default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccsw2011.bht:"
@inproceedings{DBLP:conf/ccs/BensonDS11, author = {Karyn Benson and Rafael Dowsley and Hovav Shacham}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Do you know where your cloud files are?}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {73--82}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046677}, doi = {10.1145/2046660.2046677}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BensonDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BleikertzGM11, author = {S{\"{o}}ren Bleikertz and Thomas Gro{\ss} and Sebastian M{\"{o}}dersheim}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Automated verification of virtualized infrastructures}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {47--58}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046672}, doi = {10.1145/2046660.2046672}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BleikertzGM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Brown11, author = {Timothy G. Brown}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Cloud security: myth or reality?}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {59--60}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046674}, doi = {10.1145/2046660.2046674}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Brown11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrownC11, author = {Andrew Brown and Jeffrey S. Chase}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Trusted platform-as-a-service: a foundation for trustworthy cloud-hosted applications}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {15--20}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046665}, doi = {10.1145/2046660.2046665}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BrownC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DanezisL11, author = {George Danezis and Benjamin Livshits}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Towards ensuring client-side computational integrity}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {125--130}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046683}, doi = {10.1145/2046660.2046683}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DanezisL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoodrichMOT11, author = {Michael T. Goodrich and Michael Mitzenmacher and Olga Ohrimenko and Roberto Tamassia}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Oblivious {RAM} simulation with efficient worst-case access overhead}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {95--100}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046680}, doi = {10.1145/2046660.2046680}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GoodrichMOT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GordonB11, author = {David G. Gordon and Travis D. Breaux}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Managing multi-jurisdictional requirements in the cloud: towards a computational legal landscape}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {83--94}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046678}, doi = {10.1145/2046660.2046678}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GordonB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IdziorekTJ11, author = {Joseph Idziorek and Mark Tannian and Douglas Jacobson}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Detecting fraudulent use of cloud resources}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {61--72}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046676}, doi = {10.1145/2046660.2046676}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/IdziorekTJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KarameCM11, author = {Ghassan Karame and Srdjan Capkun and Ueli Maurer}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Privacy-preserving outsourcing of brute-force key searches}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {101--112}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046681}, doi = {10.1145/2046660.2046681}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KarameCM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kaufman11, author = {Charlie Kaufman}, editor = {Christian Cachin and Thomas Ristenpart}, title = {What's different about security in a public cloud?}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {27--28}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046668}, doi = {10.1145/2046660.2046668}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kaufman11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Manferdelli11, author = {John Manferdelli}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Clouds and their discontents}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {1--2}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046662}, doi = {10.1145/2046660.2046662}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Manferdelli11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaehrigLV11, author = {Michael Naehrig and Kristin E. Lauter and Vinod Vaikuntanathan}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Can homomorphic encryption be practical?}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {113--124}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2046682}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NaehrigLV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SekarM11, author = {Vyas Sekar and Petros Maniatis}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Verifiable resource accounting for cloud computing services}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {21--26}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046666}, doi = {10.1145/2046660.2046666}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SekarM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SomorovskyHJSGI11, author = {Juraj Somorovsky and Mario Heiderich and Meiko Jensen and J{\"{o}}rg Schwenk and Nils Gruschka and Luigi Lo Iacono}, editor = {Christian Cachin and Thomas Ristenpart}, title = {All your clouds are belong to us: security analysis of cloud management interfaces}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {3--14}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046664}, doi = {10.1145/2046660.2046664}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SomorovskyHJSGI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VattikondaDS11, author = {Bhanu Chandra Vattikonda and Sambit Das and Hovav Shacham}, editor = {Christian Cachin and Thomas Ristenpart}, title = {Eliminating fine grained timers in Xen}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {41--46}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046671}, doi = {10.1145/2046660.2046671}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/VattikondaDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuBJJHS11, author = {Yunjing Xu and Michael D. Bailey and Farnam Jahanian and Kaustubh R. Joshi and Matti A. Hiltunen and Richard D. Schlichting}, editor = {Christian Cachin and Thomas Ristenpart}, title = {An exploration of {L2} cache covert channels in virtualized environments}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {29--40}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046670}, doi = {10.1145/2046660.2046670}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuBJJHS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2011ccsw, editor = {Christian Cachin and Thomas Ristenpart}, title = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, publisher = {{ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=2046660}, isbn = {978-1-4503-1004-8}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2011ccsw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.