The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Reiner Sailer: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Reiner Sailer
    Security Services in an Open Service Environment. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:223-0 [Conf]
  2. Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramón Cáceres, Ronald Perez, Stefan Berger, John Linwood Griffin, Leendert van Doorn
    Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:276-285 [Conf]
  3. Reiner Sailer, M. Kabatnik
    History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:373-0 [Conf]
  4. Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn
    Attestation-based policy enforcement for remote access. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:308-317 [Conf]
  5. James Giles, Reiner Sailer, Dinesh C. Verma, Suresh Chari
    Authentication for Distributed Web Caches. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:126-145 [Conf]
  6. Reiner Sailer
    An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1998, pp:276-283 [Conf]
  7. M. Kabatnik, Reiner Sailer
    Verteiltes Filtern mit Contags und Sicherheits-Labeln. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 2001, pp:93-102 [Conf]
  8. Reiner Sailer
    Authentikation als Grundlage der Skalierung von Sicherheit in der Kommunikationstechnik. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1997, pp:62-76 [Conf]
  9. Reiner Sailer, Arup Acharya, Mandis Beigi, Raymond Jennings, Dinesh C. Verma
    IPSECvalidate: A Tool to Validate IPSEC Configurations. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:19-24 [Conf]
  10. Umesh Shankar, Trent Jaeger, Reiner Sailer
    Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  11. Reiner Sailer, James Giles
    Pervasive Authentication Domains for Automatic Pervasive Device Authorization. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2004, pp:144-148 [Conf]
  12. Trent Jaeger, Reiner Sailer, Umesh Shankar
    PRIMA: policy-reduced integrity measurement architecture. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:19-28 [Conf]
  13. Trent Jaeger, Reiner Sailer, Xiaolan Zhang
    Resolving constraint conflicts. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:105-114 [Conf]
  14. Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn
    Design and Implementation of a TCG-based Integrity Measurement Architecture. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:223-238 [Conf]
  15. Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean W. Smith, Steve Weingart
    Building the IBM 4758 Secure Coprocessor. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:10, pp:57-66 [Journal]
  16. Jonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer
    Shamon: A System for Distributed Mandatory Access Control. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:23-32 [Conf]
  17. Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan
    Managing the risk of covert information flows in virtual machine systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:81-90 [Conf]

  18. Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control. [Citation Graph (, )][DBLP]


  19. Linking remote attestation to secure tunnel endpoints. [Citation Graph (, )][DBLP]


  20. Trustworthy and personalized computing on public kiosks. [Citation Graph (, )][DBLP]


  21. Secure coprocessor-based intrusion detection. [Citation Graph (, )][DBLP]


  22. Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors. [Citation Graph (, )][DBLP]


Search in 0.112secs, Finished in 0.112secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002