2004 |
7 | EE | Trent Jaeger,
Antony Edwards,
Xiaolan Zhang:
Consistency analysis of authorization hook placement in the Linux security modules framework.
ACM Trans. Inf. Syst. Secur. 7(2): 175-205 (2004) |
2002 |
6 | EE | Antony Edwards,
Trent Jaeger,
Xiaolan Zhang:
Runtime verification of authorization hook placement for the linux security modules framework.
ACM Conference on Computer and Communications Security 2002: 225-234 |
5 | EE | Trent Jaeger,
Antony Edwards,
Xiaolan Zhang:
Gaining and maintaining confidence in operating systems security.
ACM SIGOPS European Workshop 2002: 201-204 |
4 | EE | Trent Jaeger,
Antony Edwards,
Xiaolan Zhang:
Managing access control policies using access control spaces.
SACMAT 2002: 3-12 |
3 | EE | Xiaolan Zhang,
Antony Edwards,
Trent Jaeger:
Using CQUAL for Static Analysis of Authorization Hook Placement.
USENIX Security Symposium 2002: 33-48 |
2001 |
2 | EE | Antony Edwards,
Gernot Heiser:
Components + Security = OS Extensibility.
ACSAC 2001: 27-34 |
1 | EE | Antony Edwards,
Gernot Heiser:
Secure OS Extensibility Needn't Cost an Arm and a Leg.
HotOS 2001: 168 |