Skip to main content
Kent Academic Repository

Browse by Person (creator, editor, contributor, etc.)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date | No Grouping
Number of items: 7.

2011

Hosek, Petr and Migliavacca, Matteo and Papagiannis, Ioannis and Eyers, David M. and Evans, David and Shand, Brian and Bacon, Jean and Pietzuch, Peter (2011) SafeWeb: A Middleware for Securing Ruby-Based Web Applications. In: Lecture Notes in Computer Science. Springer-Verlag Berlin pp. 491-511. (doi:https://doi.org/10.1007/978-3-642-25821-3_25) (Full text available)
[img]
Preview

2010

Papagiannis, Ioannis and Migliavacca, Matteo and Eyers, David M. and Shand, Brian and Bacon, Jean and Pietzuch, Peter (2010) Enforcing user privacy in web applications using Erlang. In: W2SP 2010: Web 2.0 security and privacy 2010, May 20th, 2010, The Claremont Resort, Oakland, California. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Migliavacca, Matteo and Papagiannis, Ioannis and Eyers, David M. and Shand, Brian and Bacon, Jean and Pietzuch, Peter (2010) DEFCON: high-performance event processing with information security. In: USENIX ATC'10: Proceedings of the 2010 USENIX Annual Technical Conference. USENIX Association, Berkeley, CA, USA pp. 1-15. (Full text available)
[img]
Preview

Migliavacca, Matteo and Papagiannis, Ioannis and Eyers, David M. and Shand, Brian and Bacon, Jean and Pietzuch, Peter (2010) Distributed Middleware Enforcement of Event Flow Security Policy. In: Gupta, Indrani and Mascolo, Cecilia, eds. Middleware '10: Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware. Lecture Notes in Computer Science, 6452. Springer Berlin Heidelberg pp. 334-354. ISBN 978-3-642-16954-0. (doi:https://doi.org/10.1007/978-3-642-16955-7_17) (Full text available)
[img]
Preview

Bacon, Jean and Evans, David and Eyers, David M. and Migliavacca, Matteo and Pietzuch, Peter and Shand, Brian (2010) Enforcing End-to-End Application Security in the Cloud. In: Middleware 2010. Lecture Notes in Computer Science, 6452. Springer Berlin Heidelberg pp. 293-312. ISBN 978-3-642-16954-0. (doi:https://doi.org/10.1007/978-3-642-16955-7_15) (Full text available)
[img]
Preview

2009

Wang, Frank Z. and Helian, Na and Wu, Sining and Guo, Yike and Yuhui Deng, Derek and Meng, Lingkui and Zhang, Wen and Crowncroft, Jon and Bacon, Jean and Parker, Michael Andrew (2009) Eight Times Acceleration of Geospatial Data Archiving and Distribution on the Grids. Geoscience and Remote Sensing, IEEE Transactions on, 47 Iss . pp. 182-196. ISSN 0196-2892. (doi:https://doi.org/10.1109/TGRS.2008.2010055) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

2003

Bacon, Jean and Moody, Ken and Chadwick, David W. and Otenko, Sassa (2003) Session Limited vs. Persistent Role Membership. In: Seventeenth Annual IFIP WG 11.3 Working Conference on Database and Applications Security at Estes Park, Colorado. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

This list was generated on Wed May 8 12:25:49 2019 BST.