Cited By
View all- Dak Albab KAgvanian AAby ATiffany CPortland ARidley SSchwarzkopf MWitchel EArpaci-Dusseau ARossbach CKeeton K(2024)Sesame: Practical End-to-End Privacy Compliance with Policy Containers and Privacy RegionsProceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles10.1145/3694715.3695984(709-725)Online publication date: 4-Nov-2024
- Ileri AZeldovich NChlipala AKaashoek F(2024)Probability from Possibility: Probabilistic Confidentiality for Storage Systems Under Nondeterminism2024 IEEE 37th Computer Security Foundations Symposium (CSF)10.1109/CSF61375.2024.00041(96-111)Online publication date: 8-Jul-2024
- Hublet FBasin DKrstić S(2024)Enforcing the GDPRComputer Security – ESORICS 202310.1007/978-3-031-51476-0_20(400-422)Online publication date: 11-Jan-2024
- Show More Cited By