callback( { "result":{ "query":":facetid:toc:\"db/conf/ccs/ccsw2012.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"63.89" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"17", "@dc":"17", "@oc":"17", "@id":"43370955", "text":":facetid:toc:db/conf/ccs/ccsw2012.bht" } }, "hits":{ "@total":"17", "@computed":"17", "@sent":"17", "@first":"0", "hit":[{ "@score":"1", "@id":"4385010", "info":{"authors":{"author":[{"@pid":"a/JohnAycock","text":"John Aycock"},{"@pid":"24/7564","text":"Daniel Medeiros Nunes de Castro"},{"@pid":"l/MichaelELocasto","text":"Michael E. Locasto"},{"@pid":"59/5124","text":"Chris Jarabek"}]},"title":"Babel: a secure computer is a polyglot.","venue":"CCSW","pages":"43-54","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/AycockCLJ12","doi":"10.1145/2381913.2381922","ee":"https://doi.org/10.1145/2381913.2381922","url":"https://dblp.org/rec/conf/ccs/AycockCLJ12"}, "url":"URL#4385010" }, { "@score":"1", "@id":"4385015", "info":{"authors":{"author":[{"@pid":"126/3601","text":"Adam Bates 0001"},{"@pid":"117/5969","text":"Benjamin Mood"},{"@pid":"19/11242","text":"Joe Pletcher"},{"@pid":"131/5415","text":"Hannah Pruse"},{"@pid":"25/7544","text":"Masoud Valafar"},{"@pid":"82/1935","text":"Kevin R. B. Butler"}]},"title":"Detecting co-residency with active traffic analysis techniques.","venue":"CCSW","pages":"1-12","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/BatesMPPVB12","doi":"10.1145/2381913.2381915","ee":"https://doi.org/10.1145/2381913.2381915","url":"https://dblp.org/rec/conf/ccs/BatesMPPVB12"}, "url":"URL#4385015" }, { "@score":"1", "@id":"4385019", "info":{"authors":{"author":[{"@pid":"50/10366","text":"Sebastian Biedermann"},{"@pid":"55/901","text":"Martin Mink"},{"@pid":"66/3585-1","text":"Stefan Katzenbeisser 0001"}]},"title":"Fast dynamic extracted honeypots in cloud computing.","venue":"CCSW","pages":"13-18","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/BiedermannMK12","doi":"10.1145/2381913.2381916","ee":"https://doi.org/10.1145/2381913.2381916","url":"https://dblp.org/rec/conf/ccs/BiedermannMK12"}, "url":"URL#4385019" }, { "@score":"1", "@id":"4385061", "info":{"authors":{"author":[{"@pid":"25/8166","text":"Christopher W. Fletcher"},{"@pid":"32/1399","text":"Marten van Dijk"},{"@pid":"14/3973","text":"Srinivas Devadas"}]},"title":"Towards an interpreter for efficient encrypted computation.","venue":"CCSW","pages":"83-94","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/FletcherDD12","doi":"10.1145/2381913.2381928","ee":"https://doi.org/10.1145/2381913.2381928","url":"https://dblp.org/rec/conf/ccs/FletcherDD12"}, "url":"URL#4385061" }, { "@score":"1", "@id":"4385063", "info":{"authors":{"author":[{"@pid":"07/1919","text":"Jesus Luna Garcia"},{"@pid":"32/8965","text":"Robert Langenberg"},{"@pid":"s/NeerajSuri","text":"Neeraj Suri"}]},"title":"Benchmarking cloud security level agreements using quantitative policy trees.","venue":"CCSW","pages":"103-112","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/GarciaLS12","doi":"10.1145/2381913.2381932","ee":"https://doi.org/10.1145/2381913.2381932","url":"https://dblp.org/rec/conf/ccs/GarciaLS12"}, "url":"URL#4385063" }, { "@score":"1", "@id":"4385087", "info":{"authors":{"author":{"@pid":"12/5585","text":"Burton Stephen Kaliski Jr."}},"title":"Revisiting DNS and WHOIS in the cloud era.","venue":"CCSW","pages":"95-96","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/Kaliski12","doi":"10.1145/2381913.2381929","ee":"https://doi.org/10.1145/2381913.2381929","url":"https://dblp.org/rec/conf/ccs/Kaliski12"}, "url":"URL#4385087" }, { "@score":"1", "@id":"4385097", "info":{"authors":{"author":[{"@pid":"05/10299","text":"Beom Heyn Kim"},{"@pid":"81/6685-27","text":"Wei Huang 0027"},{"@pid":"l/DavidLie","text":"David Lie"}]},"title":"Unity: secure and durable personal cloud storage.","venue":"CCSW","pages":"31-36","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/KimHL12","doi":"10.1145/2381913.2381920","ee":"https://doi.org/10.1145/2381913.2381920","url":"https://dblp.org/rec/conf/ccs/KimHL12"}, "url":"URL#4385097" }, { "@score":"1", "@id":"4385100", "info":{"authors":{"author":{"@pid":"33/2051","text":"Apurva Kumar"}},"title":"Managing trust and secrecy in identity management clouds.","venue":"CCSW","pages":"113-124","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/Kumar12","doi":"10.1145/2381913.2381933","ee":"https://doi.org/10.1145/2381913.2381933","url":"https://dblp.org/rec/conf/ccs/Kumar12"}, "url":"URL#4385100" }, { "@score":"1", "@id":"4385103", "info":{"authors":{"author":{"@pid":"08/1510","text":"Kristin E. Lauter"}},"title":"Practical applications of homomorphic encryption.","venue":"CCSW","pages":"57-58","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/Lauter12","doi":"10.1145/2381913.2381924","ee":"https://doi.org/10.1145/2381913.2381924","url":"https://dblp.org/rec/conf/ccs/Lauter12"}, "url":"URL#4385103" }, { "@score":"1", "@id":"4385129", "info":{"authors":{"author":[{"@pid":"14/11088","text":"Keaton Mowery"},{"@pid":"53/9958","text":"Sriram Keelveedhi"},{"@pid":"35/1061","text":"Hovav Shacham"}]},"title":"Are AES x86 cache timing attacks still feasible?","venue":"CCSW","pages":"19-24","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/MoweryKS12","doi":"10.1145/2381913.2381917","ee":"https://doi.org/10.1145/2381913.2381917","url":"https://dblp.org/rec/conf/ccs/MoweryKS12"}, "url":"URL#4385129" }, { "@score":"1", "@id":"4385137", "info":{"authors":{"author":[{"@pid":"45/4905","text":"Ioannis Papagiannis"},{"@pid":"45/4887","text":"Peter R. Pietzuch"}]},"title":"CloudFilter: practical control of sensitive data propagation to the cloud.","venue":"CCSW","pages":"97-102","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/PapagiannisP12","doi":"10.1145/2381913.2381931","ee":"https://doi.org/10.1145/2381913.2381931","url":"https://dblp.org/rec/conf/ccs/PapagiannisP12"}, "url":"URL#4385137" }, { "@score":"1", "@id":"4385158", "info":{"authors":{"author":{"@pid":"s/HowardEShrobe","text":"Howard E. Shrobe"}},"title":"What if we got a do-over?","venue":"CCSW","pages":"55-56","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/Shrobe12","doi":"10.1145/2381913.2381923","ee":"https://doi.org/10.1145/2381913.2381923","url":"https://dblp.org/rec/conf/ccs/Shrobe12"}, "url":"URL#4385158" }, { "@score":"1", "@id":"4385160", "info":{"authors":{"author":[{"@pid":"77/252","text":"Abhinav Srivastava"},{"@pid":"46/1879","text":"Vinod Ganapathy"}]},"title":"Towards a richer model of cloud app markets.","venue":"CCSW","pages":"25-30","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/SrivastavaG12","doi":"10.1145/2381913.2381918","ee":"https://doi.org/10.1145/2381913.2381918","url":"https://dblp.org/rec/conf/ccs/SrivastavaG12"}, "url":"URL#4385160" }, { "@score":"1", "@id":"4385174", "info":{"authors":{"author":[{"@pid":"52/2914","text":"Gaven J. Watson"},{"@pid":"s/ReihanehSafaviNaini","text":"Reihaneh Safavi-Naini"},{"@pid":"49/9394","text":"Mohsen Alimomeni"},{"@pid":"l/MichaelELocasto","text":"Michael E. Locasto"},{"@pid":"54/7269","text":"Shivaramakrishnan Narayan"}]},"title":"LoSt: location based storage.","venue":"CCSW","pages":"59-70","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/WatsonSALN12","doi":"10.1145/2381913.2381926","ee":"https://doi.org/10.1145/2381913.2381926","url":"https://dblp.org/rec/conf/ccs/WatsonSALN12"}, "url":"URL#4385174" }, { "@score":"1", "@id":"4385192", "info":{"authors":{"author":[{"@pid":"05/10311","text":"Angeliki Zavou"},{"@pid":"51/4565","text":"Elias Athanasopoulos"},{"@pid":"44/3319","text":"Georgios Portokalidis"},{"@pid":"k/AngelosDKeromytis","text":"Angelos D. Keromytis"}]},"title":"Exploiting split browsers for efficiently protecting user data.","venue":"CCSW","pages":"37-42","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/ZavouAPK12","doi":"10.1145/2381913.2381921","ee":"https://doi.org/10.1145/2381913.2381921","url":"https://dblp.org/rec/conf/ccs/ZavouAPK12"}, "url":"URL#4385192" }, { "@score":"1", "@id":"4385199", "info":{"authors":{"author":[{"@pid":"73/9688","text":"Qingji Zheng"},{"@pid":"78/2715","text":"Shouhuai Xu"},{"@pid":"66/3575","text":"Giuseppe Ateniese"}]},"title":"Efficient query integrity for outsourced dynamic databases.","venue":"CCSW","pages":"71-82","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ccs/ZhengXA12","doi":"10.1145/2381913.2381927","ee":"https://doi.org/10.1145/2381913.2381927","url":"https://dblp.org/rec/conf/ccs/ZhengXA12"}, "url":"URL#4385199" }, { "@score":"1", "@id":"4513184", "info":{"authors":{"author":[{"@pid":"y/TingYu-1","text":"Ting Yu 0001"},{"@pid":"51/1639","text":"Srdjan Capkun"},{"@pid":"66/664","text":"Seny Kamara"}]},"title":"Proceedings of the 2012 ACM Workshop on Cloud computing security, CCSW 2012, Raleigh, NC, USA, October 19, 2012.","venue":"CCSW","publisher":"ACM","year":"2012","type":"Editorship","key":"conf/ccs/2012ccsw","ee":"http://dl.acm.org/citation.cfm?id=2381913","url":"https://dblp.org/rec/conf/ccs/2012ccsw"}, "url":"URL#4513184" } ] } } } )