From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Groundhog: Efficient Request Isolation in FaaS., , , и . EuroSys, стр. 398-415. ACM, (2023)Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud., , , , , и . USENIX Security Symposium, стр. 2819-2838. USENIX Association, (2022)Thoth: Comprehensive Policy Compliance in Data Retrieval Systems., , , , и . USENIX Security Symposium, стр. 637-654. USENIX Association, (2016)A Proof-Carrying File System with Revocable and Use-Once Certificates., , и . STM, том 7170 из Lecture Notes in Computer Science, стр. 40-55. Springer, (2011)Policy auditing over incomplete logs: theory, implementation and applications., , и . CCS, стр. 151-162. ACM, (2011)An Authorization Logic With Explicit Time., , и . CSF, стр. 133-145. IEEE Computer Society, (2008)Non-Interference in Constructive Authorization Logic., и . CSFW, стр. 283-296. IEEE Computer Society, (2006)Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction., , и . CSF, стр. 139-153. IEEE Computer Society, (2012)Experiences in the logical specification of the HIPAA and GLBA privacy laws., , , , и . WPES, стр. 73-82. ACM, (2010)Bootstrap sequential projection multi kernel Locality Sensitive Hashing., и . ICACCI, стр. 213-218. IEEE, (2014)