2008 |
66 | | Trent Jaeger:
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008
ACM 2008 |
65 | EE | Sandra Rueda,
Yogesh Sreenivasan,
Trent Jaeger:
Flexible security configuration for virtual machines.
CSAW 2008: 35-44 |
64 | EE | Dave King,
Boniface Hicks,
Michael Hicks,
Trent Jaeger:
Implicit Flows: Can't Live with 'Em, Can't Live without 'Em.
ICISS 2008: 56-70 |
63 | EE | Divya Muthukumaran,
Anuj Sawani,
Joshua Schiffman,
Brian M. Jung,
Trent Jaeger:
Measuring integrity on mobile phone systems.
SACMAT 2008: 155-164 |
62 | EE | Dave King,
Trent Jaeger,
Somesh Jha,
Sanjit A. Seshia:
Effective blame for information-flow violations.
SIGSOFT FSE 2008: 250-260 |
61 | EE | Sandra Rueda,
Dave King,
Trent Jaeger:
Verifying Compliance of Trusted Programs.
USENIX Security Symposium 2008: 321-334 |
60 | EE | Liang Xie,
Hui Song,
Trent Jaeger,
Sencun Zhu:
A systematic approach for cell-phone worm containment.
WWW 2008: 1083-1084 |
2007 |
59 | EE | Luke St. Clair,
Joshua Schiffman,
Trent Jaeger,
Patrick McDaniel:
Establishing and Sustaining System Integrity via Root of Trust Installation.
ACSAC 2007: 19-29 |
58 | EE | William Enck,
Sandra Rueda,
Joshua Schiffman,
Yogesh Sreenivasan,
Luke St. Clair,
Trent Jaeger,
Patrick McDaniel:
Protecting users from "themselves".
CSAW 2007: 29-36 |
57 | EE | Vinod Ganapathy,
Dave King,
Trent Jaeger,
Somesh Jha:
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis.
ICSE 2007: 458-467 |
56 | EE | Trent Jaeger,
Reiner Sailer,
Yogesh Sreenivasan:
Managing the risk of covert information flows in virtual machine systems.
SACMAT 2007: 81-90 |
55 | EE | Boniface Hicks,
Sandra Rueda,
Luke St. Clair,
Trent Jaeger,
Patrick Drew McDaniel:
A logical specification and analysis for SELinux MLS policy.
SACMAT 2007: 91-100 |
54 | EE | Boniface Hicks,
Sandra Rueda,
Trent Jaeger,
Patrick Drew McDaniel:
From Trusted to Secure: Building and Executing Applications That Enforce System Security.
USENIX Annual Technical Conference 2007: 205-218 |
2006 |
53 | EE | Jonathan M. McCune,
Trent Jaeger,
Stefan Berger,
Ramón Cáceres,
Reiner Sailer:
Shamon: A System for Distributed Mandatory Access Control.
ACSAC 2006: 23-32 |
52 | EE | Luke St. Clair,
Lisa Johansen,
William Enck,
Matthew Pirretti,
Patrick Traynor,
Patrick McDaniel,
Trent Jaeger:
Password Exhaustion: Predicting the End of Password Usefulness.
ICISS 2006: 37-55 |
51 | EE | Vinod Ganapathy,
Trent Jaeger,
Somesh Jha:
Retrofitting Legacy Code for Authorization Policy Enforcement.
IEEE Symposium on Security and Privacy 2006: 214-229 |
50 | EE | Xiaolan Zhang,
Larry Koved,
Marco Pistoia,
Sam Weber,
Trent Jaeger,
Guillaume Marceau,
Liangzhao Zeng:
The case for analysis preserving language transformation.
ISSTA 2006: 191-202 |
49 | EE | Umesh Shankar,
Trent Jaeger,
Reiner Sailer:
Toward Automated Information-Flow Integrity Verification for Security-Critical Applications.
NDSS 2006 |
48 | EE | Trent Jaeger,
Reiner Sailer,
Umesh Shankar:
PRIMA: policy-reduced integrity measurement architecture.
SACMAT 2006: 19-28 |
2005 |
47 | EE | Vinod Ganapathy,
Trent Jaeger,
Somesh Jha:
Automatic placement of authorization hooks in the linux security modules framework.
ACM Conference on Computer and Communications Security 2005: 330-339 |
46 | EE | Reiner Sailer,
Trent Jaeger,
Enriquillo Valdez,
Ramón Cáceres,
Ronald Perez,
Stefan Berger,
John Linwood Griffin,
Leendert van Doorn:
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor.
ACSAC 2005: 276-285 |
2004 |
45 | | Trent Jaeger,
Elena Ferrari:
SACMAT 2004, 9th ACM Symposium on Access Control Models and Technologies, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings
ACM 2004 |
44 | EE | Reiner Sailer,
Trent Jaeger,
Xiaolan Zhang,
Leendert van Doorn:
Attestation-based policy enforcement for remote access.
ACM Conference on Computer and Communications Security 2004: 308-317 |
43 | EE | Trent Jaeger,
Reiner Sailer,
Xiaolan Zhang:
Resolving constraint conflicts.
SACMAT 2004: 105-114 |
42 | EE | Reiner Sailer,
Xiaolan Zhang,
Trent Jaeger,
Leendert van Doorn:
Design and Implementation of a TCG-based Integrity Measurement Architecture.
USENIX Security Symposium 2004: 223-238 |
41 | EE | Trent Jaeger,
Antony Edwards,
Xiaolan Zhang:
Consistency analysis of authorization hook placement in the Linux security modules framework.
ACM Trans. Inf. Syst. Secur. 7(2): 175-205 (2004) |
2003 |
40 | | Sushil Jajodia,
Vijayalakshmi Atluri,
Trent Jaeger:
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003
ACM 2003 |
39 | EE | Trent Jaeger,
Xiaolan Zhang,
Fidel Cacheda:
Policy management using access control spaces.
ACM Trans. Inf. Syst. Secur. 6(3): 327-364 (2003) |
2002 |
38 | EE | Antony Edwards,
Trent Jaeger,
Xiaolan Zhang:
Runtime verification of authorization hook placement for the linux security modules framework.
ACM Conference on Computer and Communications Security 2002: 225-234 |
37 | EE | Trent Jaeger,
Antony Edwards,
Xiaolan Zhang:
Gaining and maintaining confidence in operating systems security.
ACM SIGOPS European Workshop 2002: 201-204 |
36 | EE | Xiaolan Zhang,
Leendert van Doorn,
Trent Jaeger,
Ronald Perez,
Reiner Sailer:
Secure coprocessor-based intrusion detection.
ACM SIGOPS European Workshop 2002: 239-242 |
35 | EE | Elisa Bertino,
Trent Jaeger,
Jonathan D. Moffett,
Sylvia L. Osborn,
Ravi Ravi:
Making access control more usable.
SACMAT 2002: 141 |
34 | EE | Trent Jaeger,
Antony Edwards,
Xiaolan Zhang:
Managing access control policies using access control spaces.
SACMAT 2002: 3-12 |
33 | EE | Dawson R. Engler,
Cynthia E. Irvine,
Trent Jaeger,
David Wagner:
Cool security trends.
SACMAT 2002: 53 |
32 | EE | Xiaolan Zhang,
Antony Edwards,
Trent Jaeger:
Using CQUAL for Static Analysis of Authorization Hook Placement.
USENIX Security Symposium 2002: 33-48 |
2001 |
31 | EE | Mohit Aron,
Jochen Liedtke,
Kevin Elphinstone,
Yoonho Park,
Trent Jaeger,
Luke Deller:
The SawMill Framework for Virtual Memory Diversity.
ACSAC 2001: 3-10 |
30 | EE | Trent Jaeger:
Managing access control complexity using metrices.
SACMAT 2001: 131-139 |
29 | EE | Ravi S. Sandhu,
Elisa Bertino,
Trent Jaeger,
D. Richard Kuhn,
Carl E. Landwehr:
Panel: The next generation of acess control models (panel session): do we need them and what should they be?
SACMAT 2001: 53 |
28 | EE | Trent Jaeger,
Jonathon Tidswell:
Practical safety in flexible access control models.
ACM Trans. Inf. Syst. Secur. 4(2): 158-190 (2001) |
2000 |
27 | EE | Jonathon Tidswell,
Trent Jaeger:
An access control model for simplifying constraint expression.
ACM Conference on Computer and Communications Security 2000: 154-163 |
26 | EE | Alain Gefflaut,
Trent Jaeger,
Yoonho Park,
Jochen Liedtke,
Kevin Elphinstone,
Volkmar Uhlig,
Jonathon Tidswell,
Luke Deller,
Lars Reuther:
The SawMill multiserver approach.
ACM SIGOPS European Workshop 2000: 109-114 |
25 | EE | Trent Jaeger,
Jonathon Tidswell,
Alain Gefflaut,
Yoonho Park,
Kevin Elphinstone,
Jochen Liedtke:
Synchronous IPC over transparent monitors.
ACM SIGOPS European Workshop 2000: 189-194 |
24 | EE | Trent Jaeger,
Jonathon Tidswell:
Rebuttal to the NIST RBAC model proposal.
ACM Workshop on Role-Based Access Control 2000: 65-66 |
23 | EE | Jonathon Tidswell,
Trent Jaeger:
Integrated constraints and inheritance in DTAC.
ACM Workshop on Role-Based Access Control 2000: 93-102 |
1999 |
22 | EE | Trent Jaeger:
On the Increasing Importance of Constraints.
ACM Workshop on Role-Based Access Control 1999: 33-42 |
21 | | Trent Jaeger:
Access Control in Configurable Systems.
Secure Internet Programming 1999: 289-316 |
20 | EE | Trent Jaeger,
Tony Michailidis,
Roy Rada:
Access Control in a Virtual University.
WETICE 1999: 135-140 |
19 | EE | Jochen Liedtke,
Volkmar Uhlig,
Kevin Elphinstone,
Trent Jaeger,
Yoonho Park:
How To Schedule Unlimited Memory Pinning of Untrusted Processes Or Provisional Ideas about Service-Neutrality.
Workshop on Hot Topics in Operating Systems 1999: 153- |
18 | EE | Trent Jaeger,
Kevin Elphinstone,
Jochen Liedtke,
Vsevolod Panteleenko,
Yoonho Park:
Flexible Access Control using IPC Redirection.
Workshop on Hot Topics in Operating Systems 1999: 191- |
17 | EE | Trent Jaeger,
Atul Prakash,
Jochen Liedtke,
Nayeem Islam:
Flexible Control of Downloaded Executable Content.
ACM Trans. Inf. Syst. Secur. 2(2): 177-228 (1999) |
1998 |
16 | EE | Trent Jaeger,
Jochen Liedtke,
Vsevolod Panteleenko,
Yoonho Park,
Nayeem Islam:
Security architecture for component-based operating systems.
ACM SIGOPS European Workshop 1998: 222-228 |
15 | EE | Jochen Liedtke,
Nayeem Islam,
Trent Jaeger,
Vsevolod Panteleenko,
Yoonho Park:
An unconventional proposal: using the x86 architecture as the ubiquitous virtual standard architecture.
ACM SIGOPS European Workshop 1998: 237-241 |
14 | EE | Jochen Liedtke,
Nayeem Islam,
Trent Jaeger,
Vsevolod Panteleenko,
Yoonho Park:
Irreproducible benchmarks might be sometimes helpful.
ACM SIGOPS European Workshop 1998: 242-246 |
1997 |
13 | EE | Trent Jaeger,
Frederique Giraud,
Nayeem Islam,
Jochen Liedtke:
A role-based access control model for protection domain derivation and management.
ACM Workshop on Role-Based Access Control 1997: 95-106 |
12 | | Rangachari Anand,
Nayeem Islam,
Trent Jaeger,
Josyula R. Rao:
A Flexible Security Model for Using Internet Content.
SRDS 1997: 89-96 |
11 | | Jochen Liedtke,
Kevin Elphinstone,
Sebastian Schönberg,
Hermann Härtig,
Gernot Heiser,
Nayeem Islam,
Trent Jaeger:
Achieved IPC Performance.
Workshop on Hot Topics in Operating Systems 1997: 28-31 |
10 | | Jochen Liedtke,
Nayeem Islam,
Trent Jaeger:
Preventing Denial-of-Service Attacks on a µ-Kernel for WebOSes.
Workshop on Hot Topics in Operating Systems 1997: 73-79 |
9 | | Nayeem Islam,
Rangachari Anand,
Trent Jaeger,
Josyula R. Rao:
A Flexible Security System for Using Internet Content.
IEEE Software 14(5): 52-59 (1997) |
1996 |
8 | EE | Jang Ho Lee,
Atul Prakash,
Trent Jaeger,
Gwobaw Wu:
Supporting Multi-User, Multi-Applet Workspaces in CBE.
CSCW 1996: 344-353 |
1995 |
7 | EE | Trent Jaeger,
Atul Prakash:
Requirements of role-based access control for collaborative systems.
ACM Workshop on Role-Based Access Control 1995 |
6 | EE | Trent Jaeger,
Atul Prakash:
Management and utilization of knowledge for the automatic improvement of workflow performance.
COOCS 1995: 32-43 |
5 | EE | Trent Jaeger,
Atul Prakash:
Implementation of a discretionary access control model for script-based systems.
CSFW 1995: 70-84 |
4 | | Trent Jaeger,
Atul Prakash:
Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems.
SEKE 1995: 103-105 |
1994 |
3 | EE | Trent Jaeger,
Atul Prakash:
Support for the File System Security Requirements of Computational E-Mail Systems.
ACM Conference on Computer and Communications Security 1994: 1-9 |
2 | | Trent Jaeger,
Atul Prakash,
Masayuki Ishikawa:
A Framework for Automatic Improvement of Workflows to Meet Performance Goals.
ICTAI 1994: 640-646 |
1993 |
1 | | Trent Jaeger,
Atul Prakash:
BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems.
SEKE 1993: 191-198 |