2009 |
24 | EE | Paul A. Karger:
Securing virtual machine monitors: what is needed?
ASIACCS 2009: 1 |
2008 |
23 | EE | Sam Weber,
Amitkumar Paradkar,
Suzanne McIntosh,
David C. Toll,
Paul A. Karger,
Matthew Kaplan,
Elaine R. Palmer:
The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System.
ISSRE 2008: 229-238 |
22 | EE | David C. Toll,
Paul A. Karger,
Elaine R. Palmer,
Suzanne McIntosh,
Sam Weber:
The Caernarvon secure embedded operating system.
Operating Systems Review 42(1): 32-39 (2008) |
2007 |
21 | EE | Pau-Chen Cheng,
Pankaj Rohatgi,
Claudia Keser,
Paul A. Karger,
Grant M. Wagner,
Angela Schuett Reninger:
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control.
IEEE Symposium on Security and Privacy 2007: 222-230 |
20 | EE | Paul A. Karger:
Performance and security lessons learned from virtualizing the alpha processor.
ISCA 2007: 392-401 |
2006 |
19 | EE | Paul A. Karger:
Privacy and security threat analysis of the federal employee personal identity verification (PIV) program.
SOUPS 2006: 114-121 |
2005 |
18 | EE | Paul A. Karger:
Multi-Level Security Requirements for Hypervisors.
ACSAC 2005: 267-275 |
17 | EE | Sam Weber,
Paul A. Karger,
Amit M. Paradkar:
A software flaw taxonomy: aiming tools at security.
ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005) |
2004 |
16 | EE | Paul A. Karger,
Helmut Kurth:
Increased Information Flow Needs for High-Assurance Composite Evaluations.
IWIA 2004: 129-140 |
2003 |
15 | EE | Helmut Scherzer,
Ran Canetti,
Paul A. Karger,
Hugo Krawczyk,
Tal Rabin,
David C. Toll:
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
ESORICS 2003: 181-200 |
14 | EE | Paul A. Karger:
The Importance of High Assurance Security in Pervasive Computing.
SPC 2003: 9 |
2002 |
13 | EE | Paul A. Karger,
Roger R. Schell:
Thirty Years Later: Lessons from the Multics Security Evaluation.
ACSAC 2002: 119-148 |
12 | | Gerhard Schellhorn,
Wolfgang Reif,
Axel Schairer,
Paul A. Karger,
Vernon Austel,
David C. Toll:
Verified Formal Security Models for Multiapplicative Smart Cards.
Journal of Computer Security 10(4): 339-368 (2002) |
2000 |
11 | EE | Gerhard Schellhorn,
Wolfgang Reif,
Axel Schairer,
Paul A. Karger,
Vernon Austel,
David C. Toll:
Verification of a Formal Security Model for Multiapplicative Smart Cards.
ESORICS 2000: 17-36 |
1997 |
10 | EE | Rosario Gennaro,
Paul A. Karger,
Stephen M. Matyas,
Mohammad Peyravian,
Allen Roginsky,
David Safford,
Michael Willett,
Nevenko Zunic:
Two-phase cryptographic key recovery system.
Computers & Security 16(6): 481-506 (1997) |
1991 |
9 | | Paul A. Karger,
J. C. Wray:
Storage Channels in Disk Arm Optimization.
IEEE Symposium on Security and Privacy 1991: 52-63 |
8 | EE | Paul A. Karger,
Mary Ellen Zurko,
Douglas W. Bonin,
Andrew H. Mason,
Clifford E. Kahn:
A Retrospective on the VAX VMM Security Kernel.
IEEE Trans. Software Eng. 17(11): 1147-1165 (1991) |
1990 |
7 | | Paul A. Karger,
Mary Ellen Zurko,
Douglas W. Bonin,
Andrew H. Mason,
Clifford E. Kahn:
A VMM Security Kernel for the VAX Architecture.
IEEE Symposium on Security and Privacy 1990: 2-19 |
1989 |
6 | | Paul A. Karger:
Using Registers to Optimize Cross-Domain Call Performance.
ASPLOS 1989: 194-204 |
5 | | Paul A. Karger:
New Methods for Immediate Revocation.
IEEE Symposium on Security and Privacy 1989: 48-55 |
1987 |
4 | | Paul A. Karger:
Limiting the Damage Potential of Discretionary Trojan Horses.
IEEE Symposium on Security and Privacy 1987: 32-37 |
1986 |
3 | | Paul A. Karger:
Authentication and Discretionary Access Control in Computer Networks.
Computer Networks 10: 27-37 (1986) |
1984 |
2 | | Paul A. Karger,
A. J. Herbert:
An Augmented Capability Architecture to Support Lattice Security and Traceability of Access.
IEEE Symposium on Security and Privacy 1984: 2-12 |
1978 |
1 | EE | Paul A. Karger:
The Lattice Security Model In A Public Computing Network.
ACM Annual Conference (1) 1978: 453-459 |