Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Untrusted'
Untrusted published presentations and documents on DocSlides.
Shielding Applications from an
by cheryl-pisano
Untrusted. Cloud. Andrew Baumann, Marcus . Peina...
A Secure Environment for Untrusted Helper Applications
by min-jolicoeur
(. Confining the Wily Hacker. ). Ian Goldberg, Da...
Safety on the Wild and Wooly World-Wide Web:
by natalia-silvester
Sandboxing . Untrusted. JavaScript . John Mitche...
A Secure Environment for Untrusted Helper Applications
by olivia-moreira
(. Confining the Wily Hacker. ). Ian Goldberg, Da...
Airavat
by test
: Security and Privacy for . MapReduce. Indrajit ...
Safety on the Wild and Wooly World-Wide Web:
by marina-yarberry
Sandboxing . Untrusted. JavaScript . John Mitche...
Safety on the Wild and Wooly World-Wide Web:
by lois-ondreau
Sandboxing . Untrusted. JavaScript . John Mitche...
1 Ghosts of XSS Past, Present and Future
by alida-meadow
2. Jim Manico. VP Security Architecture, WhiteHa...
ver 2.7 widescreen Secure Execution of Mutually Mistrusting Software
by mentegor
Dongli. Zhang. dozhang@cs.stonybrook.edu. @ . RPE...
Airavat : Security and Privacy for
by ashley
MapReduce. Indrajit Roy. , . Srinath. T.V. . Sett...
Beauty Is in the Eye of the Beholder
by jane-oiler
Dimitri DeFigueiredo Earl Barr S...
Presented by,
by lois-ondreau
. Sai. . Ch...
Ankur Taly
by min-jolicoeur
Stanford University. Joint work with. Úlfar. E...
InkTag
by karlyn-bohler
: Secure Applications on an Untrusted Operating s...
A SECURE JAILING SYSTEM FOR
by min-jolicoeur
CONFINING . UNTRUSTED. APPLICATIONS. Guido . Noo...
A SECURE JAILING SYSTEM FOR
by sherrill-nordquist
CONFINING . UNTRUSTED. APPLICATIONS. Guido . Noo...
A Large-Scale Study of
by olivia-moreira
Mobile Web App Security. Patrick . Mutchler. , Ad...
Quantification of Integrity
by alida-meadow
Michael Clarkson and Fred B. Schneider. Cornell U...
Summary on S
by ellena-manuel
CRIPT. G. ARD. Automatic . Context-Sensitive Sani...
Minimizing Service Loss and Data Theft
by danika-pritchard
Protecting Against Spoofing Attacks. Cisco Cataly...
Bigscholar 2014, April 8, Seoul, South Korea
by natalia-silvester
1. Trust and Hybrid Reasoning for Ontological Kno...
MITLaboratoryforComputerScience,March2002TheUntrustedComputerProbleman
by faustina-dinatale
Untrusted networkApplication serverdevice+UserUser
Quantification of Integrity
by alida-meadow
Michael Clarkson and Fred B. Schneider. Cornell U...
Command Injection Attacks
by conchita-marotz
CSE 591 – Security and Vulnerability Analysis. ...
Quantification
by jane-oiler
of Integrity. Michael Clarkson and Fred B. Schnei...
IntScope
by natalia-silvester
-Automatically Detecting Integer Overflow Vulnera...
Quantification
by tatyana-admore
of Integrity. Michael Clarkson and Fred B. Schnei...
A Large-Scale Study of
by min-jolicoeur
Mobile Web App Security. Patrick . Mutchler. , Ad...
Practical Private Range Search Revisited
by natalia-silvester
Ioannis . Demertzis. *. University of Maryland. y...
Sandboxing
by lois-ondreau
Untrusted. JavaScript . John Mitchell. Stanford....
Quantification of Integrity
by calandra-battersby
Michael Clarkson and Fred B. Schneider. Cornell U...
Modern Systems: Security
by tatiana-dople
Presented by Andrew Ferraiuolo . Cornell Universi...
Bromium vSentry Adrian Taylor
by yoshiko-marsland
Director, Mobile. . Paid. 3644-2276-1234-5678....
Beauty Is in the Eye of the Beholder
by tatiana-dople
Dimitri DeFigueiredo Earl Barr S...
ASAP 2017 - The 28th Annual IEEE International Conference
by fullyshro
on Application. -specific Systems, Architectures a...
by blondield
Guoxing Chen. 1. * & Wenhao Wang. 2,3. *,. . ...
Publicly verifiable Grouped Aggregation Queries on
by eddey
Outsourced Data Streams. Suman Nath. Microsoft Re...
Load More...