dblp.uni-trier.dewww.uni-trier.de

Paul A. Karger

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
24EEPaul A. Karger: Securing virtual machine monitors: what is needed? ASIACCS 2009: 1
2008
23EESam Weber, Amitkumar Paradkar, Suzanne McIntosh, David C. Toll, Paul A. Karger, Matthew Kaplan, Elaine R. Palmer: The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System. ISSRE 2008: 229-238
22EEDavid C. Toll, Paul A. Karger, Elaine R. Palmer, Suzanne McIntosh, Sam Weber: The Caernarvon secure embedded operating system. Operating Systems Review 42(1): 32-39 (2008)
2007
21EEPau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner, Angela Schuett Reninger: Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. IEEE Symposium on Security and Privacy 2007: 222-230
20EEPaul A. Karger: Performance and security lessons learned from virtualizing the alpha processor. ISCA 2007: 392-401
2006
19EEPaul A. Karger: Privacy and security threat analysis of the federal employee personal identity verification (PIV) program. SOUPS 2006: 114-121
2005
18EEPaul A. Karger: Multi-Level Security Requirements for Hypervisors. ACSAC 2005: 267-275
17EESam Weber, Paul A. Karger, Amit M. Paradkar: A software flaw taxonomy: aiming tools at security. ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005)
2004
16EEPaul A. Karger, Helmut Kurth: Increased Information Flow Needs for High-Assurance Composite Evaluations. IWIA 2004: 129-140
2003
15EEHelmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll: Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. ESORICS 2003: 181-200
14EEPaul A. Karger: The Importance of High Assurance Security in Pervasive Computing. SPC 2003: 9
2002
13EEPaul A. Karger, Roger R. Schell: Thirty Years Later: Lessons from the Multics Security Evaluation. ACSAC 2002: 119-148
12 Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll: Verified Formal Security Models for Multiapplicative Smart Cards. Journal of Computer Security 10(4): 339-368 (2002)
2000
11EEGerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll: Verification of a Formal Security Model for Multiapplicative Smart Cards. ESORICS 2000: 17-36
1997
10EERosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic: Two-phase cryptographic key recovery system. Computers & Security 16(6): 481-506 (1997)
1991
9 Paul A. Karger, J. C. Wray: Storage Channels in Disk Arm Optimization. IEEE Symposium on Security and Privacy 1991: 52-63
8EEPaul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn: A Retrospective on the VAX VMM Security Kernel. IEEE Trans. Software Eng. 17(11): 1147-1165 (1991)
1990
7 Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn: A VMM Security Kernel for the VAX Architecture. IEEE Symposium on Security and Privacy 1990: 2-19
1989
6 Paul A. Karger: Using Registers to Optimize Cross-Domain Call Performance. ASPLOS 1989: 194-204
5 Paul A. Karger: New Methods for Immediate Revocation. IEEE Symposium on Security and Privacy 1989: 48-55
1987
4 Paul A. Karger: Limiting the Damage Potential of Discretionary Trojan Horses. IEEE Symposium on Security and Privacy 1987: 32-37
1986
3 Paul A. Karger: Authentication and Discretionary Access Control in Computer Networks. Computer Networks 10: 27-37 (1986)
1984
2 Paul A. Karger, A. J. Herbert: An Augmented Capability Architecture to Support Lattice Security and Traceability of Access. IEEE Symposium on Security and Privacy 1984: 2-12
1978
1EEPaul A. Karger: The Lattice Security Model In A Public Computing Network. ACM Annual Conference (1) 1978: 453-459

Coauthor Index

1Vernon Austel [11] [12]
2Douglas W. Bonin [7] [8]
3Ran Canetti [15]
4Pau-Chen Cheng [21]
5Rosario Gennaro [10]
6A. J. Herbert [2]
7Clifford E. Kahn [7] [8]
8Matthew Kaplan [23]
9Claudia Keser [21]
10Hugo Krawczyk [15]
11Helmut Kurth [16]
12Andrew H. Mason [7] [8]
13Stephen M. Matyas [10]
14Suzanne McIntosh [22] [23]
15Elaine R. Palmer [22] [23]
16Amit M. Paradkar [17]
17Amitkumar Paradkar [23]
18Mohammad Peyravian [10]
19Tal Rabin [15]
20Wolfgang Reif [11] [12]
21Angela Schuett Reninger (Angela Schuett) [21]
22Allen Roginsky [10]
23Pankaj Rohatgi [21]
24David Safford [10]
25Axel Schairer [11] [12]
26Roger R. Schell [13]
27Gerhard Schellhorn [11] [12]
28Helmut Scherzer [15]
29David C. Toll [11] [12] [15] [22] [23]
30Grant M. Wagner [21]
31Sam Weber [17] [22] [23]
32Michael Willett [10]
33J. C. Wray [9]
34Nevenko Zunic [10]
35Mary Ellen Zurko [7] [8]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)