Abstract is missing.
- A security architecture for transient trustCynthia E. Irvine, Timothy E. Levin, Paul C. Clark, Thuy D. Nguyen. 1-8 [doi]
- Personalized access control for a personally controlled health recordLillian Røstad, Øystein Nytrø. 9-16 [doi]
- An access control reference architectureAmir Jerbi, Ethan Hadar, Carrie Gates, Dmitry Grebenev. 17-24 [doi]
- Deconstructing new cache designs for thwarting software cache-based side channel attacksJingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou. 25-34 [doi]
- Flexible security configuration for virtual machinesSandra Rueda, Yogesh Sreenivasan, Trent Jaeger. 35-44 [doi]
- Asynchronous policy evaluation and enforcementMatthew Burnside, Angelos D. Keromytis. 45-50 [doi]
- Using rhythmic nonces for puzzle-based DoS resistanceEllick Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, Daniel Rebolledo. 51-58 [doi]
- Beacon certificate push revocationJon A. Solworth. 59-66 [doi]