Drew Dean

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

17EERichard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine, Michael Szydlo: A Chat at the Old Phishin' Hole. Financial Cryptography 2005: 88
16EEAjay Chander, Drew Dean, John C. Mitchell: A Distributed High Assurance Reference Monitor. ISC 2004: 231-244
15EEHao Chen, Drew Dean, David Wagner: Model Checking One Million Lines of C Code. NDSS 2004
14EEDrew Dean, Alan J. Hu: Fixing Races for Fun and Profit: How to Use access(2). USENIX Security Symposium 2004: 195-206
13 Ajay Chander, Drew Dean, John C. Mitchell: Reconstructing Trust Management. Journal of Computer Security 12(1): 131-164 (2004)
12EEJessica Staddon, Sara K. Miner, Matthew K. Franklin, Dirk Balfanz, Michael Malkin, Drew Dean: Self-Healing Key Distribution with Revocation. IEEE Symposium on Security and Privacy 2002: 241-257
11EEHao Chen, David Wagner, Drew Dean: Setuid Demystified. USENIX Security Symposium 2002: 171-190
10EEDrew Dean, Matthew K. Franklin, Adam Stubblefield: An algebraic approach to IP traceback. ACM Trans. Inf. Syst. Secur. 5(2): 119-137 (2002)
9EEAjay Chander, John C. Mitchell, Drew Dean: A State-Transition Model of Trust Management and Access Control. CSFW 2001: 27-43
8EEDavid Wagner, Drew Dean: Intrusion Detection via Static Analysis. IEEE Symposium on Security and Privacy 2001: 156-
7EEDrew Dean, Matthew K. Franklin, Adam Stubblefield: An Algebraic Approach to IP Traceback. NDSS 2001
6EETom Berson, Drew Dean, Matthew K. Franklin, Diana K. Smetters, Mike Spreitzer: Cryptology As a Network Service. NDSS 2001
5EEDirk Balfanz, Drew Dean, Mike Spreitzer: A Security Infrastructure for Distributed Java Applications. IEEE Symposium on Security and Privacy 2000: 15-26
4EEDrew Dean: The Security of Static Typing with Dynamic Linking. ACM Conference on Computer and Communications Security 1997: 18-27
3EEMarvin Schaefer, Sylvan Pinsky, Drew Dean, Li Gong, Jim Roskind, Barbara Fox: Ensuring Assurance in Mobile Computing. IEEE Symposium on Security and Privacy 1997: 114-118
2 Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten: Extensible Security Architecture for Java. SOSP 1997: 116-128
1EEDrew Dean, Edward W. Felten, Dan S. Wallach: Java Security: From HotJava to Netscape and Beyond. IEEE Symposium on Security and Privacy 1996: 190-200

Coauthor Index

1Dirk Balfanz [2] [5] [12]
2Tom Berson [6]
3Ajay Chander [9] [13] [16]
4Hao Chen [11] [15]
5Richard Clayton [17]
6Edward W. Felten [1] [2]
7Barbara Fox [3]
8Matthew K. Franklin [6] [7] [10] [12]
9Li Gong [3]
10Alan J. Hu [14]
11Markus Jakobsson [17]
12Michael Malkin [12]
13Sara K. Miner [12]
14John C. Mitchell [9] [13] [16]
15Steven Myers [17]
16Sylvan Pinsky [3]
17Jim Roskind [3]
18Marvin Schaefer [3]
19Diana K. Smetters [6]
20Mike Spreitzer [5] [6]
21Jessica Staddon [12]
22Stuart G. Stubblebine [17]
23Adam Stubblefield [7] [10]
24Michael Szydlo [17]
25David Wagner [8] [11] [15]
26Dan S. Wallach [1] [2]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)