2008 | ||
---|---|---|
66 | Trent Jaeger: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008 ACM 2008 | |
65 | EE | Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger: Flexible security configuration for virtual machines. CSAW 2008: 35-44 |
64 | EE | Dave King, Boniface Hicks, Michael Hicks, Trent Jaeger: Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. ICISS 2008: 56-70 |
63 | EE | Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger: Measuring integrity on mobile phone systems. SACMAT 2008: 155-164 |
62 | EE | Dave King, Trent Jaeger, Somesh Jha, Sanjit A. Seshia: Effective blame for information-flow violations. SIGSOFT FSE 2008: 250-260 |
61 | EE | Sandra Rueda, Dave King, Trent Jaeger: Verifying Compliance of Trusted Programs. USENIX Security Symposium 2008: 321-334 |
60 | EE | Liang Xie, Hui Song, Trent Jaeger, Sencun Zhu: A systematic approach for cell-phone worm containment. WWW 2008: 1083-1084 |
2007 | ||
59 | EE | Luke St. Clair, Joshua Schiffman, Trent Jaeger, Patrick McDaniel: Establishing and Sustaining System Integrity via Root of Trust Installation. ACSAC 2007: 19-29 |
58 | EE | William Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, Patrick McDaniel: Protecting users from "themselves". CSAW 2007: 29-36 |
57 | EE | Vinod Ganapathy, Dave King, Trent Jaeger, Somesh Jha: Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. ICSE 2007: 458-467 |
56 | EE | Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan: Managing the risk of covert information flows in virtual machine systems. SACMAT 2007: 81-90 |
55 | EE | Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, Patrick Drew McDaniel: A logical specification and analysis for SELinux MLS policy. SACMAT 2007: 91-100 |
54 | EE | Boniface Hicks, Sandra Rueda, Trent Jaeger, Patrick Drew McDaniel: From Trusted to Secure: Building and Executing Applications That Enforce System Security. USENIX Annual Technical Conference 2007: 205-218 |
2006 | ||
53 | EE | Jonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer: Shamon: A System for Distributed Mandatory Access Control. ACSAC 2006: 23-32 |
52 | EE | Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger: Password Exhaustion: Predicting the End of Password Usefulness. ICISS 2006: 37-55 |
51 | EE | Vinod Ganapathy, Trent Jaeger, Somesh Jha: Retrofitting Legacy Code for Authorization Policy Enforcement. IEEE Symposium on Security and Privacy 2006: 214-229 |
50 | EE | Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, Guillaume Marceau, Liangzhao Zeng: The case for analysis preserving language transformation. ISSTA 2006: 191-202 |
49 | EE | Umesh Shankar, Trent Jaeger, Reiner Sailer: Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. NDSS 2006 |
48 | EE | Trent Jaeger, Reiner Sailer, Umesh Shankar: PRIMA: policy-reduced integrity measurement architecture. SACMAT 2006: 19-28 |
2005 | ||
47 | EE | Vinod Ganapathy, Trent Jaeger, Somesh Jha: Automatic placement of authorization hooks in the linux security modules framework. ACM Conference on Computer and Communications Security 2005: 330-339 |
46 | EE | Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramón Cáceres, Ronald Perez, Stefan Berger, John Linwood Griffin, Leendert van Doorn: Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. ACSAC 2005: 276-285 |
2004 | ||
45 | Trent Jaeger, Elena Ferrari: SACMAT 2004, 9th ACM Symposium on Access Control Models and Technologies, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings ACM 2004 | |
44 | EE | Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn: Attestation-based policy enforcement for remote access. ACM Conference on Computer and Communications Security 2004: 308-317 |
43 | EE | Trent Jaeger, Reiner Sailer, Xiaolan Zhang: Resolving constraint conflicts. SACMAT 2004: 105-114 |
42 | EE | Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn: Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium 2004: 223-238 |
41 | EE | Trent Jaeger, Antony Edwards, Xiaolan Zhang: Consistency analysis of authorization hook placement in the Linux security modules framework. ACM Trans. Inf. Syst. Secur. 7(2): 175-205 (2004) |
2003 | ||
40 | Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003 ACM 2003 | |
39 | EE | Trent Jaeger, Xiaolan Zhang, Fidel Cacheda: Policy management using access control spaces. ACM Trans. Inf. Syst. Secur. 6(3): 327-364 (2003) |
2002 | ||
38 | EE | Antony Edwards, Trent Jaeger, Xiaolan Zhang: Runtime verification of authorization hook placement for the linux security modules framework. ACM Conference on Computer and Communications Security 2002: 225-234 |
37 | EE | Trent Jaeger, Antony Edwards, Xiaolan Zhang: Gaining and maintaining confidence in operating systems security. ACM SIGOPS European Workshop 2002: 201-204 |
36 | EE | Xiaolan Zhang, Leendert van Doorn, Trent Jaeger, Ronald Perez, Reiner Sailer: Secure coprocessor-based intrusion detection. ACM SIGOPS European Workshop 2002: 239-242 |
35 | EE | Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi Ravi: Making access control more usable. SACMAT 2002: 141 |
34 | EE | Trent Jaeger, Antony Edwards, Xiaolan Zhang: Managing access control policies using access control spaces. SACMAT 2002: 3-12 |
33 | EE | Dawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David Wagner: Cool security trends. SACMAT 2002: 53 |
32 | EE | Xiaolan Zhang, Antony Edwards, Trent Jaeger: Using CQUAL for Static Analysis of Authorization Hook Placement. USENIX Security Symposium 2002: 33-48 |
2001 | ||
31 | EE | Mohit Aron, Jochen Liedtke, Kevin Elphinstone, Yoonho Park, Trent Jaeger, Luke Deller: The SawMill Framework for Virtual Memory Diversity. ACSAC 2001: 3-10 |
30 | EE | Trent Jaeger: Managing access control complexity using metrices. SACMAT 2001: 131-139 |
29 | EE | Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr: Panel: The next generation of acess control models (panel session): do we need them and what should they be? SACMAT 2001: 53 |
28 | EE | Trent Jaeger, Jonathon Tidswell: Practical safety in flexible access control models. ACM Trans. Inf. Syst. Secur. 4(2): 158-190 (2001) |
2000 | ||
27 | EE | Jonathon Tidswell, Trent Jaeger: An access control model for simplifying constraint expression. ACM Conference on Computer and Communications Security 2000: 154-163 |
26 | EE | Alain Gefflaut, Trent Jaeger, Yoonho Park, Jochen Liedtke, Kevin Elphinstone, Volkmar Uhlig, Jonathon Tidswell, Luke Deller, Lars Reuther: The SawMill multiserver approach. ACM SIGOPS European Workshop 2000: 109-114 |
25 | EE | Trent Jaeger, Jonathon Tidswell, Alain Gefflaut, Yoonho Park, Kevin Elphinstone, Jochen Liedtke: Synchronous IPC over transparent monitors. ACM SIGOPS European Workshop 2000: 189-194 |
24 | EE | Trent Jaeger, Jonathon Tidswell: Rebuttal to the NIST RBAC model proposal. ACM Workshop on Role-Based Access Control 2000: 65-66 |
23 | EE | Jonathon Tidswell, Trent Jaeger: Integrated constraints and inheritance in DTAC. ACM Workshop on Role-Based Access Control 2000: 93-102 |
1999 | ||
22 | EE | Trent Jaeger: On the Increasing Importance of Constraints. ACM Workshop on Role-Based Access Control 1999: 33-42 |
21 | Trent Jaeger: Access Control in Configurable Systems. Secure Internet Programming 1999: 289-316 | |
20 | EE | Trent Jaeger, Tony Michailidis, Roy Rada: Access Control in a Virtual University. WETICE 1999: 135-140 |
19 | EE | Jochen Liedtke, Volkmar Uhlig, Kevin Elphinstone, Trent Jaeger, Yoonho Park: How To Schedule Unlimited Memory Pinning of Untrusted Processes Or Provisional Ideas about Service-Neutrality. Workshop on Hot Topics in Operating Systems 1999: 153- |
18 | EE | Trent Jaeger, Kevin Elphinstone, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park: Flexible Access Control using IPC Redirection. Workshop on Hot Topics in Operating Systems 1999: 191- |
17 | EE | Trent Jaeger, Atul Prakash, Jochen Liedtke, Nayeem Islam: Flexible Control of Downloaded Executable Content. ACM Trans. Inf. Syst. Secur. 2(2): 177-228 (1999) |
1998 | ||
16 | EE | Trent Jaeger, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park, Nayeem Islam: Security architecture for component-based operating systems. ACM SIGOPS European Workshop 1998: 222-228 |
15 | EE | Jochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, Yoonho Park: An unconventional proposal: using the x86 architecture as the ubiquitous virtual standard architecture. ACM SIGOPS European Workshop 1998: 237-241 |
14 | EE | Jochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, Yoonho Park: Irreproducible benchmarks might be sometimes helpful. ACM SIGOPS European Workshop 1998: 242-246 |
1997 | ||
13 | EE | Trent Jaeger, Frederique Giraud, Nayeem Islam, Jochen Liedtke: A role-based access control model for protection domain derivation and management. ACM Workshop on Role-Based Access Control 1997: 95-106 |
12 | Rangachari Anand, Nayeem Islam, Trent Jaeger, Josyula R. Rao: A Flexible Security Model for Using Internet Content. SRDS 1997: 89-96 | |
11 | Jochen Liedtke, Kevin Elphinstone, Sebastian Schönberg, Hermann Härtig, Gernot Heiser, Nayeem Islam, Trent Jaeger: Achieved IPC Performance. Workshop on Hot Topics in Operating Systems 1997: 28-31 | |
10 | Jochen Liedtke, Nayeem Islam, Trent Jaeger: Preventing Denial-of-Service Attacks on a µ-Kernel for WebOSes. Workshop on Hot Topics in Operating Systems 1997: 73-79 | |
9 | Nayeem Islam, Rangachari Anand, Trent Jaeger, Josyula R. Rao: A Flexible Security System for Using Internet Content. IEEE Software 14(5): 52-59 (1997) | |
1996 | ||
8 | EE | Jang Ho Lee, Atul Prakash, Trent Jaeger, Gwobaw Wu: Supporting Multi-User, Multi-Applet Workspaces in CBE. CSCW 1996: 344-353 |
1995 | ||
7 | EE | Trent Jaeger, Atul Prakash: Requirements of role-based access control for collaborative systems. ACM Workshop on Role-Based Access Control 1995 |
6 | EE | Trent Jaeger, Atul Prakash: Management and utilization of knowledge for the automatic improvement of workflow performance. COOCS 1995: 32-43 |
5 | EE | Trent Jaeger, Atul Prakash: Implementation of a discretionary access control model for script-based systems. CSFW 1995: 70-84 |
4 | Trent Jaeger, Atul Prakash: Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems. SEKE 1995: 103-105 | |
1994 | ||
3 | EE | Trent Jaeger, Atul Prakash: Support for the File System Security Requirements of Computational E-Mail Systems. ACM Conference on Computer and Communications Security 1994: 1-9 |
2 | Trent Jaeger, Atul Prakash, Masayuki Ishikawa: A Framework for Automatic Improvement of Workflows to Meet Performance Goals. ICTAI 1994: 640-646 | |
1993 | ||
1 | Trent Jaeger, Atul Prakash: BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems. SEKE 1993: 191-198 |