dblp.uni-trier.dewww.uni-trier.de

Trent Jaeger

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
66 Trent Jaeger: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008 ACM 2008
65EESandra Rueda, Yogesh Sreenivasan, Trent Jaeger: Flexible security configuration for virtual machines. CSAW 2008: 35-44
64EEDave King, Boniface Hicks, Michael Hicks, Trent Jaeger: Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. ICISS 2008: 56-70
63EEDivya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger: Measuring integrity on mobile phone systems. SACMAT 2008: 155-164
62EEDave King, Trent Jaeger, Somesh Jha, Sanjit A. Seshia: Effective blame for information-flow violations. SIGSOFT FSE 2008: 250-260
61EESandra Rueda, Dave King, Trent Jaeger: Verifying Compliance of Trusted Programs. USENIX Security Symposium 2008: 321-334
60EELiang Xie, Hui Song, Trent Jaeger, Sencun Zhu: A systematic approach for cell-phone worm containment. WWW 2008: 1083-1084
2007
59EELuke St. Clair, Joshua Schiffman, Trent Jaeger, Patrick McDaniel: Establishing and Sustaining System Integrity via Root of Trust Installation. ACSAC 2007: 19-29
58EEWilliam Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, Patrick McDaniel: Protecting users from "themselves". CSAW 2007: 29-36
57EEVinod Ganapathy, Dave King, Trent Jaeger, Somesh Jha: Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. ICSE 2007: 458-467
56EETrent Jaeger, Reiner Sailer, Yogesh Sreenivasan: Managing the risk of covert information flows in virtual machine systems. SACMAT 2007: 81-90
55EEBoniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, Patrick Drew McDaniel: A logical specification and analysis for SELinux MLS policy. SACMAT 2007: 91-100
54EEBoniface Hicks, Sandra Rueda, Trent Jaeger, Patrick Drew McDaniel: From Trusted to Secure: Building and Executing Applications That Enforce System Security. USENIX Annual Technical Conference 2007: 205-218
2006
53EEJonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer: Shamon: A System for Distributed Mandatory Access Control. ACSAC 2006: 23-32
52EELuke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger: Password Exhaustion: Predicting the End of Password Usefulness. ICISS 2006: 37-55
51EEVinod Ganapathy, Trent Jaeger, Somesh Jha: Retrofitting Legacy Code for Authorization Policy Enforcement. IEEE Symposium on Security and Privacy 2006: 214-229
50EEXiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, Guillaume Marceau, Liangzhao Zeng: The case for analysis preserving language transformation. ISSTA 2006: 191-202
49EEUmesh Shankar, Trent Jaeger, Reiner Sailer: Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. NDSS 2006
48EETrent Jaeger, Reiner Sailer, Umesh Shankar: PRIMA: policy-reduced integrity measurement architecture. SACMAT 2006: 19-28
2005
47EEVinod Ganapathy, Trent Jaeger, Somesh Jha: Automatic placement of authorization hooks in the linux security modules framework. ACM Conference on Computer and Communications Security 2005: 330-339
46EEReiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramón Cáceres, Ronald Perez, Stefan Berger, John Linwood Griffin, Leendert van Doorn: Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. ACSAC 2005: 276-285
2004
45 Trent Jaeger, Elena Ferrari: SACMAT 2004, 9th ACM Symposium on Access Control Models and Technologies, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings ACM 2004
44EEReiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn: Attestation-based policy enforcement for remote access. ACM Conference on Computer and Communications Security 2004: 308-317
43EETrent Jaeger, Reiner Sailer, Xiaolan Zhang: Resolving constraint conflicts. SACMAT 2004: 105-114
42EEReiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn: Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium 2004: 223-238
41EETrent Jaeger, Antony Edwards, Xiaolan Zhang: Consistency analysis of authorization hook placement in the Linux security modules framework. ACM Trans. Inf. Syst. Secur. 7(2): 175-205 (2004)
2003
40 Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003 ACM 2003
39EETrent Jaeger, Xiaolan Zhang, Fidel Cacheda: Policy management using access control spaces. ACM Trans. Inf. Syst. Secur. 6(3): 327-364 (2003)
2002
38EEAntony Edwards, Trent Jaeger, Xiaolan Zhang: Runtime verification of authorization hook placement for the linux security modules framework. ACM Conference on Computer and Communications Security 2002: 225-234
37EETrent Jaeger, Antony Edwards, Xiaolan Zhang: Gaining and maintaining confidence in operating systems security. ACM SIGOPS European Workshop 2002: 201-204
36EEXiaolan Zhang, Leendert van Doorn, Trent Jaeger, Ronald Perez, Reiner Sailer: Secure coprocessor-based intrusion detection. ACM SIGOPS European Workshop 2002: 239-242
35EEElisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi Ravi: Making access control more usable. SACMAT 2002: 141
34EETrent Jaeger, Antony Edwards, Xiaolan Zhang: Managing access control policies using access control spaces. SACMAT 2002: 3-12
33EEDawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David Wagner: Cool security trends. SACMAT 2002: 53
32EEXiaolan Zhang, Antony Edwards, Trent Jaeger: Using CQUAL for Static Analysis of Authorization Hook Placement. USENIX Security Symposium 2002: 33-48
2001
31EEMohit Aron, Jochen Liedtke, Kevin Elphinstone, Yoonho Park, Trent Jaeger, Luke Deller: The SawMill Framework for Virtual Memory Diversity. ACSAC 2001: 3-10
30EETrent Jaeger: Managing access control complexity using metrices. SACMAT 2001: 131-139
29EERavi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr: Panel: The next generation of acess control models (panel session): do we need them and what should they be? SACMAT 2001: 53
28EETrent Jaeger, Jonathon Tidswell: Practical safety in flexible access control models. ACM Trans. Inf. Syst. Secur. 4(2): 158-190 (2001)
2000
27EEJonathon Tidswell, Trent Jaeger: An access control model for simplifying constraint expression. ACM Conference on Computer and Communications Security 2000: 154-163
26EEAlain Gefflaut, Trent Jaeger, Yoonho Park, Jochen Liedtke, Kevin Elphinstone, Volkmar Uhlig, Jonathon Tidswell, Luke Deller, Lars Reuther: The SawMill multiserver approach. ACM SIGOPS European Workshop 2000: 109-114
25EETrent Jaeger, Jonathon Tidswell, Alain Gefflaut, Yoonho Park, Kevin Elphinstone, Jochen Liedtke: Synchronous IPC over transparent monitors. ACM SIGOPS European Workshop 2000: 189-194
24EETrent Jaeger, Jonathon Tidswell: Rebuttal to the NIST RBAC model proposal. ACM Workshop on Role-Based Access Control 2000: 65-66
23EEJonathon Tidswell, Trent Jaeger: Integrated constraints and inheritance in DTAC. ACM Workshop on Role-Based Access Control 2000: 93-102
1999
22EETrent Jaeger: On the Increasing Importance of Constraints. ACM Workshop on Role-Based Access Control 1999: 33-42
21 Trent Jaeger: Access Control in Configurable Systems. Secure Internet Programming 1999: 289-316
20EETrent Jaeger, Tony Michailidis, Roy Rada: Access Control in a Virtual University. WETICE 1999: 135-140
19EEJochen Liedtke, Volkmar Uhlig, Kevin Elphinstone, Trent Jaeger, Yoonho Park: How To Schedule Unlimited Memory Pinning of Untrusted Processes Or Provisional Ideas about Service-Neutrality. Workshop on Hot Topics in Operating Systems 1999: 153-
18EETrent Jaeger, Kevin Elphinstone, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park: Flexible Access Control using IPC Redirection. Workshop on Hot Topics in Operating Systems 1999: 191-
17EETrent Jaeger, Atul Prakash, Jochen Liedtke, Nayeem Islam: Flexible Control of Downloaded Executable Content. ACM Trans. Inf. Syst. Secur. 2(2): 177-228 (1999)
1998
16EETrent Jaeger, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park, Nayeem Islam: Security architecture for component-based operating systems. ACM SIGOPS European Workshop 1998: 222-228
15EEJochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, Yoonho Park: An unconventional proposal: using the x86 architecture as the ubiquitous virtual standard architecture. ACM SIGOPS European Workshop 1998: 237-241
14EEJochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, Yoonho Park: Irreproducible benchmarks might be sometimes helpful. ACM SIGOPS European Workshop 1998: 242-246
1997
13EETrent Jaeger, Frederique Giraud, Nayeem Islam, Jochen Liedtke: A role-based access control model for protection domain derivation and management. ACM Workshop on Role-Based Access Control 1997: 95-106
12 Rangachari Anand, Nayeem Islam, Trent Jaeger, Josyula R. Rao: A Flexible Security Model for Using Internet Content. SRDS 1997: 89-96
11 Jochen Liedtke, Kevin Elphinstone, Sebastian Schönberg, Hermann Härtig, Gernot Heiser, Nayeem Islam, Trent Jaeger: Achieved IPC Performance. Workshop on Hot Topics in Operating Systems 1997: 28-31
10 Jochen Liedtke, Nayeem Islam, Trent Jaeger: Preventing Denial-of-Service Attacks on a µ-Kernel for WebOSes. Workshop on Hot Topics in Operating Systems 1997: 73-79
9 Nayeem Islam, Rangachari Anand, Trent Jaeger, Josyula R. Rao: A Flexible Security System for Using Internet Content. IEEE Software 14(5): 52-59 (1997)
1996
8EEJang Ho Lee, Atul Prakash, Trent Jaeger, Gwobaw Wu: Supporting Multi-User, Multi-Applet Workspaces in CBE. CSCW 1996: 344-353
1995
7EETrent Jaeger, Atul Prakash: Requirements of role-based access control for collaborative systems. ACM Workshop on Role-Based Access Control 1995
6EETrent Jaeger, Atul Prakash: Management and utilization of knowledge for the automatic improvement of workflow performance. COOCS 1995: 32-43
5EETrent Jaeger, Atul Prakash: Implementation of a discretionary access control model for script-based systems. CSFW 1995: 70-84
4 Trent Jaeger, Atul Prakash: Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems. SEKE 1995: 103-105
1994
3EETrent Jaeger, Atul Prakash: Support for the File System Security Requirements of Computational E-Mail Systems. ACM Conference on Computer and Communications Security 1994: 1-9
2 Trent Jaeger, Atul Prakash, Masayuki Ishikawa: A Framework for Automatic Improvement of Workflows to Meet Performance Goals. ICTAI 1994: 640-646
1993
1 Trent Jaeger, Atul Prakash: BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems. SEKE 1993: 191-198

Coauthor Index

1Rangachari Anand [9] [12]
2Mohit Aron [31]
3Vijayalakshmi Atluri (Vijay Atluri) [40]
4Stefan Berger [46] [53]
5Elisa Bertino [29] [35]
6Ramón Cáceres [46] [53]
7Fidel Cacheda [39]
8Luke St. Clair [52] [55] [58] [59]
9Luke Deller [26] [31]
10Leendert van Doorn [36] [42] [44] [46]
11Antony Edwards [32] [34] [37] [38] [41]
12Kevin Elphinstone [11] [18] [19] [25] [26] [31]
13William Enck [52] [58]
14Dawson R. Engler [33]
15Elena Ferrari [45]
16Vinod Ganapathy [47] [51] [57]
17Alain Gefflaut [25] [26]
18Frederique Giraud [13]
19John Linwood Griffin [46]
20Hermann Härtig (Hermann Haertig) [11]
21Gernot Heiser [11]
22Boniface Hicks [54] [55] [64]
23Michael W. Hicks (Michael Hicks) [64]
24Cynthia E. Irvine [33]
25Masayuki Ishikawa [2]
26Nayeem Islam [9] [10] [11] [12] [13] [14] [15] [16] [17]
27Sushil Jajodia [40]
28Somesh Jha [47] [51] [57] [62]
29Lisa Johansen [52]
30Brian M. Jung [63]
31Dave King [57] [61] [62] [64]
32Larry Koved [50]
33D. Richard Kuhn [29]
34Carl E. Landwehr [29]
35Jang Ho Lee [8]
36Jochen Liedtke [10] [11] [13] [14] [15] [16] [17] [18] [19] [25] [26] [31]
37Guillaume Marceau [50]
38Jonathan M. McCune [53]
39Patrick Drew McDaniel (Patrick McDaniel) [52] [54] [55] [58] [59]
40Tony Michailidis [20]
41Jonathan D. Moffett [35]
42Divya Muthukumaran [63]
43Sylvia L. Osborn [35]
44Vsevolod Panteleenko [14] [15] [16] [18]
45Yoonho Park [14] [15] [16] [18] [19] [25] [26] [31]
46Ronald Perez [36] [46]
47Matthew Pirretti [52]
48Marco Pistoia [50]
49Atul Prakash [1] [2] [3] [4] [5] [6] [7] [8] [17]
50Roy Rada [20]
51Josyula R. Rao [9] [12]
52Ravi Ravi [35]
53Lars Reuther [26]
54Sandra Rueda [54] [55] [58] [61] [65]
55Reiner Sailer [36] [42] [43] [44] [46] [48] [49] [53] [56]
56Ravi S. Sandhu [29]
57Anuj Sawani [63]
58Joshua Schiffman [58] [59] [63]
59Sebastian Schönberg [11]
60Sanjit A. Seshia [62]
61Umesh Shankar [48] [49]
62Hui Song [60]
63Yogesh Sreenivasan [56] [58] [65]
64Jonathon Tidswell [23] [24] [25] [26] [27] [28]
65Patrick Traynor [52]
66Volkmar Uhlig [19] [26]
67Enriquillo Valdez [46]
68David Wagner [33]
69Sam Weber [50]
70Gwobaw Wu [8]
71Liang Xie [60]
72Liangzhao Zeng [50]
73Xiaolan Zhang (Xiaolan (Catherine) Zhang) [32] [34] [36] [37] [38] [39] [41] [42] [43] [44] [50]
74Sencun Zhu [60]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)