The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Trent Jaeger: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jang Ho Lee, Atul Prakash, Trent Jaeger, Gwobaw Wu
    Supporting Multi-User, Multi-Applet Workspaces in CBE. [Citation Graph (1, 0)][DBLP]
    CSCW, 1996, pp:344-353 [Conf]
  2. Mohit Aron, Jochen Liedtke, Kevin Elphinstone, Yoonho Park, Trent Jaeger, Luke Deller
    The SawMill Framework for Virtual Memory Diversity. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:3-10 [Conf]
  3. Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramón Cáceres, Ronald Perez, Stefan Berger, John Linwood Griffin, Leendert van Doorn
    Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:276-285 [Conf]
  4. Antony Edwards, Trent Jaeger, Xiaolan Zhang
    Runtime verification of authorization hook placement for the linux security modules framework. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:225-234 [Conf]
  5. Vinod Ganapathy, Trent Jaeger, Somesh Jha
    Automatic placement of authorization hooks in the linux security modules framework. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:330-339 [Conf]
  6. Trent Jaeger, Atul Prakash
    Support for the File System Security Requirements of Computational E-Mail Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:1-9 [Conf]
  7. Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn
    Attestation-based policy enforcement for remote access. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:308-317 [Conf]
  8. Jonathon Tidswell, Trent Jaeger
    An access control model for simplifying constraint expression. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:154-163 [Conf]
  9. Trent Jaeger, Atul Prakash
    Implementation of a discretionary access control model for script-based systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:70-84 [Conf]
  10. Trent Jaeger
    Access Control in Configurable Systems. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:289-316 [Conf]
  11. Trent Jaeger, Atul Prakash
    Management and utilization of knowledge for the automatic improvement of workflow performance. [Citation Graph (0, 0)][DBLP]
    COOCS, 1995, pp:32-43 [Conf]
  12. Trent Jaeger, Kevin Elphinstone, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park
    Flexible Access Control using IPC Redirection. [Citation Graph (0, 0)][DBLP]
    Workshop on Hot Topics in Operating Systems, 1999, pp:191-0 [Conf]
  13. Jochen Liedtke, Kevin Elphinstone, Sebastian Schönberg, Hermann Härtig, Gernot Heiser, Nayeem Islam, Trent Jaeger
    Achieved IPC Performance. [Citation Graph (0, 0)][DBLP]
    Workshop on Hot Topics in Operating Systems, 1997, pp:28-31 [Conf]
  14. Jochen Liedtke, Nayeem Islam, Trent Jaeger
    Preventing Denial-of-Service Attacks on a µ-Kernel for WebOSes. [Citation Graph (0, 0)][DBLP]
    Workshop on Hot Topics in Operating Systems, 1997, pp:73-79 [Conf]
  15. Jochen Liedtke, Volkmar Uhlig, Kevin Elphinstone, Trent Jaeger, Yoonho Park
    How To Schedule Unlimited Memory Pinning of Untrusted Processes Or Provisional Ideas about Service-Neutrality. [Citation Graph (0, 0)][DBLP]
    Workshop on Hot Topics in Operating Systems, 1999, pp:153-0 [Conf]
  16. Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger
    Password Exhaustion: Predicting the End of Password Usefulness. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:37-55 [Conf]
  17. Vinod Ganapathy, David King, Trent Jaeger, Somesh Jha
    Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. [Citation Graph (0, 0)][DBLP]
    ICSE, 2007, pp:458-467 [Conf]
  18. Trent Jaeger, Atul Prakash, Masayuki Ishikawa
    A Framework for Automatic Improvement of Workflows to Meet Performance Goals. [Citation Graph (0, 0)][DBLP]
    ICTAI, 1994, pp:640-646 [Conf]
  19. Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, Guillaume Marceau, Liangzhao Zeng
    The case for analysis preserving language transformation. [Citation Graph (0, 0)][DBLP]
    ISSTA, 2006, pp:191-202 [Conf]
  20. Umesh Shankar, Trent Jaeger, Reiner Sailer
    Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  21. Jonathon Tidswell, Trent Jaeger
    Integrated constraints and inheritance in DTAC. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:93-102 [Conf]
  22. Trent Jaeger
    On the Increasing Importance of Constraints. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:33-42 [Conf]
  23. Trent Jaeger, Frederique Giraud, Nayeem Islam, Jochen Liedtke
    A role-based access control model for protection domain derivation and management. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:95-106 [Conf]
  24. Trent Jaeger, Atul Prakash
    Requirements of role-based access control for collaborative systems. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  25. Trent Jaeger, Jonathon Tidswell
    Rebuttal to the NIST RBAC model proposal. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:65-66 [Conf]
  26. Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi Ravi
    Making access control more usable. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:141- [Conf]
  27. Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr
    Panel: The next generation of acess control models (panel session): do we need them and what should they be? [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:53- [Conf]
  28. Dawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David Wagner
    Cool security trends. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:53- [Conf]
  29. Trent Jaeger
    Managing access control complexity using metrices. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:131-139 [Conf]
  30. Trent Jaeger, Antony Edwards, Xiaolan Zhang
    Managing access control policies using access control spaces. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:3-12 [Conf]
  31. Trent Jaeger, Reiner Sailer, Umesh Shankar
    PRIMA: policy-reduced integrity measurement architecture. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:19-28 [Conf]
  32. Trent Jaeger, Reiner Sailer, Xiaolan Zhang
    Resolving constraint conflicts. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:105-114 [Conf]
  33. Trent Jaeger, Atul Prakash
    Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems. [Citation Graph (0, 0)][DBLP]
    SEKE, 1995, pp:103-105 [Conf]
  34. Trent Jaeger, Atul Prakash
    BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems. [Citation Graph (0, 0)][DBLP]
    SEKE, 1993, pp:191-198 [Conf]
  35. Alain Gefflaut, Trent Jaeger, Yoonho Park, Jochen Liedtke, Kevin Elphinstone, Volkmar Uhlig, Jonathon Tidswell, Luke Deller, Lars Reuther
    The SawMill multiserver approach. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 2000, pp:109-114 [Conf]
  36. Trent Jaeger, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park, Nayeem Islam
    Security architecture for component-based operating systems. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1998, pp:222-228 [Conf]
  37. Trent Jaeger, Jonathon Tidswell, Alain Gefflaut, Yoonho Park, Kevin Elphinstone, Jochen Liedtke
    Synchronous IPC over transparent monitors. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 2000, pp:189-194 [Conf]
  38. Jochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, Yoonho Park
    An unconventional proposal: using the x86 architecture as the ubiquitous virtual standard architecture. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1998, pp:237-241 [Conf]
  39. Jochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, Yoonho Park
    Irreproducible benchmarks might be sometimes helpful. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1998, pp:242-246 [Conf]
  40. Vinod Ganapathy, Trent Jaeger, Somesh Jha
    Retrofitting Legacy Code for Authorization Policy Enforcement. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:214-229 [Conf]
  41. Rangachari Anand, Nayeem Islam, Trent Jaeger, Josyula R. Rao
    A Flexible Security Model for Using Internet Content. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1997, pp:89-96 [Conf]
  42. Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn
    Design and Implementation of a TCG-based Integrity Measurement Architecture. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:223-238 [Conf]
  43. Xiaolan Zhang, Antony Edwards, Trent Jaeger
    Using CQUAL for Static Analysis of Authorization Hook Placement. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:33-48 [Conf]
  44. Trent Jaeger, Tony Michailidis, Roy Rada
    Access Control in a Virtual University. [Citation Graph (0, 0)][DBLP]
    WETICE, 1999, pp:135-140 [Conf]
  45. Nayeem Islam, Rangachari Anand, Trent Jaeger, Josyula R. Rao
    A Flexible Security System for Using Internet Content. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1997, v:14, n:5, pp:52-59 [Journal]
  46. Trent Jaeger, Antony Edwards, Xiaolan Zhang
    Consistency analysis of authorization hook placement in the Linux security modules framework. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:175-205 [Journal]
  47. Trent Jaeger, Atul Prakash, Jochen Liedtke, Nayeem Islam
    Flexible Control of Downloaded Executable Content. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:2, pp:177-228 [Journal]
  48. Trent Jaeger, Jonathon Tidswell
    Practical safety in flexible access control models. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:2, pp:158-190 [Journal]
  49. Trent Jaeger, Xiaolan Zhang, Fidel Cacheda
    Policy management using access control spaces. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:3, pp:327-364 [Journal]
  50. Jonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer
    Shamon: A System for Distributed Mandatory Access Control. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:23-32 [Conf]
  51. Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan
    Managing the risk of covert information flows in virtual machine systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:81-90 [Conf]
  52. Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, Patrick Drew McDaniel
    A logical specification and analysis for SELinux MLS policy. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:91-100 [Conf]

  53. Establishing and Sustaining System Integrity via Root of Trust Installation. [Citation Graph (, )][DBLP]


  54. New Side Channels Targeted at Passwords. [Citation Graph (, )][DBLP]


  55. PinUP: Pinning User Files to Known Applications. [Citation Graph (, )][DBLP]


  56. Scalable Web Content Attestation. [Citation Graph (, )][DBLP]


  57. Justifying Integrity Using a Virtual Machine Verifier. [Citation Graph (, )][DBLP]


  58. Protecting users from "themselves". [Citation Graph (, )][DBLP]


  59. Flexible security configuration for virtual machines. [Citation Graph (, )][DBLP]


  60. On cellular botnets: measuring the impact of malicious devices on a cellular network core. [Citation Graph (, )][DBLP]


  61. Automating Security Mediation Placement. [Citation Graph (, )][DBLP]


  62. Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. [Citation Graph (, )][DBLP]


  63. An architecture for enforcing end-to-end access control over web applications. [Citation Graph (, )][DBLP]


  64. Measuring integrity on mobile phone systems. [Citation Graph (, )][DBLP]


  65. Analysis of virtual machine system policies. [Citation Graph (, )][DBLP]


  66. Dynamic mandatory access control for multiple stakeholders. [Citation Graph (, )][DBLP]


  67. Secure coprocessor-based intrusion detection. [Citation Graph (, )][DBLP]


  68. Gaining and maintaining confidence in operating systems security. [Citation Graph (, )][DBLP]


  69. Effective blame for information-flow violations. [Citation Graph (, )][DBLP]


  70. From Trusted to Secure: Building and Executing Applications That Enforce System Security. [Citation Graph (, )][DBLP]


  71. Verifying Compliance of Trusted Programs. [Citation Graph (, )][DBLP]


  72. A systematic approach for cell-phone worm containment. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002