2009 | ||
---|---|---|
74 | Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick Drew McDaniel, Thomas F. La Porta: On cellular botnets: measuring the impact of malicious devices on a cellular network core. ACM Conference on Computer and Communications Security 2009: 223-234 | |
73 | Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, Patrick Drew McDaniel: Justifying Integrity Using a Virtual Machine Verifier. ACSAC 2009: 83-92 | |
72 | Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick Drew McDaniel, Trent Jaeger: Scalable Web Content Attestation. ACSAC 2009: 95-104 | |
71 | Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger: Analysis of virtual machine system policies. SACMAT 2009: 227-236 | |
70 | Vikhyath Rao, Trent Jaeger: Dynamic mandatory access control for multiple stakeholders. SACMAT 2009: 53-62 | |
2008 | ||
69 | Trent Jaeger: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008 ACM 2008 | |
68 | Trent Jaeger: Operating System Security Morgan & Claypool Publishers 2008 | |
67 | Albert Tannous, Jonathan T. Trostle, Mohamed Hassan, Stephen E. McLaughlin, Trent Jaeger: New Side Channels Targeted at Passwords. ACSAC 2008: 45-54 | |
66 | William Enck, Patrick Drew McDaniel, Trent Jaeger: PinUP: Pinning User Files to Known Applications. ACSAC 2008: 55-64 | |
65 | Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger: Flexible security configuration for virtual machines. CSAW 2008: 35-44 | |
64 | Dave King, Boniface Hicks, Michael Hicks, Trent Jaeger: Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. ICISS 2008: 56-70 | |
63 | Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger: Measuring integrity on mobile phone systems. SACMAT 2008: 155-164 | |
62 | Dave King, Trent Jaeger, Somesh Jha, Sanjit A. Seshia: Effective blame for information-flow violations. SIGSOFT FSE 2008: 250-260 | |
61 | Sandra Rueda, Dave King, Trent Jaeger: Verifying Compliance of Trusted Programs. USENIX Security Symposium 2008: 321-334 | |
60 | Liang Xie, Hui Song, Trent Jaeger, Sencun Zhu: A systematic approach for cell-phone worm containment. WWW 2008: 1083-1084 | |
2007 | ||
59 | Luke St. Clair, Joshua Schiffman, Trent Jaeger, Patrick McDaniel: Establishing and Sustaining System Integrity via Root of Trust Installation. ACSAC 2007: 19-29 | |
58 | William Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, Patrick McDaniel: Protecting users from "themselves". CSAW 2007: 29-36 | |
57 | Vinod Ganapathy, Dave King, Trent Jaeger, Somesh Jha: Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. ICSE 2007: 458-467 | |
56 | Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan: Managing the risk of covert information flows in virtual machine systems. SACMAT 2007: 81-90 | |
55 | Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, Patrick Drew McDaniel: A logical specification and analysis for SELinux MLS policy. SACMAT 2007: 91-100 | |
54 | Boniface Hicks, Sandra Rueda, Trent Jaeger, Patrick Drew McDaniel: From Trusted to Secure: Building and Executing Applications That Enforce System Security. USENIX Annual Technical Conference 2007: 205-218 | |
2006 | ||
53 | Jonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer: Shamon: A System for Distributed Mandatory Access Control. ACSAC 2006: 23-32 | |
52 | Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger: Password Exhaustion: Predicting the End of Password Usefulness. ICISS 2006: 37-55 | |
51 | Vinod Ganapathy, Trent Jaeger, Somesh Jha: Retrofitting Legacy Code for Authorization Policy Enforcement. IEEE Symposium on Security and Privacy 2006: 214-229 | |
50 | Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, Guillaume Marceau, Liangzhao Zeng: The case for analysis preserving language transformation. ISSTA 2006: 191-202 | |
49 | Umesh Shankar, Trent Jaeger, Reiner Sailer: Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. NDSS 2006 | |
48 | Trent Jaeger, Reiner Sailer, Umesh Shankar: PRIMA: policy-reduced integrity measurement architecture. SACMAT 2006: 19-28 | |
2005 | ||
47 | Vinod Ganapathy, Trent Jaeger, Somesh Jha: Automatic placement of authorization hooks in the linux security modules framework. ACM Conference on Computer and Communications Security 2005: 330-339 | |
46 | Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramón Cáceres, Ronald Perez, Stefan Berger, John Linwood Griffin, Leendert van Doorn: Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. ACSAC 2005: 276-285 | |
2004 | ||
45 | Trent Jaeger, Elena Ferrari: SACMAT 2004, 9th ACM Symposium on Access Control Models and Technologies, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings ACM 2004 | |
44 | Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn: Attestation-based policy enforcement for remote access. ACM Conference on Computer and Communications Security 2004: 308-317 | |
43 | Trent Jaeger, Reiner Sailer, Xiaolan Zhang: Resolving constraint conflicts. SACMAT 2004: 105-114 | |
42 | Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn: Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium 2004: 223-238 | |
41 | Trent Jaeger, Antony Edwards, Xiaolan Zhang: Consistency analysis of authorization hook placement in the Linux security modules framework. ACM Trans. Inf. Syst. Secur. 7(2): 175-205 (2004) | |
2003 | ||
40 | Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003 ACM 2003 | |
39 | Trent Jaeger, Xiaolan Zhang, Fidel Cacheda: Policy management using access control spaces. ACM Trans. Inf. Syst. Secur. 6(3): 327-364 (2003) | |
2002 | ||
38 | Antony Edwards, Trent Jaeger, Xiaolan Zhang: Runtime verification of authorization hook placement for the linux security modules framework. ACM Conference on Computer and Communications Security 2002: 225-234 | |
37 | Trent Jaeger, Antony Edwards, Xiaolan Zhang: Gaining and maintaining confidence in operating systems security. ACM SIGOPS European Workshop 2002: 201-204 | |
36 | Xiaolan Zhang, Leendert van Doorn, Trent Jaeger, Ronald Perez, Reiner Sailer: Secure coprocessor-based intrusion detection. ACM SIGOPS European Workshop 2002: 239-242 | |
35 | Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi Ravi: Making access control more usable. SACMAT 2002: 141 | |
34 | Trent Jaeger, Antony Edwards, Xiaolan Zhang: Managing access control policies using access control spaces. SACMAT 2002: 3-12 | |
33 | Dawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David Wagner: Cool security trends. SACMAT 2002: 53 | |
32 | Xiaolan Zhang, Antony Edwards, Trent Jaeger: Using CQUAL for Static Analysis of Authorization Hook Placement. USENIX Security Symposium 2002: 33-48 | |
2001 | ||
31 | Mohit Aron, Jochen Liedtke, Kevin Elphinstone, Yoonho Park, Trent Jaeger, Luke Deller: The SawMill Framework for Virtual Memory Diversity. ACSAC 2001: 3-10 | |
30 | Trent Jaeger: Managing access control complexity using metrices. SACMAT 2001: 131-139 | |
29 | Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr: Panel: The next generation of acess control models (panel session): do we need them and what should they be? SACMAT 2001: 53 | |
28 | Trent Jaeger, Jonathon Tidswell: Practical safety in flexible access control models. ACM Trans. Inf. Syst. Secur. 4(2): 158-190 (2001) | |
2000 | ||
27 | Jonathon Tidswell, Trent Jaeger: An access control model for simplifying constraint expression. ACM Conference on Computer and Communications Security 2000: 154-163 | |
26 | Alain Gefflaut, Trent Jaeger, Yoonho Park, Jochen Liedtke, Kevin Elphinstone, Volkmar Uhlig, Jonathon Tidswell, Luke Deller, Lars Reuther: The SawMill multiserver approach. ACM SIGOPS European Workshop 2000: 109-114 | |
25 | Trent Jaeger, Jonathon Tidswell, Alain Gefflaut, Yoonho Park, Kevin Elphinstone, Jochen Liedtke: Synchronous IPC over transparent monitors. ACM SIGOPS European Workshop 2000: 189-194 | |
24 | Trent Jaeger, Jonathon Tidswell: Rebuttal to the NIST RBAC model proposal. ACM Workshop on Role-Based Access Control 2000: 65-66 | |
23 | Jonathon Tidswell, Trent Jaeger: Integrated constraints and inheritance in DTAC. ACM Workshop on Role-Based Access Control 2000: 93-102 | |
1999 | ||
22 | Trent Jaeger: On the Increasing Importance of Constraints. ACM Workshop on Role-Based Access Control 1999: 33-42 | |
21 | Trent Jaeger: Access Control in Configurable Systems. Secure Internet Programming 1999: 289-316 | |
20 | Trent Jaeger, Tony Michailidis, Roy Rada: Access Control in a Virtual University. WETICE 1999: 135-140 | |
19 | Jochen Liedtke, Volkmar Uhlig, Kevin Elphinstone, Trent Jaeger, Yoonho Park: How To Schedule Unlimited Memory Pinning of Untrusted Processes Or Provisional Ideas about Service-Neutrality. Workshop on Hot Topics in Operating Systems 1999: 153- | |
18 | Trent Jaeger, Kevin Elphinstone, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park: Flexible Access Control using IPC Redirection. Workshop on Hot Topics in Operating Systems 1999: 191- | |
17 | Trent Jaeger, Atul Prakash, Jochen Liedtke, Nayeem Islam: Flexible Control of Downloaded Executable Content. ACM Trans. Inf. Syst. Secur. 2(2): 177-228 (1999) | |
1998 | ||
16 | Trent Jaeger, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park, Nayeem Islam: Security architecture for component-based operating systems. ACM SIGOPS European Workshop 1998: 222-228 | |
15 | Jochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, Yoonho Park: An unconventional proposal: using the x86 architecture as the ubiquitous virtual standard architecture. ACM SIGOPS European Workshop 1998: 237-241 | |
14 | Jochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, Yoonho Park: Irreproducible benchmarks might be sometimes helpful. ACM SIGOPS European Workshop 1998: 242-246 | |
1997 | ||
13 | Trent Jaeger, Frederique Giraud, Nayeem Islam, Jochen Liedtke: A role-based access control model for protection domain derivation and management. ACM Workshop on Role-Based Access Control 1997: 95-106 | |
12 | Rangachari Anand, Nayeem Islam, Trent Jaeger, Josyula R. Rao: A Flexible Security Model for Using Internet Content. SRDS 1997: 89-96 | |
11 | Jochen Liedtke, Kevin Elphinstone, Sebastian Schönberg, Hermann Härtig, Gernot Heiser, Nayeem Islam, Trent Jaeger: Achieved IPC Performance. Workshop on Hot Topics in Operating Systems 1997: 28-31 | |
10 | Jochen Liedtke, Nayeem Islam, Trent Jaeger: Preventing Denial-of-Service Attacks on a µ-Kernel for WebOSes. Workshop on Hot Topics in Operating Systems 1997: 73-79 | |
9 | Nayeem Islam, Rangachari Anand, Trent Jaeger, Josyula R. Rao: A Flexible Security System for Using Internet Content. IEEE Software 14(5): 52-59 (1997) | |
1996 | ||
8 | Jang Ho Lee, Atul Prakash, Trent Jaeger, Gwobaw Wu: Supporting Multi-User, Multi-Applet Workspaces in CBE. CSCW 1996: 344-353 | |
1995 | ||
7 | Trent Jaeger, Atul Prakash: Requirements of role-based access control for collaborative systems. ACM Workshop on Role-Based Access Control 1995 | |
6 | Trent Jaeger, Atul Prakash: Management and utilization of knowledge for the automatic improvement of workflow performance. COOCS 1995: 32-43 | |
5 | Trent Jaeger, Atul Prakash: Implementation of a discretionary access control model for script-based systems. CSFW 1995: 70-84 | |
4 | Trent Jaeger, Atul Prakash: Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems. SEKE 1995: 103-105 | |
1994 | ||
3 | Trent Jaeger, Atul Prakash: Support for the File System Security Requirements of Computational E-Mail Systems. ACM Conference on Computer and Communications Security 1994: 1-9 | |
2 | Trent Jaeger, Atul Prakash, Masayuki Ishikawa: A Framework for Automatic Improvement of Workflows to Meet Performance Goals. ICTAI 1994: 640-646 | |
1993 | ||
1 | Trent Jaeger, Atul Prakash: BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems. SEKE 1993: 191-198 |