Search the dblp DataBase
Trent Jaeger :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jang Ho Lee , Atul Prakash , Trent Jaeger , Gwobaw Wu Supporting Multi-User, Multi-Applet Workspaces in CBE. [Citation Graph (1, 0)][DBLP ] CSCW, 1996, pp:344-353 [Conf ] Mohit Aron , Jochen Liedtke , Kevin Elphinstone , Yoonho Park , Trent Jaeger , Luke Deller The SawMill Framework for Virtual Memory Diversity. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:3-10 [Conf ] Reiner Sailer , Trent Jaeger , Enriquillo Valdez , Ramón Cáceres , Ronald Perez , Stefan Berger , John Linwood Griffin , Leendert van Doorn Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:276-285 [Conf ] Antony Edwards , Trent Jaeger , Xiaolan Zhang Runtime verification of authorization hook placement for the linux security modules framework. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:225-234 [Conf ] Vinod Ganapathy , Trent Jaeger , Somesh Jha Automatic placement of authorization hooks in the linux security modules framework. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:330-339 [Conf ] Trent Jaeger , Atul Prakash Support for the File System Security Requirements of Computational E-Mail Systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:1-9 [Conf ] Reiner Sailer , Trent Jaeger , Xiaolan Zhang , Leendert van Doorn Attestation-based policy enforcement for remote access. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:308-317 [Conf ] Jonathon Tidswell , Trent Jaeger An access control model for simplifying constraint expression. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:154-163 [Conf ] Trent Jaeger , Atul Prakash Implementation of a discretionary access control model for script-based systems. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:70-84 [Conf ] Trent Jaeger Access Control in Configurable Systems. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:289-316 [Conf ] Trent Jaeger , Atul Prakash Management and utilization of knowledge for the automatic improvement of workflow performance. [Citation Graph (0, 0)][DBLP ] COOCS, 1995, pp:32-43 [Conf ] Trent Jaeger , Kevin Elphinstone , Jochen Liedtke , Vsevolod Panteleenko , Yoonho Park Flexible Access Control using IPC Redirection. [Citation Graph (0, 0)][DBLP ] Workshop on Hot Topics in Operating Systems, 1999, pp:191-0 [Conf ] Jochen Liedtke , Kevin Elphinstone , Sebastian Schönberg , Hermann Härtig , Gernot Heiser , Nayeem Islam , Trent Jaeger Achieved IPC Performance. [Citation Graph (0, 0)][DBLP ] Workshop on Hot Topics in Operating Systems, 1997, pp:28-31 [Conf ] Jochen Liedtke , Nayeem Islam , Trent Jaeger Preventing Denial-of-Service Attacks on a µ-Kernel for WebOSes. [Citation Graph (0, 0)][DBLP ] Workshop on Hot Topics in Operating Systems, 1997, pp:73-79 [Conf ] Jochen Liedtke , Volkmar Uhlig , Kevin Elphinstone , Trent Jaeger , Yoonho Park How To Schedule Unlimited Memory Pinning of Untrusted Processes Or Provisional Ideas about Service-Neutrality. [Citation Graph (0, 0)][DBLP ] Workshop on Hot Topics in Operating Systems, 1999, pp:153-0 [Conf ] Luke St. Clair , Lisa Johansen , William Enck , Matthew Pirretti , Patrick Traynor , Patrick McDaniel , Trent Jaeger Password Exhaustion: Predicting the End of Password Usefulness. [Citation Graph (0, 0)][DBLP ] ICISS, 2006, pp:37-55 [Conf ] Vinod Ganapathy , David King , Trent Jaeger , Somesh Jha Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. [Citation Graph (0, 0)][DBLP ] ICSE, 2007, pp:458-467 [Conf ] Trent Jaeger , Atul Prakash , Masayuki Ishikawa A Framework for Automatic Improvement of Workflows to Meet Performance Goals. [Citation Graph (0, 0)][DBLP ] ICTAI, 1994, pp:640-646 [Conf ] Xiaolan Zhang , Larry Koved , Marco Pistoia , Sam Weber , Trent Jaeger , Guillaume Marceau , Liangzhao Zeng The case for analysis preserving language transformation. [Citation Graph (0, 0)][DBLP ] ISSTA, 2006, pp:191-202 [Conf ] Umesh Shankar , Trent Jaeger , Reiner Sailer Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. [Citation Graph (0, 0)][DBLP ] NDSS, 2006, pp:- [Conf ] Jonathon Tidswell , Trent Jaeger Integrated constraints and inheritance in DTAC. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 2000, pp:93-102 [Conf ] Trent Jaeger On the Increasing Importance of Constraints. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1999, pp:33-42 [Conf ] Trent Jaeger , Frederique Giraud , Nayeem Islam , Jochen Liedtke A role-based access control model for protection domain derivation and management. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1997, pp:95-106 [Conf ] Trent Jaeger , Atul Prakash Requirements of role-based access control for collaborative systems. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf ] Trent Jaeger , Jonathon Tidswell Rebuttal to the NIST RBAC model proposal. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 2000, pp:65-66 [Conf ] Elisa Bertino , Trent Jaeger , Jonathan D. Moffett , Sylvia L. Osborn , Ravi Ravi Making access control more usable. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:141- [Conf ] Ravi S. Sandhu , Elisa Bertino , Trent Jaeger , D. Richard Kuhn , Carl E. Landwehr Panel: The next generation of acess control models (panel session): do we need them and what should they be? [Citation Graph (0, 0)][DBLP ] SACMAT, 2001, pp:53- [Conf ] Dawson R. Engler , Cynthia E. Irvine , Trent Jaeger , David Wagner Cool security trends. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:53- [Conf ] Trent Jaeger Managing access control complexity using metrices. [Citation Graph (0, 0)][DBLP ] SACMAT, 2001, pp:131-139 [Conf ] Trent Jaeger , Antony Edwards , Xiaolan Zhang Managing access control policies using access control spaces. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:3-12 [Conf ] Trent Jaeger , Reiner Sailer , Umesh Shankar PRIMA: policy-reduced integrity measurement architecture. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:19-28 [Conf ] Trent Jaeger , Reiner Sailer , Xiaolan Zhang Resolving constraint conflicts. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:105-114 [Conf ] Trent Jaeger , Atul Prakash Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems. [Citation Graph (0, 0)][DBLP ] SEKE, 1995, pp:103-105 [Conf ] Trent Jaeger , Atul Prakash BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems. [Citation Graph (0, 0)][DBLP ] SEKE, 1993, pp:191-198 [Conf ] Alain Gefflaut , Trent Jaeger , Yoonho Park , Jochen Liedtke , Kevin Elphinstone , Volkmar Uhlig , Jonathon Tidswell , Luke Deller , Lars Reuther The SawMill multiserver approach. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 2000, pp:109-114 [Conf ] Trent Jaeger , Jochen Liedtke , Vsevolod Panteleenko , Yoonho Park , Nayeem Islam Security architecture for component-based operating systems. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1998, pp:222-228 [Conf ] Trent Jaeger , Jonathon Tidswell , Alain Gefflaut , Yoonho Park , Kevin Elphinstone , Jochen Liedtke Synchronous IPC over transparent monitors. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 2000, pp:189-194 [Conf ] Jochen Liedtke , Nayeem Islam , Trent Jaeger , Vsevolod Panteleenko , Yoonho Park An unconventional proposal: using the x86 architecture as the ubiquitous virtual standard architecture. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1998, pp:237-241 [Conf ] Jochen Liedtke , Nayeem Islam , Trent Jaeger , Vsevolod Panteleenko , Yoonho Park Irreproducible benchmarks might be sometimes helpful. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1998, pp:242-246 [Conf ] Vinod Ganapathy , Trent Jaeger , Somesh Jha Retrofitting Legacy Code for Authorization Policy Enforcement. [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:214-229 [Conf ] Rangachari Anand , Nayeem Islam , Trent Jaeger , Josyula R. Rao A Flexible Security Model for Using Internet Content. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1997, pp:89-96 [Conf ] Reiner Sailer , Xiaolan Zhang , Trent Jaeger , Leendert van Doorn Design and Implementation of a TCG-based Integrity Measurement Architecture. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:223-238 [Conf ] Xiaolan Zhang , Antony Edwards , Trent Jaeger Using CQUAL for Static Analysis of Authorization Hook Placement. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:33-48 [Conf ] Trent Jaeger , Tony Michailidis , Roy Rada Access Control in a Virtual University. [Citation Graph (0, 0)][DBLP ] WETICE, 1999, pp:135-140 [Conf ] Nayeem Islam , Rangachari Anand , Trent Jaeger , Josyula R. Rao A Flexible Security System for Using Internet Content. [Citation Graph (0, 0)][DBLP ] IEEE Software, 1997, v:14, n:5, pp:52-59 [Journal ] Trent Jaeger , Antony Edwards , Xiaolan Zhang Consistency analysis of authorization hook placement in the Linux security modules framework. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:175-205 [Journal ] Trent Jaeger , Atul Prakash , Jochen Liedtke , Nayeem Islam Flexible Control of Downloaded Executable Content. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:2, pp:177-228 [Journal ] Trent Jaeger , Jonathon Tidswell Practical safety in flexible access control models. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:2, pp:158-190 [Journal ] Trent Jaeger , Xiaolan Zhang , Fidel Cacheda Policy management using access control spaces. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:3, pp:327-364 [Journal ] Jonathan M. McCune , Trent Jaeger , Stefan Berger , Ramón Cáceres , Reiner Sailer Shamon: A System for Distributed Mandatory Access Control. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:23-32 [Conf ] Trent Jaeger , Reiner Sailer , Yogesh Sreenivasan Managing the risk of covert information flows in virtual machine systems. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:81-90 [Conf ] Boniface Hicks , Sandra Rueda , Luke St. Clair , Trent Jaeger , Patrick Drew McDaniel A logical specification and analysis for SELinux MLS policy. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:91-100 [Conf ] Establishing and Sustaining System Integrity via Root of Trust Installation. [Citation Graph (, )][DBLP ] New Side Channels Targeted at Passwords. [Citation Graph (, )][DBLP ] PinUP: Pinning User Files to Known Applications. [Citation Graph (, )][DBLP ] Scalable Web Content Attestation. [Citation Graph (, )][DBLP ] Justifying Integrity Using a Virtual Machine Verifier. [Citation Graph (, )][DBLP ] Protecting users from "themselves". [Citation Graph (, )][DBLP ] Flexible security configuration for virtual machines. [Citation Graph (, )][DBLP ] On cellular botnets: measuring the impact of malicious devices on a cellular network core. [Citation Graph (, )][DBLP ] Automating Security Mediation Placement. [Citation Graph (, )][DBLP ] Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. [Citation Graph (, )][DBLP ] An architecture for enforcing end-to-end access control over web applications. [Citation Graph (, )][DBLP ] Measuring integrity on mobile phone systems. [Citation Graph (, )][DBLP ] Analysis of virtual machine system policies. [Citation Graph (, )][DBLP ] Dynamic mandatory access control for multiple stakeholders. [Citation Graph (, )][DBLP ] Secure coprocessor-based intrusion detection. [Citation Graph (, )][DBLP ] Gaining and maintaining confidence in operating systems security. [Citation Graph (, )][DBLP ] Effective blame for information-flow violations. [Citation Graph (, )][DBLP ] From Trusted to Secure: Building and Executing Applications That Enforce System Security. [Citation Graph (, )][DBLP ] Verifying Compliance of Trusted Programs. [Citation Graph (, )][DBLP ] A systematic approach for cell-phone worm containment. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.008secs