Cited By
View all- Anjum IKostecki DLeba ESokal JBharambe REnck WNita-Rotaru CReaves BDietrich SChowdhury OTakabi D(2022)Removing the Reliance on Perimeters for Security using Network ViewsProceedings of the 27th ACM on Symposium on Access Control Models and Technologies10.1145/3532105.3535029(151-162)Online publication date: 7-Jun-2022
- Katsis CCicala FThomsen DRingo NBertino ELobo JDi Pietro RChowdhury O(2021)Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and TestingProceedings of the 26th ACM Symposium on Access Control Models and Technologies10.1145/3450569.3463558(165-174)Online publication date: 11-Jun-2021
- Krisler BPal PBertilson ZThomsen D(2019)Secure Desktop Computing in the Cloud2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)10.1109/CSCloud/EdgeCom.2019.00-10(107-112)Online publication date: Jun-2019
- Show More Cited By