The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Patrick Drew McDaniel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sunam Ryu, Kevin Butler, Patrick Traynor, Patrick Drew McDaniel
    Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:519-524 [Conf]
  2. William Aiello, John Ioannidis, Patrick Drew McDaniel
    Origin authentication in interdomain routing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:165-178 [Conf]
  3. Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew McDaniel
    On the performance, feasibility, and use of forward-secure signatures. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:131-144 [Conf]
  4. William A. Adamson, C. J. Antonelli, Kevin Coffman, Patrick Drew McDaniel, Jim Rees
    Secure Distributed Virtual Conferencing. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:176-190 [Conf]
  5. Simon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel, Eric Cronin
    Analysis of security vulnerabilities in the movie production and distribution process. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:1-12 [Conf]
  6. Patrick Drew McDaniel, Aviel D. Rubin
    A Response to ''Can We Eliminate Certificate Revocation Lists?''. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:245-258 [Conf]
  7. Kevin R. B. Butler, Patrick Drew McDaniel
    Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:36-48 [Conf]
  8. Patrick Drew McDaniel, Sugih Jamin
    Windowed Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:1406-1414 [Conf]
  9. Sophie Y. Qiu, Patrick Drew McDaniel, Fabian Monrose, Aviel D. Rubin
    Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:489-496 [Conf]
  10. Hugh Harney, Andrea Colgrove, Patrick Drew McDaniel
    Principles of Policy in Secure Groups. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  11. Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick Drew McDaniel, Aviel D. Rubin
    Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  12. Patrick Drew McDaniel, Shubho Sen, Oliver Spatscheck, Jacobus E. van der Merwe, William Aiello, Charles R. Kalmanek
    Enterprise Security: A Community of Interest Based Approach. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  13. William Aiello, Charles R. Kalmanek, Patrick Drew McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus E. van der Merwe
    Analysis of Communities of Interest in Data Networks. [Citation Graph (0, 0)][DBLP]
    PAM, 2005, pp:83-96 [Conf]
  14. Simon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel
    Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:314-328 [Conf]
  15. Hao Wang, Somesh Jha, Miron Livny, Patrick Drew McDaniel
    Security Policy Reconciliation in Distributed Computing Environments. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:137-0 [Conf]
  16. Patrick Drew McDaniel
    On context in authorization policy. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:80-89 [Conf]
  17. Patrick Drew McDaniel, Atul Prakash
    Methods and Limitations of Security Policy Reconciliation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:73-87 [Conf]
  18. Patrick Drew McDaniel, Aviel D. Rubin
    Web security. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:5, pp:697-699 [Journal]
  19. Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew McDaniel
    From Languages to Systems: Understanding Practical Application Development in Security-typed Languages. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:153-164 [Conf]
  20. Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, Patrick Drew McDaniel
    A logical specification and analysis for SELinux MLS policy. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:91-100 [Conf]

  21. PinUP: Pinning User Files to Known Applications. [Citation Graph (, )][DBLP]


  22. Defending Against Attacks on Main Memory Persistence. [Citation Graph (, )][DBLP]


  23. Scalable Web Content Attestation. [Citation Graph (, )][DBLP]


  24. Justifying Integrity Using a Virtual Machine Verifier. [Citation Graph (, )][DBLP]


  25. Semantically Rich Application-Centric Security in Android. [Citation Graph (, )][DBLP]


  26. Non-volatile memory and disks: avenues for policy architectures. [Citation Graph (, )][DBLP]


  27. Rootkit-resistant disks. [Citation Graph (, )][DBLP]


  28. On cellular botnets: measuring the impact of malicious devices on a cellular network core. [Citation Graph (, )][DBLP]


  29. On lightweight mobile phone application certification. [Citation Graph (, )][DBLP]


  30. Email Communities of Interest. [Citation Graph (, )][DBLP]


  31. Toward Valley-Free Inter-domain Routing. [Citation Graph (, )][DBLP]


  32. Towards Automated Privilege Separation. [Citation Graph (, )][DBLP]


  33. Analysis of the IPv4 Address Space Delegation Structure. [Citation Graph (, )][DBLP]


  34. Configuration Management at Massive Scale: System Design and Experience. [Citation Graph (, )][DBLP]


  35. From Trusted to Secure: Building and Executing Applications That Enforce System Security. [Citation Graph (, )][DBLP]


  36. Privacy Preserving Communication in MANETs. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002