Roxana Geambasu
Roxana Geambasu
Assistant Professor of Computer Science, Columbia University
Email confirmado em - Página inicial
Citado por
Citado por
Vanish: Increasing Data Privacy with Self-Destructing Data.
R Geambasu, T Kohno, AA Levy, HM Levy
USENIX security symposium 316, 2009
Certified robustness to adversarial examples with differential privacy
M Lecuyer, V Atlidakis, R Geambasu, D Hsu, S Jana
2019 IEEE Symposium on Security and Privacy (SP), 656-672, 2019
File System Logging versus Clustering: A Performance Comparison.
MI Seltzer, KA Smith, H Balakrishnan, J Chang, S McMains, ...
USENIX, 249-264, 1995
CleanOS: Limiting mobile data exposure with idle eviction
Y Tang, P Ames, S Bhamidipati, A Bijlani, R Geambasu, N Sarda
10th {USENIX} Symposium on Operating Systems Design and Implementation …, 2012
XRay: Increasing the Web's Transparency with Differential Correlation
M Lecuyer, G Ducoffe, F Lan, A Papancea, T Petsios, R Spahn, ...
Proceedings of the USENIX Security Symposium, 2014
Comet: An active distributed key-value store.
R Geambasu, AA Levy, T Kohno, A Krishnamurthy, HM Levy
OSDI, 323-336, 2010
Homeviews: peer-to-peer middleware for personal data sharing applications
R Geambasu, M Balazinska, SD Gribble, HM Levy
Proceedings of the 2007 ACM SIGMOD international conference on Management of …, 2007
FairTest: Discovering Unwarranted Associations in Data-Driven Applications
F Tramer, V Atlidakis, R Geambasu, D Hsu, JP Hubaux, M Humbert, ...
IEEE European Symposium on Security and Privacy (EuroS&P), 2017
Sunlight: Fine-grained targeting detection at scale with statistical confidence
M Lecuyer, R Spahn, Y Spiliopolous, A Chaintreau, R Geambasu, D Hsu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Keypad: An auditing file system for theft-prone devices
R Geambasu, JP John, SD Gribble, T Kohno, HM Levy
Proceedings of the sixth conference on Computer systems, 1-16, 2011
Organizing and sharing distributed personal web-service data
R Geambasu, C Cheung, A Moshchuk, SD Gribble, HM Levy
Proceedings of the 17th international conference on World Wide Web, 755-764, 2008
Systems and methods for file access auditing
T Kohno, R Geambasu, H Levy, S Gribble
US Patent 9,489,523, 2016
CloudViews: Communal Data Sharing in Public Clouds.
R Geambasu, SD Gribble, HM Levy
HotCloud, 2009
Synapse: a microservices architecture for heterogeneous-database web applications
N Viennot, M Lécuyer, J Bell, R Geambasu, J Nieh
Proceedings of the Tenth European Conference on Computer Systems, 1-16, 2015
POSIX abstractions in modern operating systems: The old, the new, and the missing
V Atlidakis, J Andrus, R Geambasu, D Mitropoulos, J Nieh
Proceedings of the Eleventh European Conference on Computer Systems, 1-17, 2016
Pebbles: Fine-grained data management abstractions for modern operating systems
R Spahn, J Bell, M Lee, S Bhamidipati, R Geambasu, G Kaiser
11th {USENIX} Symposium on Operating Systems Design and Implementation …, 2014
The meerkats cloud security architecture
AD Keromytis, R Geambasu, S Sethumadhavan, SJ Stolfo, J Yang, ...
2012 32nd International Conference on Distributed Computing Systems …, 2012
Encapsulation and decapsulation for data disintegration
T Kohno, R Geambasu, HM Levy
US Patent 8,520,855, 2013
Discovering unwarranted associations in data-driven applications with the fairtest testing toolkit
F Tramèr, V Atlidakis, R Geambasu, DJ Hsu, JP Hubaux, M Humbert, ...
CoRR, abs/1510.02377, 2015
Urgent virtual machine eviction with enlightened post-copy
Y Abe, R Geambasu, K Joshi, M Satyanarayanan
ACM SIGPLAN Notices 51 (7), 51-64, 2016
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20