|
Search the dblp DataBase
Timothy Fraser:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Timothy Fraser, David F. Ferraiolo, Mikel L. Matthews, Casey Schaufler, Stephen Smalley, Robert Watson
Panel: which access control technique will provide the greatest overall benefit-Abstract. [Citation Graph (0, 0)][DBLP] SACMAT, 2001, pp:141- [Conf]
- Timothy Fraser
LOMAC: Low Water-Mark Integrity Protection for COTS Environments. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2000, pp:230-245 [Conf]
- Timothy Fraser, Lee Badger, Mark Feldman
Hardening COTS Software with Generic Software Wrappers. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1999, pp:2-16 [Conf]
- Timothy Fraser
LOMAC: MAC You Can Live With. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 2001, pp:1-13 [Conf]
- Nick L. Petroni Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh
Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2004, pp:179-194 [Conf]
- Nick L. Petroni Jr., Aaron Walters, Timothy Fraser, William A. Arbaugh
FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory. [Citation Graph (0, 0)][DBLP] Digital Investigation, 2006, v:3, n:4, pp:197-210 [Journal]
- Arunesh Mishra, Nick L. Petroni Jr., William A. Arbaugh, Timothy Fraser
Security issues in IEEE 802.11 wireless local area networks: a survey. [Citation Graph (0, 0)][DBLP] Wireless Communications and Mobile Computing, 2004, v:4, n:8, pp:821-833 [Journal]
VICI Virtual Machine Introspection for Cognitive Immunity. [Citation Graph (, )][DBLP]
Applying flow-sensitive CQUAL to verify MINIX authorization check placement. [Citation Graph (, )][DBLP]
Ensuring Continuity During Dynamic Security Policy Reconfiguration in DTE. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|