Search the dblp DataBase
Reiner Sailer :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Reiner Sailer Security Services in an Open Service Environment. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:223-0 [Conf ] Reiner Sailer , Trent Jaeger , Enriquillo Valdez , Ramón Cáceres , Ronald Perez , Stefan Berger , John Linwood Griffin , Leendert van Doorn Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:276-285 [Conf ] Reiner Sailer , M. Kabatnik History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:373-0 [Conf ] Reiner Sailer , Trent Jaeger , Xiaolan Zhang , Leendert van Doorn Attestation-based policy enforcement for remote access. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:308-317 [Conf ] James Giles , Reiner Sailer , Dinesh C. Verma , Suresh Chari Authentication for Distributed Web Caches. [Citation Graph (0, 0)][DBLP ] ESORICS, 2002, pp:126-145 [Conf ] Reiner Sailer An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN. [Citation Graph (0, 0)][DBLP ] ICCCN, 1998, pp:276-283 [Conf ] M. Kabatnik , Reiner Sailer Verteiltes Filtern mit Contags und Sicherheits-Labeln. [Citation Graph (0, 0)][DBLP ] Kommunikation in Verteilten Systemen, 2001, pp:93-102 [Conf ] Reiner Sailer Authentikation als Grundlage der Skalierung von Sicherheit in der Kommunikationstechnik. [Citation Graph (0, 0)][DBLP ] Kommunikation in Verteilten Systemen, 1997, pp:62-76 [Conf ] Reiner Sailer , Arup Acharya , Mandis Beigi , Raymond Jennings , Dinesh C. Verma IPSECvalidate: A Tool to Validate IPSEC Configurations. [Citation Graph (0, 0)][DBLP ] LISA, 2001, pp:19-24 [Conf ] Umesh Shankar , Trent Jaeger , Reiner Sailer Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. [Citation Graph (0, 0)][DBLP ] NDSS, 2006, pp:- [Conf ] Reiner Sailer , James Giles Pervasive Authentication Domains for Automatic Pervasive Device Authorization. [Citation Graph (0, 0)][DBLP ] PerCom Workshops, 2004, pp:144-148 [Conf ] Trent Jaeger , Reiner Sailer , Umesh Shankar PRIMA: policy-reduced integrity measurement architecture. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:19-28 [Conf ] Trent Jaeger , Reiner Sailer , Xiaolan Zhang Resolving constraint conflicts. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:105-114 [Conf ] Reiner Sailer , Xiaolan Zhang , Trent Jaeger , Leendert van Doorn Design and Implementation of a TCG-based Integrity Measurement Architecture. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:223-238 [Conf ] Joan G. Dyer , Mark Lindemann , Ronald Perez , Reiner Sailer , Leendert van Doorn , Sean W. Smith , Steve Weingart Building the IBM 4758 Secure Coprocessor. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2001, v:34, n:10, pp:57-66 [Journal ] Jonathan M. McCune , Trent Jaeger , Stefan Berger , Ramón Cáceres , Reiner Sailer Shamon: A System for Distributed Mandatory Access Control. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:23-32 [Conf ] Trent Jaeger , Reiner Sailer , Yogesh Sreenivasan Managing the risk of covert information flows in virtual machine systems. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:81-90 [Conf ] Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control. [Citation Graph (, )][DBLP ] Linking remote attestation to secure tunnel endpoints. [Citation Graph (, )][DBLP ] Trustworthy and personalized computing on public kiosks. [Citation Graph (, )][DBLP ] Secure coprocessor-based intrusion detection. [Citation Graph (, )][DBLP ] Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors. [Citation Graph (, )][DBLP ] Search in 0.112secs, Finished in 0.112secs