11,
  author       = {Vyas Sekar and
                  Petros Maniatis},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Verifiable resource accounting for cloud computing services},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {21--26},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046666},
  doi          = {10.1145/2046660.2046666},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SekarM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SomorovskyHJSGI11,
  author       = {Juraj Somorovsky and
                  Mario Heiderich and
                  Meiko Jensen and
                  J{\"{o}}rg Schwenk and
                  Nils Gruschka and
                  Luigi Lo Iacono},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {All your clouds are belong to us: security analysis of cloud management
                  interfaces},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046664},
  doi          = {10.1145/2046660.2046664},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SomorovskyHJSGI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VattikondaDS11,
  author       = {Bhanu Chandra Vattikonda and
                  Sambit Das and
                  Hovav Shacham},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Eliminating fine grained timers in Xen},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {41--46},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046671},
  doi          = {10.1145/2046660.2046671},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/VattikondaDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuBJJHS11,
  author       = {Yunjing Xu and
                  Michael D. Bailey and
                  Farnam Jahanian and
                  Kaustubh R. Joshi and
                  Matti A. Hiltunen and
                  Richard D. Schlichting},
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {An exploration of {L2} cache covert channels in virtualized environments},
  booktitle    = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  pages        = {29--40},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046660.2046670},
  doi          = {10.1145/2046660.2046670},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuBJJHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011ccsw,
  editor       = {Christian Cachin and
                  Thomas Ristenpart},
  title        = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2011, Chicago, IL, USA, October 21, 2011},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {http://dl.acm.org/citation.cfm?id=2046660},
  isbn         = {978-1-4503-1004-8},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2011ccsw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}