Skip to main content
Kent Academic Repository

Browse by Person (creator, editor, contributor, etc.)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date | No Grouping
Number of items: 5.

Hosek, Petr and Migliavacca, Matteo and Papagiannis, Ioannis and Eyers, David M. and Evans, David and Shand, Brian and Bacon, Jean and Pietzuch, Peter (2011) SafeWeb: A Middleware for Securing Ruby-Based Web Applications. In: Lecture Notes in Computer Science. Springer-Verlag Berlin pp. 491-511. (doi:https://doi.org/10.1007/978-3-642-25821-3_25) (Full text available)
[img]
Preview

Papagiannis, Ioannis and Migliavacca, Matteo and Eyers, David M. and Shand, Brian and Bacon, Jean and Pietzuch, Peter (2010) Enforcing user privacy in web applications using Erlang. In: W2SP 2010: Web 2.0 security and privacy 2010, May 20th, 2010, The Claremont Resort, Oakland, California. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Migliavacca, Matteo and Papagiannis, Ioannis and Eyers, David M. and Shand, Brian and Bacon, Jean and Pietzuch, Peter (2010) DEFCON: high-performance event processing with information security. In: USENIX ATC'10: Proceedings of the 2010 USENIX Annual Technical Conference. USENIX Association, Berkeley, CA, USA pp. 1-15. (Full text available)
[img]
Preview

Migliavacca, Matteo and Papagiannis, Ioannis and Eyers, David M. and Shand, Brian and Bacon, Jean and Pietzuch, Peter (2010) Distributed Middleware Enforcement of Event Flow Security Policy. In: Gupta, Indrani and Mascolo, Cecilia, eds. Middleware '10: Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware. Lecture Notes in Computer Science, 6452. Springer Berlin Heidelberg pp. 334-354. ISBN 978-3-642-16954-0. (doi:https://doi.org/10.1007/978-3-642-16955-7_17) (Full text available)
[img]
Preview

Bacon, Jean and Evans, David and Eyers, David M. and Migliavacca, Matteo and Pietzuch, Peter and Shand, Brian (2010) Enforcing End-to-End Application Security in the Cloud. In: Middleware 2010. Lecture Notes in Computer Science, 6452. Springer Berlin Heidelberg pp. 293-312. ISBN 978-3-642-16954-0. (doi:https://doi.org/10.1007/978-3-642-16955-7_15) (Full text available)
[img]
Preview

This list was generated on Mon May 13 15:07:18 2019 BST.