Trent Jaeger
Trent Jaeger
Professor of Computer Science and Engineering, Penn State University
Email confirmado em - Página inicial
Citado por
Citado por
Design and Implementation of a TCG-based Integrity Measurement Architecture.
R Sailer, X Zhang, T Jaeger, L Van Doorn
USENIX Security symposium 13 (2004), 223-238, 2004
PRIMA: policy-reduced integrity measurement architecture
T Jaeger, R Sailer, U Shankar
Proceedings of the eleventh ACM symposium on Access control models and …, 2006
Building a MAC-based security architecture for the Xen open-source hypervisor
R Sailer, T Jaeger, E Valdez, R Caceres, R Perez, S Berger, JL Griffin, ...
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-285, 2005
On cellular botnets: measuring the impact of malicious devices on a cellular network core
P Traynor, M Lin, M Ongtang, V Rao, T Jaeger, P McDaniel, T La Porta
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Attestation-based policy enforcement for remote access
R Sailer, T Jaeger, X Zhang, L Van Doorn
Proceedings of the 11th ACM conference on Computer and communications …, 2004
Methods and arrangements for unified program analysis
TR Jaeger, L Koved, L Zeng, X Zhang
US Patent 7,493,602, 2009
sHype: Secure hypervisor approach to trusted virtualized systems
R Sailer, E Valdez, T Jaeger, R Perez, L Van Doorn, JL Griffin, S Berger, ...
Techn. Rep. RC23511 5, 2005
Analyzing integrity protection in the SELinux example policy
T Jaeger, R Sailer, X Zhang
12th {USENIX} Security Symposium ({USENIX} Security 03), 2003
Using CQUAL for Static Analysis of Authorization Hook Placement.
X Zhang, A Edwards, T Jaeger
USENIX Security Symposium, 33-48, 2002
Flexible and dynamic derivation of permissions
R Anand, FA Giraud, N Islam, TR Jaeger, J Liedtke
US Patent 6,044,466, 2000
Practical safety in flexible access control models
T Jaeger, JE Tidswell
ACM Transactions on Information and System Security (TISSEC) 4 (2), 158-190, 2001
Sprobes: Enforcing kernel code integrity on the trustzone architecture
X Ge, H Vijayakumar, T Jaeger
arXiv preprint arXiv:1410.7747, 2014
Seeding clouds with trust anchors
J Schiffman, T Moyer, H Vijayakumar, T Jaeger, P McDaniel
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 43-46, 2010
Secure coprocessor-based intrusion detection
X Zhang, L Van Doorn, T Jaeger, R Perez, R Sailer
Proceedings of the 10th workshop on ACM SIGOPS European workshop, 239-242, 2002
Shamon: A system for distributed mandatory access control
JM McCune, T Jaeger, S Berger, R Caceres, R Sailer
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 23-32, 2006
Supporting multi-user, multi-applet workspaces in CBE
JH Lee, A Prakash, T Jaeger, G Wu
Proceedings of the 1996 ACM conference on Computer supported cooperative …, 1996
Trusted virtual domains: Toward secure distributed services
JL Griffin, T Jaeger, R Perez, R Sailer, L Van Doorn, R Cáceres
Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability …, 2005
Policy management using access control spaces
T Jaeger, X Zhang, A Edwards
ACM Transactions on Information and System Security (TISSEC) 6 (3), 327-364, 2003
The SawMill multiserver approach
A Gefflaut, T Jaeger, Y Park, J Liedtke, KJ Elphinstone, V Uhlig, ...
Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the …, 2000
Implicit flows: Can’t live with ‘em, can’t live without ‘em
D King, B Hicks, M Hicks, T Jaeger
International Conference on Information Systems Security, 56-70, 2008
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20