| 2009 |
| 24 | EE | Paul A. Karger:
Securing virtual machine monitors: what is needed?
ASIACCS 2009: 1 |
| 2008 |
| 23 | EE | Sam Weber,
Amitkumar Paradkar,
Suzanne McIntosh,
David C. Toll,
Paul A. Karger,
Matthew Kaplan,
Elaine R. Palmer:
The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System.
ISSRE 2008: 229-238 |
| 22 | EE | David C. Toll,
Paul A. Karger,
Elaine R. Palmer,
Suzanne McIntosh,
Sam Weber:
The Caernarvon secure embedded operating system.
Operating Systems Review 42(1): 32-39 (2008) |
| 2007 |
| 21 | EE | Pau-Chen Cheng,
Pankaj Rohatgi,
Claudia Keser,
Paul A. Karger,
Grant M. Wagner,
Angela Schuett Reninger:
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control.
IEEE Symposium on Security and Privacy 2007: 222-230 |
| 20 | EE | Paul A. Karger:
Performance and security lessons learned from virtualizing the alpha processor.
ISCA 2007: 392-401 |
| 2006 |
| 19 | EE | Paul A. Karger:
Privacy and security threat analysis of the federal employee personal identity verification (PIV) program.
SOUPS 2006: 114-121 |
| 2005 |
| 18 | EE | Paul A. Karger:
Multi-Level Security Requirements for Hypervisors.
ACSAC 2005: 267-275 |
| 17 | EE | Sam Weber,
Paul A. Karger,
Amit M. Paradkar:
A software flaw taxonomy: aiming tools at security.
ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005) |
| 2004 |
| 16 | EE | Paul A. Karger,
Helmut Kurth:
Increased Information Flow Needs for High-Assurance Composite Evaluations.
IWIA 2004: 129-140 |
| 2003 |
| 15 | EE | Helmut Scherzer,
Ran Canetti,
Paul A. Karger,
Hugo Krawczyk,
Tal Rabin,
David C. Toll:
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
ESORICS 2003: 181-200 |
| 14 | EE | Paul A. Karger:
The Importance of High Assurance Security in Pervasive Computing.
SPC 2003: 9 |
| 2002 |
| 13 | EE | Paul A. Karger,
Roger R. Schell:
Thirty Years Later: Lessons from the Multics Security Evaluation.
ACSAC 2002: 119-148 |
| 12 | | Gerhard Schellhorn,
Wolfgang Reif,
Axel Schairer,
Paul A. Karger,
Vernon Austel,
David C. Toll:
Verified Formal Security Models for Multiapplicative Smart Cards.
Journal of Computer Security 10(4): 339-368 (2002) |
| 2000 |
| 11 | EE | Gerhard Schellhorn,
Wolfgang Reif,
Axel Schairer,
Paul A. Karger,
Vernon Austel,
David C. Toll:
Verification of a Formal Security Model for Multiapplicative Smart Cards.
ESORICS 2000: 17-36 |
| 1997 |
| 10 | EE | Rosario Gennaro,
Paul A. Karger,
Stephen M. Matyas,
Mohammad Peyravian,
Allen Roginsky,
David Safford,
Michael Willett,
Nevenko Zunic:
Two-phase cryptographic key recovery system.
Computers & Security 16(6): 481-506 (1997) |
| 1991 |
| 9 | | Paul A. Karger,
J. C. Wray:
Storage Channels in Disk Arm Optimization.
IEEE Symposium on Security and Privacy 1991: 52-63 |
| 8 | EE | Paul A. Karger,
Mary Ellen Zurko,
Douglas W. Bonin,
Andrew H. Mason,
Clifford E. Kahn:
A Retrospective on the VAX VMM Security Kernel.
IEEE Trans. Software Eng. 17(11): 1147-1165 (1991) |
| 1990 |
| 7 | | Paul A. Karger,
Mary Ellen Zurko,
Douglas W. Bonin,
Andrew H. Mason,
Clifford E. Kahn:
A VMM Security Kernel for the VAX Architecture.
IEEE Symposium on Security and Privacy 1990: 2-19 |
| 1989 |
| 6 | | Paul A. Karger:
Using Registers to Optimize Cross-Domain Call Performance.
ASPLOS 1989: 194-204 |
| 5 | | Paul A. Karger:
New Methods for Immediate Revocation.
IEEE Symposium on Security and Privacy 1989: 48-55 |
| 1987 |
| 4 | | Paul A. Karger:
Limiting the Damage Potential of Discretionary Trojan Horses.
IEEE Symposium on Security and Privacy 1987: 32-37 |
| 1986 |
| 3 | | Paul A. Karger:
Authentication and Discretionary Access Control in Computer Networks.
Computer Networks 10: 27-37 (1986) |
| 1984 |
| 2 | | Paul A. Karger,
A. J. Herbert:
An Augmented Capability Architecture to Support Lattice Security and Traceability of Access.
IEEE Symposium on Security and Privacy 1984: 2-12 |
| 1978 |
| 1 | EE | Paul A. Karger:
The Lattice Security Model In A Public Computing Network.
ACM Annual Conference (1) 1978: 453-459 |