Search the dblp DataBase
Drew Dean :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Drew Dean The Security of Static Typing with Dynamic Linking. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:18-27 [Conf ] Ajay Chander , John C. Mitchell , Drew Dean A State-Transition Model of Trust Management and Access Control. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:27-43 [Conf ] Richard Clayton , Drew Dean , Markus Jakobsson , Steven Myers , Stuart G. Stubblebine , Michael Szydlo A Chat at the Old Phishin' Hole. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2005, pp:88- [Conf ] Ajay Chander , Drew Dean , John C. Mitchell A Distributed High Assurance Reference Monitor. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:231-244 [Conf ] Tom Berson , Drew Dean , Matthew K. Franklin , Diana K. Smetters , Mike Spreitzer Cryptology As a Network Service. [Citation Graph (0, 0)][DBLP ] NDSS, 2001, pp:- [Conf ] Hao Chen , Drew Dean , David Wagner Model Checking One Million Lines of C Code. [Citation Graph (0, 0)][DBLP ] NDSS, 2004, pp:- [Conf ] Drew Dean , Matthew K. Franklin , Adam Stubblefield An Algebraic Approach to IP Traceback. [Citation Graph (0, 0)][DBLP ] NDSS, 2001, pp:- [Conf ] Dan S. Wallach , Dirk Balfanz , Drew Dean , Edward W. Felten Extensible Security Architecture for Java. [Citation Graph (0, 0)][DBLP ] SOSP, 1997, pp:116-128 [Conf ] Dirk Balfanz , Drew Dean , Mike Spreitzer A Security Infrastructure for Distributed Java Applications. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:15-26 [Conf ] Drew Dean , Edward W. Felten , Dan S. Wallach Java Security: From HotJava to Netscape and Beyond. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:190-200 [Conf ] David Wagner , Drew Dean Intrusion Detection via Static Analysis. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2001, pp:156-0 [Conf ] Marvin Schaefer , Sylvan Pinsky , Drew Dean , Li Gong , Jim Roskind , Barbara Fox Ensuring Assurance in Mobile Computing. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1997, pp:114-118 [Conf ] Jessica Staddon , Sara K. Miner , Matthew K. Franklin , Dirk Balfanz , Michael Malkin , Drew Dean Self-Healing Key Distribution with Revocation. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:241-257 [Conf ] Hao Chen , David Wagner , Drew Dean Setuid Demystified. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:171-190 [Conf ] Drew Dean , Alan J. Hu Fixing Races for Fun and Profit: How to Use access(2). [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:195-206 [Conf ] Ajay Chander , Drew Dean , John C. Mitchell Reconstructing Trust Management. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2004, v:12, n:1, pp:131-164 [Journal ] Drew Dean , Matthew K. Franklin , Adam Stubblefield An algebraic approach to IP traceback. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:2, pp:119-137 [Journal ] Search in 0.002secs, Finished in 0.002secs