The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Paul A. Karger: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Paul A. Karger
    Limiting the Damage Potential of Discretionary Trojan Horses. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:32-37 [Conf]
  2. Paul A. Karger
    The Lattice Security Model In A Public Computing Network. [Citation Graph (0, 0)][DBLP]
    ACM Annual Conference (1), 1978, pp:453-459 [Conf]
  3. Paul A. Karger
    Multi-Level Security Requirements for Hypervisors. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:267-275 [Conf]
  4. Paul A. Karger, Roger R. Schell
    Thirty Years Later: Lessons from the Multics Security Evaluation. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:119-148 [Conf]
  5. Paul A. Karger
    Using Registers to Optimize Cross-Domain Call Performance. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 1989, pp:194-204 [Conf]
  6. Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll
    Verification of a Formal Security Model for Multiapplicative Smart Cards. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:17-36 [Conf]
  7. Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll
    Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:181-200 [Conf]
  8. Paul A. Karger, Helmut Kurth
    Increased Information Flow Needs for High-Assurance Composite Evaluations. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:129-140 [Conf]
  9. Paul A. Karger
    New Methods for Immediate Revocation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:48-55 [Conf]
  10. Paul A. Karger, A. J. Herbert
    An Augmented Capability Architecture to Support Lattice Security and Traceability of Access. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:2-12 [Conf]
  11. Paul A. Karger, J. C. Wray
    Storage Channels in Disk Arm Optimization. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:52-63 [Conf]
  12. Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn
    A VMM Security Kernel for the VAX Architecture. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:2-19 [Conf]
  13. Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner, Angela Schuett Reninger
    Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:222-230 [Conf]
  14. Paul A. Karger
    The Importance of High Assurance Security in Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:9- [Conf]
  15. Paul A. Karger
    Authentication and Discretionary Access Control in Computer Networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1986, v:10, n:, pp:27-37 [Journal]
  16. Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic
    Two-phase cryptographic key recovery system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:6, pp:481-506 [Journal]
  17. Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll
    Verified Formal Security Models for Multiapplicative Smart Cards. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:4, pp:339-368 [Journal]
  18. Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn
    A Retrospective on the VAX VMM Security Kernel. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1991, v:17, n:11, pp:1147-1165 [Journal]
  19. Paul A. Karger
    Performance and security lessons learned from virtualizing the alpha processor. [Citation Graph (0, 0)][DBLP]
    ISCA, 2007, pp:392-401 [Conf]

  20. Designing a Side Channel Resistant Random Number Generator. [Citation Graph (, )][DBLP]


  21. Securing virtual machine monitors: what is needed? [Citation Graph (, )][DBLP]


  22. Implementing a High-Assurance Smart-Card OS. [Citation Graph (, )][DBLP]


  23. The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System. [Citation Graph (, )][DBLP]


  24. Privacy and security threat analysis of the federal employee personal identity verification (PIV) program. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002