| 2007 |
| 9 | EE | Jeremy Epstein:
Electronic Voting.
IEEE Computer 40(8): 92-95 (2007) |
| 2006 |
| 8 | EE | Jeremy Epstein:
Fifteen Years after TX: A Look Back at High Assurance Multi-Level Secure Windowing.
ACSAC 2006: 301-320 |
| 7 | EE | Jeremy Epstein,
Scott R. Matsumoto,
Gary McGraw:
Software Security and SOA: Danger, Will Robinson!
IEEE Security & Privacy 4(1): 80-83 (2006) |
| 2000 |
| 6 | EE | Jeremy Epstein,
L. Thomas,
Eric Monteith:
Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls.
ACSAC 2000: 236-245 |
| 1999 |
| 5 | EE | Jeremy Epstein:
Architecture and Concepts of the ARGuE Guard.
ACSAC 1999: 45-54 |
| 1996 |
| 4 | EE | Jeremy Epstein,
Tim Williams:
Using Fortezza For Transparent File Encryption.
ACSAC 1996: 140-147 |
| 1995 |
| 3 | EE | Jeremy Epstein,
Ravi S. Sandhu:
NetWare 4 as an example of role-based access control.
ACM Workshop on Role-Based Access Control 1995 |
| 1993 |
| 2 | | Jeremy Epstein,
John McHugh,
Hilarie K. Orman,
R. Pascale,
Ann B. Marmor-Squires,
B. Danner,
C. Martin,
M. Branstad,
J. Benson,
D. Rothnie:
A High Assurance Window System Prototype.
Journal of Computer Security 2(2-3): 159-190 (1993) |
| 1990 |
| 1 | | Jeremy Epstein,
Marvin Shugerman:
A Trusted X Window System Server for Trusted Mach.
USENIX MACH Symposium 1990: 141-156 |