The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xiaolan Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Antony Edwards, Trent Jaeger, Xiaolan Zhang
    Runtime verification of authorization hook placement for the linux security modules framework. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:225-234 [Conf]
  2. Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn
    Attestation-based policy enforcement for remote access. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:308-317 [Conf]
  3. Xiaolan Zhang, Margo I. Seltzer
    HBench: JGC-An Application-Specific Benchmark Suite for Evaluating JVM Garbage Collector Performance. [Citation Graph (0, 0)][DBLP]
    COOTS, 2001, pp:47-60 [Conf]
  4. Margo I. Seltzer, David Krinsky, Keith A. Smith, Xiaolan Zhang
    The Case for Application-Specific Benchmarking. [Citation Graph (0, 0)][DBLP]
    Workshop on Hot Topics in Operating Systems, 1999, pp:102-0 [Conf]
  5. Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, Guillaume Marceau, Liangzhao Zeng
    The case for analysis preserving language transformation. [Citation Graph (0, 0)][DBLP]
    ISSTA, 2006, pp:191-202 [Conf]
  6. Xiaolan Zhang, Margo I. Seltzer
    HBench: Java: an application-specific benchmarking framework for Java virtual machines. [Citation Graph (0, 0)][DBLP]
    Java Grande, 2000, pp:62-70 [Conf]
  7. Xiaolan Zhang, Giovanni Neglia, James F. Kurose, Donald F. Towsley
    Performance Modeling of Epidemic Routing. [Citation Graph (0, 0)][DBLP]
    Networking, 2006, pp:827-839 [Conf]
  8. Trent Jaeger, Antony Edwards, Xiaolan Zhang
    Managing access control policies using access control spaces. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:3-12 [Conf]
  9. Trent Jaeger, Reiner Sailer, Xiaolan Zhang
    Resolving constraint conflicts. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:105-114 [Conf]
  10. Xiaolan Zhang, Zheng Wang, Nicholas C. Gloy, J. Bradley Chen, Michael D. Smith
    System Support for Automated Profiling and Optimization. [Citation Graph (0, 0)][DBLP]
    SOSP, 1997, pp:15-26 [Conf]
  11. Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn
    Design and Implementation of a TCG-based Integrity Measurement Architecture. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:223-238 [Conf]
  12. Xiaolan Zhang, Antony Edwards, Trent Jaeger
    Using CQUAL for Static Analysis of Authorization Hook Placement. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:33-48 [Conf]
  13. Xiaolan Zhang, Margo I. Seltzer
    HBench: Java: An application-specific benchmarking framework for Java Virtual Machines. [Citation Graph (0, 0)][DBLP]
    Concurrency and Computation: Practice and Experience, 2001, v:13, n:8-9, pp:775-792 [Journal]
  14. Trent Jaeger, Antony Edwards, Xiaolan Zhang
    Consistency analysis of authorization hook placement in the Linux security modules framework. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:175-205 [Journal]
  15. Trent Jaeger, Xiaolan Zhang, Fidel Cacheda
    Policy management using access control spaces. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:3, pp:327-364 [Journal]
  16. Zhang Wu, Hua Luo, Xiaolan Zhang
    Optimal np control chart with curtailment. [Citation Graph (0, 0)][DBLP]
    European Journal of Operational Research, 2006, v:174, n:3, pp:1723-1741 [Journal]
  17. Xiaolan Zhang, Suzanne McIntosh, Pankaj Rohatgi, John Linwood Griffin
    XenSocket: A High-Throughput Interdomain Transport for Virtual Machines. [Citation Graph (0, 0)][DBLP]
    Middleware, 2007, pp:184-203 [Conf]
  18. Xiaolan Zhang, Giovanni Neglia, James F. Kurose, Donald F. Towsley
    Performance modeling of epidemic routing. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2867-2891 [Journal]

  19. Automated Security Debugging Using Program Structural Constraints. [Citation Graph (, )][DBLP]


  20. HIMA: A Hypervisor-Based Integrity Measurement Agent. [Citation Graph (, )][DBLP]


  21. Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. [Citation Graph (, )][DBLP]


  22. Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing. [Citation Graph (, )][DBLP]


  23. Trustworthy and personalized computing on public kiosks. [Citation Graph (, )][DBLP]


  24. Secure coprocessor-based intrusion detection. [Citation Graph (, )][DBLP]


  25. Gaining and maintaining confidence in operating systems security. [Citation Graph (, )][DBLP]


  26. AutoISES: Automatically Inferring Security Specification and Detecting Violations. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002