iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.uni-trier.de/pid/27/5136.rss
dblp: Justin Cappos https://dblp.org/pid/27/5136.html dblp person page RSS feed Wed, 11 Dec 2024 21:39:04 +0100 en-US daily 1 released under the CC0 1.0 license dblp@dagstuhl.de (dblp team) dblp@dagstuhl.de (dblp team) Computers/Computer_Science/Publications/Bibliographies http://www.rssboard.org/rss-specification https://dblp.org/img/logo.144x51.pngdblp: Justin Capposhttps://dblp.org/pid/27/5136.html14451 CovSBOM: Enhancing Software Bill of Materials with Integrated Code Coverage Analysis.https://doi.org/10.1109/ISSRE62328.2024.00031, , , :
CovSBOM: Enhancing Software Bill of Materials with Integrated Code Coverage Analysis. ISSRE : 228-237]]>
https://dblp.org/rec/conf/issre/ZhaoZCC24Mon, 01 Jan 2024 00:00:00 +0100
Multitenant Containers as a Service (CaaS) for Clouds and Edge Clouds.https://doi.org/10.1109/ACCESS.2023.3344486, , , , , :
Multitenant Containers as a Service (CaaS) for Clouds and Edge Clouds. IEEE Access 11: 144574-144601 ()]]>
https://dblp.org/rec/journals/access/SenelMCFFM23Sun, 01 Jan 2023 00:00:00 +0100
Towards verifiable web-based code review systems.https://doi.org/10.3233/JCS-210098, , , :
Towards verifiable web-based code review systems. J. Comput. Secur. 31(2): 153-184 ()]]>
https://dblp.org/rec/journals/jcs/AfzaliTCC23Sun, 01 Jan 2023 00:00:00 +0100
Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems.https://doi.org/10.1145/3627106.3627129, , :
Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems. ACSAC : 83-97]]>
https://dblp.org/rec/conf/acsac/MooreKC23Sun, 01 Jan 2023 00:00:00 +0100
Multitenant Containers as a Service (CaaS) for Clouds and Edge Clouds.https://doi.org/10.48550/arXiv.2304.08927, , , , , :
Multitenant Containers as a Service (CaaS) for Clouds and Edge Clouds. CoRR abs/2304.08927 ()]]>
https://dblp.org/rec/journals/corr/abs-2304-08927Sun, 01 Jan 2023 00:00:00 +0100
Demo: EdgeNet, a Production Internet-Scale Container-Based Distributed System Testbed.https://doi.org/10.1109/ICDCS54860.2022.00141, , , , , :
Demo: EdgeNet, a Production Internet-Scale Container-Based Distributed System Testbed. ICDCS : 1298-1301]]>
https://dblp.org/rec/conf/icdcs/SenelMCFFM22Sat, 01 Jan 2022 00:00:00 +0100
Needles in a Haystack: Using PORT to Catch Bad Behaviors within Application Recordings.https://doi.org/10.5220/0011142300003266, , , , :
Needles in a Haystack: Using PORT to Catch Bad Behaviors within Application Recordings. ICSOFT : 137-145]]>
https://dblp.org/rec/conf/icsoft/MooreWWFC22Sat, 01 Jan 2022 00:00:00 +0100
Federating EdgeNet with Fed4FIRE+ and Deploying its Nodes Behind NATs.https://doi.org/10.23919/IFIPNetworking55013.2022.9829758, , , , , :
Federating EdgeNet with Fed4FIRE+ and Deploying its Nodes Behind NATs. IFIP Networking : 1-5]]>
https://dblp.org/rec/conf/networking/SenelMCFFM22Sat, 01 Jan 2022 00:00:00 +0100
Bootstrapping Trust in Community Repository Projects.https://doi.org/10.1007/978-3-031-25538-0_24, , , :
Bootstrapping Trust in Community Repository Projects. SecureComm : 450-469]]>
https://dblp.org/rec/conf/securecomm/VaidyaTCC22Sat, 01 Jan 2022 00:00:00 +0100
Cybersecurity Shuffle: Using Card Magic to Introduce Cybersecurity Concepts.https://doi.org/10.1145/3478432.3499081, :
Cybersecurity Shuffle: Using Card Magic to Introduce Cybersecurity Concepts. SIGCSE (2) : 1090]]>
https://dblp.org/rec/conf/sigcse/MooreC21Sat, 01 Jan 2022 00:00:00 +0100
EdgeNet: A Multi-Tenant and Multi-Provider Edge Cloud.https://doi.org/10.1145/3434770.3459737, , , , , :
EdgeNet: A Multi-Tenant and Multi-Provider Edge Cloud. EdgeSys@EuroSys : 49-54]]>
https://dblp.org/rec/conf/eurosys/SenelMCFFM21Fri, 01 Jan 2021 00:00:00 +0100
EdgeNet: the Global Kubernetes Cluster Testbed.https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484475, , , , , :
EdgeNet: the Global Kubernetes Cluster Testbed. INFOCOM Workshops : 1-2]]>
https://dblp.org/rec/conf/infocom/SenelMCFFM21Fri, 01 Jan 2021 00:00:00 +0100
Towards adding verifiability to web-based Git repositories.https://doi.org/10.3233/JCS-191371, , , :
Towards adding verifiability to web-based Git repositories. J. Comput. Secur. 28(4): 405-436 ()]]>
https://dblp.org/rec/journals/jcs/AfzaliTCC20Wed, 01 Jan 2020 00:00:00 +0100
MicroCash: Practical Concurrent Processing of Micropayments.https://doi.org/10.1007/978-3-030-51280-4_13, , :
MicroCash: Practical Concurrent Processing of Micropayments. Financial Cryptography : 227-244]]>
https://dblp.org/rec/conf/fc/AlmashaqbehBC20Wed, 01 Jan 2020 00:00:00 +0100
Thinking aloud about confusing code: a qualitative investigation of program comprehension and atoms of confusion.https://doi.org/10.1145/3368089.3409714, , , :
Thinking aloud about confusing code: a qualitative investigation of program comprehension and atoms of confusion. ESEC/SIGSOFT FSE : 605-616]]>
https://dblp.org/rec/conf/sigsoft/GopsteinFAC20Wed, 01 Jan 2020 00:00:00 +0100
CAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks.https://doi.org/10.1109/CNS.2019.8802825, , , :
CAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks. CNS : 250-258]]>
https://dblp.org/rec/conf/cns/AlmashaqbehKBC19Tue, 01 Jan 2019 00:00:00 +0100
ABC: A Cryptocurrency-Focused Threat Modeling Framework.https://doi.org/10.1109/INFCOMW.2019.8845101, , :
ABC: A Cryptocurrency-Focused Threat Modeling Framework. INFOCOM Workshops : 859-864]]>
https://dblp.org/rec/conf/infocom/AlmashaqbehBC19Tue, 01 Jan 2019 00:00:00 +0100
Charting a Course Through Uncertain Environments: SEA Uses Past Problems to Avoid Future Failures.https://doi.org/10.1109/ISSRE.2019.00011, , , :
Charting a Course Through Uncertain Environments: SEA Uses Past Problems to Avoid Future Failures. ISSRE : 1-12]]>
https://dblp.org/rec/conf/issre/MooreCFW19Tue, 01 Jan 2019 00:00:00 +0100
Commit Signatures for Centralized Version Control Systems.https://doi.org/10.1007/978-3-030-22312-0_25, , , :
Commit Signatures for Centralized Version Control Systems. SEC : 359-373]]>
https://dblp.org/rec/conf/sec/VaidyaTCC19Tue, 01 Jan 2019 00:00:00 +0100
in-toto: Providing farm-to-table guarantees for bits and bytes.https://www.usenix.org/conference/usenixsecurity19/presentation/torres-arias, , , , :
in-toto: Providing farm-to-table guarantees for bits and bytes. USENIX Security Symposium : 1393-1410]]>
https://dblp.org/rec/conf/uss/Torres-AriasAKC19Tue, 01 Jan 2019 00:00:00 +0100
ABC: A Cryptocurrency-Focused Threat Modeling Framework.http://arxiv.org/abs/1903.03422, , :
ABC: A Cryptocurrency-Focused Threat Modeling Framework. CoRR abs/1903.03422 ()]]>
https://dblp.org/rec/journals/corr/abs-1903-03422Tue, 01 Jan 2019 00:00:00 +0100
CAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks.http://arxiv.org/abs/1906.10272, , , :
CAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks. CoRR abs/1906.10272 ()]]>
https://dblp.org/rec/journals/corr/abs-1906-10272Tue, 01 Jan 2019 00:00:00 +0100
MicroCash: Practical Concurrent Processing of Micropayments.http://arxiv.org/abs/1911.08520, , :
MicroCash: Practical Concurrent Processing of Micropayments. CoRR abs/1911.08520 ()]]>
https://dblp.org/rec/journals/corr/abs-1911-08520Tue, 01 Jan 2019 00:00:00 +0100
Tsumiki: A Meta-Platform for Building Your Own Testbed.https://doi.org/10.1109/TPDS.2018.2846242, , , :
Tsumiki: A Meta-Platform for Building Your Own Testbed. IEEE Trans. Parallel Distributed Syst. 29(12): 2863-2881 ()]]>
https://dblp.org/rec/journals/tpds/CapposZRB18Mon, 01 Jan 2018 00:00:00 +0100
Uptane: Security and Customizability of Software Updates for Vehicles.https://doi.org/10.1109/MVT.2017.2778751, , :
Uptane: Security and Customizability of Software Updates for Vehicles. IEEE Veh. Technol. Mag. 13(1): 66-73 ()]]>
https://dblp.org/rec/journals/vtm/KuppusamyDC18Mon, 01 Jan 2018 00:00:00 +0100
le-git-imate: Towards Verifiable Web-based Git Repositories.https://doi.org/10.1145/3196494.3196523, , , :
le-git-imate: Towards Verifiable Web-based Git Repositories. AsiaCCS : 469-482]]>
https://dblp.org/rec/conf/ccs/AfzaliTCC18Mon, 01 Jan 2018 00:00:00 +0100
EdgeNet: A Global Cloud That Spreads by Local Action.https://doi.org/10.1109/SEC.2018.00045, , , , :
EdgeNet: A Global Cloud That Spreads by Local Action. SEC : 359-360]]>
https://dblp.org/rec/conf/edge/CapposHMRR18Mon, 01 Jan 2018 00:00:00 +0100
Prevalence of confusing code in software projects: atoms of confusion in the wild.https://doi.org/10.1145/3196398.3196432, , , :
Prevalence of confusing code in software projects: atoms of confusion in the wild. MSR : 281-291]]>
https://dblp.org/rec/conf/msr/GopsteinZFC18Mon, 01 Jan 2018 00:00:00 +0100
Design of activity recognition systems with wearable sensors.https://doi.org/10.1109/SAS.2018.8336752, , , :
Design of activity recognition systems with wearable sensors. SAS : 1-6]]>
https://dblp.org/rec/conf/sas2/KhokhlovRCB18Mon, 01 Jan 2018 00:00:00 +0100
Four years experience: Making sensibility testbed work for SAS.https://doi.org/10.1109/SAS.2018.8336779, , , :
Four years experience: Making sensibility testbed work for SAS. SAS : 1-6]]>
https://dblp.org/rec/conf/sas2/ZhuangRWC18Mon, 01 Jan 2018 00:00:00 +0100
API Blindspots: Why Experienced Developers Write Vulnerable Code.https://www.usenix.org/conference/soups2018/presentation/oliveira, , , , , , , , , :
API Blindspots: Why Experienced Developers Write Vulnerable Code. SOUPS @ USENIX Security Symposium : 315-328]]>
https://dblp.org/rec/conf/soups/OliveiraLRAEPBD18Mon, 01 Jan 2018 00:00:00 +0100
Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps.https://doi.org/10.1145/3177102.3177120, , , , :
Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps. HotMobile : 113-118]]>
https://dblp.org/rec/conf/wmcsa/ZhuangRHTC18Mon, 01 Jan 2018 00:00:00 +0100
User Anonymity on Twitter.https://doi.org/10.1109/MSP.2017.74, , :
User Anonymity on Twitter. IEEE Secur. Priv. 15(3): 84-87 ()]]>
https://dblp.org/rec/journals/ieeesp/PeddintiRC17Sun, 01 Jan 2017 00:00:00 +0100
Securing Software Updates for Automotives Using Uptane.https://www.usenix.org/publications/login/summer2017/kuppusamy, , :
Securing Software Updates for Automotives Using Uptane. login Usenix Mag. 42(2) ()]]>
https://dblp.org/rec/journals/usenix-login/KuppusamyDC17Sun, 01 Jan 2017 00:00:00 +0100
Practical fog computing with seattle.https://doi.org/10.1109/FWC.2017.8368519, , :
Practical fog computing with seattle. FWC : 1-7]]>
https://dblp.org/rec/conf/fwc/RafetsederPC17Sun, 01 Jan 2017 00:00:00 +0100
Understanding misunderstandings in source code.https://doi.org/10.1145/3106237.3106264, , , , , , :
Understanding misunderstandings in source code. ESEC/SIGSOFT FSE : 129-139]]>
https://dblp.org/rec/conf/sigsoft/GopsteinIYDZYC17Sun, 01 Jan 2017 00:00:00 +0100
Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path.https://www.usenix.org/conference/atc17/technical-sessions/presentation/li-yiwen, , , :
Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path. USENIX ATC : 1-13]]>
https://dblp.org/rec/conf/usenix/LiDWC17Sun, 01 Jan 2017 00:00:00 +0100
Mercury: Bandwidth-Effective Prevention of Rollback Attacks Against Community Repositories.https://www.usenix.org/conference/atc17/technical-sessions/presentation/kuppusamy, , :
Mercury: Bandwidth-Effective Prevention of Rollback Attacks Against Community Repositories. USENIX ATC : 673-688]]>
https://dblp.org/rec/conf/usenix/KuppusamyDC17Sun, 01 Jan 2017 00:00:00 +0100
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds.https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/nikitin, , , , , , , :
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds. USENIX Security Symposium : 1271-1287]]>
https://dblp.org/rec/conf/uss/NikitinKJGGKCF17Sun, 01 Jan 2017 00:00:00 +0100
Mining Anonymity: Identifying Sensitive Accounts on Twitter.http://arxiv.org/abs/1702.00164, , :
Mining Anonymity: Identifying Sensitive Accounts on Twitter. CoRR abs/1702.00164 ()]]>
https://dblp.org/rec/journals/corr/PeddintiRC17Sun, 01 Jan 2017 00:00:00 +0100
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds.http://eprint.iacr.org/2017/648, , , , , , , :
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds. IACR Cryptol. ePrint Arch. 2017: 648 ()]]>
https://dblp.org/rec/journals/iacr/NikitinKJGGKCF17Sun, 01 Jan 2017 00:00:00 +0100
Finding Sensitive Accounts on Twitter: An Automated Approach Based on Follower Anonymity.http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13063, , :
Finding Sensitive Accounts on Twitter: An Automated Approach Based on Follower Anonymity. ICWSM : 655-658]]>
https://dblp.org/rec/conf/icwsm/PeddintiRC16Fri, 01 Jan 2016 00:00:00 +0100
Diplomat: Using Delegations to Protect Community Repositories.https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/kuppusamy, , , :
Diplomat: Using Delegations to Protect Community Repositories. NSDI : 567-581]]>
https://dblp.org/rec/conf/nsdi/KuppusamyTDC16Fri, 01 Jan 2016 00:00:00 +0100
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities.https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/torres-arias, , , :
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities. USENIX Security Symposium : 379-395]]>
https://dblp.org/rec/conf/uss/Torres-AriasACC16Fri, 01 Jan 2016 00:00:00 +0100
Privacy-Preserving Experimentation with Sensibility Testbed.https://www.usenix.org/publications/login/aug15/zhuang, , :
Privacy-Preserving Experimentation with Sensibility Testbed. login Usenix Mag. 40(4) ()]]>
https://dblp.org/rec/journals/usenix-login/ZhuangRC15Thu, 01 Jan 2015 00:00:00 +0100
A Fast Multi-Server, Multi-Block Private Information Retrieval Protocol.https://doi.org/10.1109/GLOCOM.2014.7417246, , , :
A Fast Multi-Server, Multi-Block Private Information Retrieval Protocol. GLOBECOM : 1-6]]>
https://dblp.org/rec/conf/globecom/WangKLC15Thu, 01 Jan 2015 00:00:00 +0100
Detecting latent cross-platform API violations.https://doi.org/10.1109/ISSRE.2015.7381841, , , , , :
Detecting latent cross-platform API violations. ISSRE : 484-495]]>
https://dblp.org/rec/conf/issre/RasleyGOBKC15Thu, 01 Jan 2015 00:00:00 +0100
A first look at vehicle data collection via smartphone sensors.https://doi.org/10.1109/SAS.2015.7133607, , , :
A first look at vehicle data collection via smartphone sensors. SAS : 1-6]]>
https://dblp.org/rec/conf/sas2/ReiningerMZC15Thu, 01 Jan 2015 00:00:00 +0100
Can the Security Mindset Make Students Better Testers?https://doi.org/10.1145/2676723.2677268, , :
Can the Security Mindset Make Students Better Testers? SIGCSE : 404-409]]>
https://dblp.org/rec/conf/sigcse/HooshangiWC15Thu, 01 Jan 2015 00:00:00 +0100
Teaching Security Using Hands-on Exercises in 2015 (Abstract Only).https://doi.org/10.1145/2676723.2691862, , , , , , :
Teaching Security Using Hands-on Exercises in 2015 (Abstract Only). SIGCSE : 695]]>
https://dblp.org/rec/conf/sigcse/WeissLMTHCS15Thu, 01 Jan 2015 00:00:00 +0100
Trust Evaluation in Mobile Devices: An Empirical Study.https://doi.org/10.1109/Trustcom.2015.353, , , , , , , :
Trust Evaluation in Mobile Devices: An Empirical Study. TrustCom/BigDataSE/ISPA (1) : 25-32]]>
https://dblp.org/rec/conf/trustcom/WeissRZHPRLC15Thu, 01 Jan 2015 00:00:00 +0100
Fence: Protecting Device Availability With Uniform Resource Control.https://www.usenix.org/conference/atc15/technical-session/presentation/li, , , :
Fence: Protecting Device Availability With Uniform Resource Control. USENIX ATC : 177-191]]>
https://dblp.org/rec/conf/usenix/LiRFC15Thu, 01 Jan 2015 00:00:00 +0100
Selectively Taming Background Android Apps to Improve Battery Lifetime.https://www.usenix.org/conference/atc15/technical-session/presentation/martins, , :
Selectively Taming Background Android Apps to Improve Battery Lifetime. USENIX ATC : 563-575]]>
https://dblp.org/rec/conf/usenix/MartinsCF15Thu, 01 Jan 2015 00:00:00 +0100
ToMaTo a Virtual Research Environment for Large Scale Distributed Systems Research.https://doi.org/10.1515/pik-2013-0043, , :
ToMaTo a Virtual Research Environment for Large Scale Distributed Systems Research. Prax. Inf.verarb. Kommun. 37(1): 23-32 ()]]>
https://dblp.org/rec/journals/pik/MullerSC14Wed, 01 Jan 2014 00:00:00 +0100
PolyPasswordHasher: Improving Password Storage Security.https://www.usenix.org/publications/login/dec14/torres, :
PolyPasswordHasher: Improving Password Storage Security. login Usenix Mag. 39(6) ()]]>
https://dblp.org/rec/journals/usenix-login/Torres-AriasC14Wed, 01 Jan 2014 00:00:00 +0100
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots.https://doi.org/10.1145/2664243.2664254, , , , , :
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots. ACSAC : 296-305]]>
https://dblp.org/rec/conf/acsac/OliveiraRMYCZ14Wed, 01 Jan 2014 00:00:00 +0100
"On the internet, nobody knows you're a dog": a twitter case study of anonymity in social networks.https://doi.org/10.1145/2660460.2660467, , :
"On the internet, nobody knows you're a dog": a twitter case study of anonymity in social networks. COSN : 83-94]]>
https://dblp.org/rec/conf/cosn/PeddintiRC14Wed, 01 Jan 2014 00:00:00 +0100
Sensibility testbed: An internet-wide cloud platform for programmable exploration of mobile devices.https://doi.org/10.1109/INFCOMW.2014.6849194, , , , , :
Sensibility testbed: An internet-wide cloud platform for programmable exploration of mobile devices. INFOCOM Workshops : 139-140]]>
https://dblp.org/rec/conf/infocom/ZhuangLRWBC14Wed, 01 Jan 2014 00:00:00 +0100
NetCheck: Network Diagnoses from Blackbox Traces.https://www.usenix.org/conference/nsdi14/technical-sessions/presentation/zhuang, , , , , , :
NetCheck: Network Diagnoses from Blackbox Traces. NSDI : 115-128]]>
https://dblp.org/rec/conf/nsdi/ZhuangGPFMBC14Wed, 01 Jan 2014 00:00:00 +0100
Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making Processes.https://doi.org/10.1145/2683467.2683472, , , , :
Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making Processes. NSPW : 53-62]]>
https://dblp.org/rec/conf/nspw/CapposZORY14Wed, 01 Jan 2014 00:00:00 +0100
BlurSense: Dynamic fine-grained access control for smartphone privacy.https://doi.org/10.1109/SAS.2014.6798970, , , , :
BlurSense: Dynamic fine-grained access control for smartphone privacy. SAS : 329-332]]>
https://dblp.org/rec/conf/sas2/CapposWWYZ14Wed, 01 Jan 2014 00:00:00 +0100
Teaching the security mindset with reference monitors.https://doi.org/10.1145/2538862.2538939, :
Teaching the security mindset with reference monitors. SIGCSE : 523-528]]>
https://dblp.org/rec/conf/sigcse/CapposW14Wed, 01 Jan 2014 00:00:00 +0100
Teaching security using hands-on exercises (abstract only).https://doi.org/10.1145/2538862.2544257, , , , :
Teaching security using hands-on exercises (abstract only). SIGCSE : 736]]>
https://dblp.org/rec/conf/sigcse/WeissLMHC14Wed, 01 Jan 2014 00:00:00 +0100
Sensorium - A Generic Sensor Framework.https://doi.org/10.1515/pik-2012-0061, , , , , :
Sensorium - A Generic Sensor Framework. Prax. Inf.verarb. Kommun. 36(1): 46 ()]]>
https://dblp.org/rec/journals/pik/RafetsederMPTZC13Tue, 01 Jan 2013 00:00:00 +0100
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates.https://doi.org/10.1007/978-3-642-39884-1_33:
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates. Financial Cryptography : 386-394]]>
https://dblp.org/rec/conf/fc/Cappos13Tue, 01 Jan 2013 00:00:00 +0100
Experience with Seattle: A Community Platform for Research and Education.https://doi.org/10.1109/GREE.2013.16, , :
Experience with Seattle: A Community Platform for Research and Education. GREE : 37-44]]>
https://dblp.org/rec/conf/gree/ZhuangRC13Tue, 01 Jan 2013 00:00:00 +0100
Et (smart) phone home!https://doi.org/10.1145/2095050.2095098, , , , :
Et (smart) phone home! SPLASH Workshops : 283-288]]>
https://dblp.org/rec/conf/oopsla/CollaresMCCM11Sat, 01 Jan 2011 00:00:00 +0100
Survivable key compromise in software update systems.https://doi.org/10.1145/1866307.1866315, , , :
Survivable key compromise in software update systems. CCS : 61-72]]>
https://dblp.org/rec/conf/ccs/SamuelMCD10Fri, 01 Jan 2010 00:00:00 +0100
Retaining sandbox containment despite bugs in privileged memory-safe code.https://doi.org/10.1145/1866307.1866332, , , , , , , :
Retaining sandbox containment despite bugs in privileged memory-safe code. CCS : 212-223]]>
https://dblp.org/rec/conf/ccs/CapposDRSBBKA10Fri, 01 Jan 2010 00:00:00 +0100
Model-based Testing Without a Model: Assessing Portability in the Seattle Testbed.https://www.usenix.org/conference/ssv10/model-based-testing-without-model-assessing-portability-seattle-testbed, :
Model-based Testing Without a Model: Assessing Portability in the Seattle Testbed. SSV ]]>
https://dblp.org/rec/conf/ssv/CapposJ10Fri, 01 Jan 2010 00:00:00 +0100
Simultaneous graph embedding with bends and circular arcs.https://doi.org/10.1016/j.comgeo.2008.05.003, , , :
Simultaneous graph embedding with bends and circular arcs. Comput. Geom. 42(2): 173-182 ()]]>
https://dblp.org/rec/journals/comgeo/CapposEFK09Thu, 01 Jan 2009 00:00:00 +0100
Package Managers Still Vulnerable: How to Protect Your Systems.https://www.usenix.org/publications/login/february-2009-volume-34-number-1/package-managers-still-vulnerable-how-protect, :
Package Managers Still Vulnerable: How to Protect Your Systems. login Usenix Mag. 34(1) ()]]>
https://dblp.org/rec/journals/usenix-login/SamuelC09Thu, 01 Jan 2009 00:00:00 +0100
Rhizoma: A Runtime for Self-deploying, Self-managing Overlays.https://doi.org/10.1007/978-3-642-10445-9_10, , , , :
Rhizoma: A Runtime for Self-deploying, Self-managing Overlays. Middleware : 184-204]]>
https://dblp.org/rec/conf/middleware/YinSCBR09Thu, 01 Jan 2009 00:00:00 +0100
Seattle: a platform for educational cloud computing.https://doi.org/10.1145/1508865.1508905, , , :
Seattle: a platform for educational cloud computing. SIGCSE : 111-115]]>
https://dblp.org/rec/conf/sigcse/CapposBKA09Thu, 01 Jan 2009 00:00:00 +0100
Stork: Secure Package Management for VM Environments.https://www.base-search.net/Record/764bfbb16db409a7793ef3f1d258e47108f52b56f28a0cfaff775a68d6def3c0:
Stork: Secure Package Management for VM Environments. University of Arizona, Tucson, USA, ]]>
https://dblp.org/rec/phd/basesearch/Cappos08Tue, 01 Jan 2008 00:00:00 +0100
Centralized Package Management Using Stork.https://www.usenix.org/publications/login/february-2008-volume-33-number-1/centralized-package-management-using-stork, , :
Centralized Package Management Using Stork. login Usenix Mag. 33(1) ()]]>
https://dblp.org/rec/journals/usenix-login/SamuelPC08Tue, 01 Jan 2008 00:00:00 +0100
A look in the mirror: attacks on package managers.https://doi.org/10.1145/1455770.1455841, , , :
A look in the mirror: attacks on package managers. CCS : 565-574]]>
https://dblp.org/rec/conf/ccs/CapposSBH08Tue, 01 Jan 2008 00:00:00 +0100
Dependable Self-Hosting Distributed Systems Using Constraints.http://www.usenix.org/events/hotdep08/tech/full_papers/yin/yin.pdf, , , :
Dependable Self-Hosting Distributed Systems Using Constraints. HotDep ]]>
https://dblp.org/rec/conf/hotdep/YinCBR08Tue, 01 Jan 2008 00:00:00 +0100
San Fermín: Aggregating Large Data Sets Using a Binomial Swap Forest.http://www.usenix.org/events/nsdi08/tech/full_papers/cappos/cappos.pdf, :
San Fermín: Aggregating Large Data Sets Using a Binomial Swap Forest. NSDI : 147-160]]>
https://dblp.org/rec/conf/nsdi/CapposH08Tue, 01 Jan 2008 00:00:00 +0100
Stork: Package Management for Distributed VM Environments.http://www.usenix.org/events/lisa07/tech/cappos.html, , , , , , , :
Stork: Package Management for Distributed VM Environments. LISA : 79-94]]>
https://dblp.org/rec/conf/lisa/CapposBP0HBJH07Mon, 01 Jan 2007 00:00:00 +0100
Net-X: Unified Data-Centric Internet Services.https://www.usenix.org/conference/netdb-07/net-x-unified-data-centric-internet-services, , , , :
Net-X: Unified Data-Centric Internet Services. NetDB ]]>
https://dblp.org/rec/conf/nsdi/RaoCKMZ07Mon, 01 Jan 2007 00:00:00 +0100
Privileged operations in the PlanetLab virtualised environment.https://doi.org/10.1145/1113361.1113375, , , , :
Privileged operations in the PlanetLab virtualised environment. ACM SIGOPS Oper. Syst. Rev. 40(1): 75-88 ()]]>
https://dblp.org/rec/journals/sigops/MuirPFCH06Sun, 01 Jan 2006 00:00:00 +0100
Simultaneous Graph Embedding with Bends and Circular Arcs.https://doi.org/10.1007/978-3-540-70904-6_11, , , :
Simultaneous Graph Embedding with Bends and Circular Arcs. GD : 95-107]]>
https://dblp.org/rec/conf/gd/CapposEFK06Sun, 01 Jan 2006 00:00:00 +0100
Why It Is Hard to Build a Long-Running Service on PlanetLab.https://www.usenix.org/conference/worlds-05/why-it-hard-build-long-running-service-planetlab, :
Why It Is Hard to Build a Long-Running Service on PlanetLab. WORLDS ]]>
https://dblp.org/rec/conf/fast/CapposH05Sat, 01 Jan 2005 00:00:00 +0100
Collaboration with DiamondTouch.https://doi.org/10.1007/11555261_86, , , , , :
Collaboration with DiamondTouch. INTERACT : 986-989]]>
https://dblp.org/rec/conf/interact/KobourovPCSMW05Sat, 01 Jan 2005 00:00:00 +0100
Proper: Privileged Operations in a Virtualised System Environment.http://www.usenix.org/events/usenix05/tech/general/muir.html, , , , :
Proper: Privileged Operations in a Virtualised System Environment. USENIX ATC, General Track : 367-370]]>
https://dblp.org/rec/conf/usenix/MuirPFCH05Sat, 01 Jan 2005 00:00:00 +0100