Abstract is missing.
- Some thoughts on security after ten years of qmail 1.0Daniel J. Bernstein. 1-10 [doi]
- Yet another MicroArchitectural Attack: : exploiting I-CacheOnur AciiƧmez. 11-18 [doi]
- A flexible security architecture to support third-party applications on mobile devicesLieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe. 19-28 [doi]
- Protecting users from themselves William Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, Patrick McDaniel. 29-36 [doi]
- Analysis of three multilevel security architecturesTimothy E. Levin, Cynthia E. Irvine, Clark Weissman, Thuy D. Nguyen. 37-46 [doi]
- Implementing middleware for content filtering and information flow controlJeffrey Choi Robinson, W. Scott Harrison, Nadine Hanebutte, Paul W. Oman, Jim Alves-Foss. 47-53 [doi]
- Improving multi-tier security using redundant authenticationJodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita Borisov, Carl A. Gunter, David Raila. 54-62 [doi]
- A data outsourcing architecture combining cryptography and access controlSabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. 63-69 [doi]
- A cryptographic access control architecture secure against privileged attackersChristian Payne. 70-76 [doi]
- Non-volatile memory and disks: avenues for policy architecturesKevin R. B. Butler, Stephen E. McLaughlin, Patrick Drew McDaniel. 77-84 [doi]