Title | Citations | PageRank | Year |
---|---|---|---|
An architecture for enforcing end-to-end access control over web applications | 12 | 0.61 | 2010 |
Flexible security configuration for virtual machines | 4 | 0.48 | 2008 |
Protecting users from "themselves" | 2 | 0.38 | 2007 |
Managing the risk of covert information flows in virtual machine systems | 15 | 1.05 | 2007 |