The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Drew Dean: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Drew Dean
    The Security of Static Typing with Dynamic Linking. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:18-27 [Conf]
  2. Ajay Chander, John C. Mitchell, Drew Dean
    A State-Transition Model of Trust Management and Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:27-43 [Conf]
  3. Richard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine, Michael Szydlo
    A Chat at the Old Phishin' Hole. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:88- [Conf]
  4. Ajay Chander, Drew Dean, John C. Mitchell
    A Distributed High Assurance Reference Monitor. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:231-244 [Conf]
  5. Tom Berson, Drew Dean, Matthew K. Franklin, Diana K. Smetters, Mike Spreitzer
    Cryptology As a Network Service. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  6. Hao Chen, Drew Dean, David Wagner
    Model Checking One Million Lines of C Code. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  7. Drew Dean, Matthew K. Franklin, Adam Stubblefield
    An Algebraic Approach to IP Traceback. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  8. Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten
    Extensible Security Architecture for Java. [Citation Graph (0, 0)][DBLP]
    SOSP, 1997, pp:116-128 [Conf]
  9. Dirk Balfanz, Drew Dean, Mike Spreitzer
    A Security Infrastructure for Distributed Java Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:15-26 [Conf]
  10. Drew Dean, Edward W. Felten, Dan S. Wallach
    Java Security: From HotJava to Netscape and Beyond. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:190-200 [Conf]
  11. David Wagner, Drew Dean
    Intrusion Detection via Static Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:156-0 [Conf]
  12. Marvin Schaefer, Sylvan Pinsky, Drew Dean, Li Gong, Jim Roskind, Barbara Fox
    Ensuring Assurance in Mobile Computing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:114-118 [Conf]
  13. Jessica Staddon, Sara K. Miner, Matthew K. Franklin, Dirk Balfanz, Michael Malkin, Drew Dean
    Self-Healing Key Distribution with Revocation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:241-257 [Conf]
  14. Hao Chen, David Wagner, Drew Dean
    Setuid Demystified. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:171-190 [Conf]
  15. Drew Dean, Alan J. Hu
    Fixing Races for Fun and Profit: How to Use access(2). [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:195-206 [Conf]
  16. Ajay Chander, Drew Dean, John C. Mitchell
    Reconstructing Trust Management. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:1, pp:131-164 [Journal]
  17. Drew Dean, Matthew K. Franklin, Adam Stubblefield
    An algebraic approach to IP traceback. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:2, pp:119-137 [Journal]

Search in 0.089secs, Finished in 0.090secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002