Number of items: 8.
Vahldiek-Oberwanger, Anjo and Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018)
ERIM: Secure and Efficient In-process Isolation with Memory Protection Keys.
CoRR, abs/18.
Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018)
Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead.
CoRR, abs/18.
Mehta, Aastha and Elnikety, Eslam and Harvey, Katura and Garg, Deepak and Druschel, Peter
(2017)
Qapla: Policy compliance for database-backed systems.
Vahldiek-Oberwanger, Anjo and Bhattacharjee, Bobby and Garg, Deepak and Elnikety, Eslam and Druschel, Peter and Litton, James
(2016)
Light-Weight Contexts: An OS Abstraction for Safety and Performance.
Elnikety, Eslam and Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Garg, Deepak and Druschel, Peter
(2016)
T3: Comprehensive policy compliance in data retrieval systems.
Elnikety, Eslam and Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Garg, Deepak and Druschel, Peter
(2016)
Thoth: Comprehensive Policy Compliance in Data Retrieval Systems.
Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Post, Ansley and Garg, Deepak and Elnikety, Eslam and Gehrke, Johannes and Druschel, Peter and Rodrigues, Rodrigo
(2015)
Guardat: enforcing data policies at the storage layer.
Vahldiek, Anjo and Elnikety, Eslam and Post, Ansley and Druschel, Peter and Garg, Deepak and Gehrke, Johannes and Rodrigues, Rodrigo
(2012)
Trusted Storage.
This list was generated on Sun Dec 22 02:59:06 2024 CET.