Trent Jaeger Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

70EESandra Rueda, Hayawardh Vijayakumar, Trent Jaeger: Analysis of virtual machine system policies. SACMAT 2009: 227-236
69EEVikhyath Rao, Trent Jaeger: Dynamic mandatory access control for multiple stakeholders. SACMAT 2009: 53-62
68 Trent Jaeger: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008 ACM 2008
67EEAlbert Tannous, Jonathan T. Trostle, Mohamed Hassan, Stephen E. McLaughlin, Trent Jaeger: New Side Channels Targeted at Passwords. ACSAC 2008: 45-54
66EEWilliam Enck, Patrick Drew McDaniel, Trent Jaeger: PinUP: Pinning User Files to Known Applications. ACSAC 2008: 55-64
65EESandra Rueda, Yogesh Sreenivasan, Trent Jaeger: Flexible security configuration for virtual machines. CSAW 2008: 35-44
64EEDave King, Boniface Hicks, Michael Hicks, Trent Jaeger: Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. ICISS 2008: 56-70
63EEDivya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger: Measuring integrity on mobile phone systems. SACMAT 2008: 155-164
62EEDave King, Trent Jaeger, Somesh Jha, Sanjit A. Seshia: Effective blame for information-flow violations. SIGSOFT FSE 2008: 250-260
61EESandra Rueda, Dave King, Trent Jaeger: Verifying Compliance of Trusted Programs. USENIX Security Symposium 2008: 321-334
60EELiang Xie, Hui Song, Trent Jaeger, Sencun Zhu: A systematic approach for cell-phone worm containment. WWW 2008: 1083-1084
59EELuke St. Clair, Joshua Schiffman, Trent Jaeger, Patrick McDaniel: Establishing and Sustaining System Integrity via Root of Trust Installation. ACSAC 2007: 19-29
58EEWilliam Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, Patrick McDaniel: Protecting users from "themselves". CSAW 2007: 29-36
57EEVinod Ganapathy, Dave King, Trent Jaeger, Somesh Jha: Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. ICSE 2007: 458-467
56EETrent Jaeger, Reiner Sailer, Yogesh Sreenivasan: Managing the risk of covert information flows in virtual machine systems. SACMAT 2007: 81-90
55EEBoniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, Patrick Drew McDaniel: A logical specification and analysis for SELinux MLS policy. SACMAT 2007: 91-100
54EEBoniface Hicks, Sandra Rueda, Trent Jaeger, Patrick Drew McDaniel: From Trusted to Secure: Building and Executing Applications That Enforce System Security. USENIX Annual Technical Conference 2007: 205-218
53EEJonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer: Shamon: A System for Distributed Mandatory Access Control. ACSAC 2006: 23-32
52EELuke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger: Password Exhaustion: Predicting the End of Password Usefulness. ICISS 2006: 37-55
51EEVinod Ganapathy, Trent Jaeger, Somesh Jha: Retrofitting Legacy Code for Authorization Policy Enforcement. IEEE Symposium on Security and Privacy 2006: 214-229
50EEXiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, Guillaume Marceau, Liangzhao Zeng: The case for analysis preserving language transformation. ISSTA 2006: 191-202
49EEUmesh Shankar, Trent Jaeger, Reiner Sailer: Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. NDSS 2006
48EETrent Jaeger, Reiner Sailer, Umesh Shankar: PRIMA: policy-reduced integrity measurement architecture. SACMAT 2006: 19-28
47EEVinod Ganapathy, Trent Jaeger, Somesh Jha: Automatic placement of authorization hooks in the linux security modules framework. ACM Conference on Computer and Communications Security 2005: 330-339
46EEReiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramón Cáceres, Ronald Perez, Stefan Berger, John Linwood Griffin, Leendert van Doorn: Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. ACSAC 2005: 276-285
45 Trent Jaeger, Elena Ferrari: SACMAT 2004, 9th ACM Symposium on Access Control Models and Technologies, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings ACM 2004
44EEReiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn: Attestation-based policy enforcement for remote access. ACM Conference on Computer and Communications Security 2004: 308-317
43EETrent Jaeger, Reiner Sailer, Xiaolan Zhang: Resolving constraint conflicts. SACMAT 2004: 105-114
42EEReiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn: Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium 2004: 223-238
41EETrent Jaeger, Antony Edwards, Xiaolan Zhang: Consistency analysis of authorization hook placement in the Linux security modules framework. ACM Trans. Inf. Syst. Secur. 7(2): 175-205 (2004)
40 Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003 ACM 2003
39EETrent Jaeger, Xiaolan Zhang, Fidel Cacheda: Policy management using access control spaces. ACM Trans. Inf. Syst. Secur. 6(3): 327-364 (2003)
38EEAntony Edwards, Trent Jaeger, Xiaolan Zhang: Runtime verification of authorization hook placement for the linux security modules framework. ACM Conference on Computer and Communications Security 2002: 225-234
37EETrent Jaeger, Antony Edwards, Xiaolan Zhang: Gaining and maintaining confidence in operating systems security. ACM SIGOPS European Workshop 2002: 201-204
36EEXiaolan Zhang, Leendert van Doorn, Trent Jaeger, Ronald Perez, Reiner Sailer: Secure coprocessor-based intrusion detection. ACM SIGOPS European Workshop 2002: 239-242
35EEElisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi Ravi: Making access control more usable. SACMAT 2002: 141
34EETrent Jaeger, Antony Edwards, Xiaolan Zhang: Managing access control policies using access control spaces. SACMAT 2002: 3-12
33EEDawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David Wagner: Cool security trends. SACMAT 2002: 53
32EEXiaolan Zhang, Antony Edwards, Trent Jaeger: Using CQUAL for Static Analysis of Authorization Hook Placement. USENIX Security Symposium 2002: 33-48
31EEMohit Aron, Jochen Liedtke, Kevin Elphinstone, Yoonho Park, Trent Jaeger, Luke Deller: The SawMill Framework for Virtual Memory Diversity. ACSAC 2001: 3-10
30EETrent Jaeger: Managing access control complexity using metrices. SACMAT 2001: 131-139
29EERavi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr: Panel: The next generation of acess control models (panel session): do we need them and what should they be? SACMAT 2001: 53
28EETrent Jaeger, Jonathon Tidswell: Practical safety in flexible access control models. ACM Trans. Inf. Syst. Secur. 4(2): 158-190 (2001)
27EEJonathon Tidswell, Trent Jaeger: An access control model for simplifying constraint expression. ACM Conference on Computer and Communications Security 2000: 154-163
26EEAlain Gefflaut, Trent Jaeger, Yoonho Park, Jochen Liedtke, Kevin Elphinstone, Volkmar Uhlig, Jonathon Tidswell, Luke Deller, Lars Reuther: The SawMill multiserver approach. ACM SIGOPS European Workshop 2000: 109-114
25EETrent Jaeger, Jonathon Tidswell, Alain Gefflaut, Yoonho Park, Kevin Elphinstone, Jochen Liedtke: Synchronous IPC over transparent monitors. ACM SIGOPS European Workshop 2000: 189-194
24EETrent Jaeger, Jonathon Tidswell: Rebuttal to the NIST RBAC model proposal. ACM Workshop on Role-Based Access Control 2000: 65-66
23EEJonathon Tidswell, Trent Jaeger: Integrated constraints and inheritance in DTAC. ACM Workshop on Role-Based Access Control 2000: 93-102
22EETrent Jaeger: On the Increasing Importance of Constraints. ACM Workshop on Role-Based Access Control 1999: 33-42
21 Trent Jaeger: Access Control in Configurable Systems. Secure Internet Programming 1999: 289-316
20EETrent Jaeger, Tony Michailidis, Roy Rada: Access Control in a Virtual University. WETICE 1999: 135-140
19EEJochen Liedtke, Volkmar Uhlig, Kevin Elphinstone, Trent Jaeger, Yoonho Park: How To Schedule Unlimited Memory Pinning of Untrusted Processes Or Provisional Ideas about Service-Neutrality. Workshop on Hot Topics in Operating Systems 1999: 153-
18EETrent Jaeger, Kevin Elphinstone, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park: Flexible Access Control using IPC Redirection. Workshop on Hot Topics in Operating Systems 1999: 191-
17EETrent Jaeger, Atul Prakash, Jochen Liedtke, Nayeem Islam: Flexible Control of Downloaded Executable Content. ACM Trans. Inf. Syst. Secur. 2(2): 177-228 (1999)
16EETrent Jaeger, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park, Nayeem Islam: Security architecture for component-based operating systems. ACM SIGOPS European Workshop 1998: 222-228
15EEJochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, Yoonho Park: An unconventional proposal: using the x86 architecture as the ubiquitous virtual standard architecture. ACM SIGOPS European Workshop 1998: 237-241
14EEJochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, Yoonho Park: Irreproducible benchmarks might be sometimes helpful. ACM SIGOPS European Workshop 1998: 242-246
13EETrent Jaeger, Frederique Giraud, Nayeem Islam, Jochen Liedtke: A role-based access control model for protection domain derivation and management. ACM Workshop on Role-Based Access Control 1997: 95-106
12 Rangachari Anand, Nayeem Islam, Trent Jaeger, Josyula R. Rao: A Flexible Security Model for Using Internet Content. SRDS 1997: 89-96
11 Jochen Liedtke, Kevin Elphinstone, Sebastian Schönberg, Hermann Härtig, Gernot Heiser, Nayeem Islam, Trent Jaeger: Achieved IPC Performance. Workshop on Hot Topics in Operating Systems 1997: 28-31
10 Jochen Liedtke, Nayeem Islam, Trent Jaeger: Preventing Denial-of-Service Attacks on a µ-Kernel for WebOSes. Workshop on Hot Topics in Operating Systems 1997: 73-79
9 Nayeem Islam, Rangachari Anand, Trent Jaeger, Josyula R. Rao: A Flexible Security System for Using Internet Content. IEEE Software 14(5): 52-59 (1997)
8EEJang Ho Lee, Atul Prakash, Trent Jaeger, Gwobaw Wu: Supporting Multi-User, Multi-Applet Workspaces in CBE. CSCW 1996: 344-353
7EETrent Jaeger, Atul Prakash: Requirements of role-based access control for collaborative systems. ACM Workshop on Role-Based Access Control 1995
6EETrent Jaeger, Atul Prakash: Management and utilization of knowledge for the automatic improvement of workflow performance. COOCS 1995: 32-43
5EETrent Jaeger, Atul Prakash: Implementation of a discretionary access control model for script-based systems. CSFW 1995: 70-84
4 Trent Jaeger, Atul Prakash: Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems. SEKE 1995: 103-105
3EETrent Jaeger, Atul Prakash: Support for the File System Security Requirements of Computational E-Mail Systems. ACM Conference on Computer and Communications Security 1994: 1-9
2 Trent Jaeger, Atul Prakash, Masayuki Ishikawa: A Framework for Automatic Improvement of Workflows to Meet Performance Goals. ICTAI 1994: 640-646
1 Trent Jaeger, Atul Prakash: BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems. SEKE 1993: 191-198

Coauthor Index

1Rangachari Anand [9] [12]
2Mohit Aron [31]
3Vijayalakshmi Atluri (Vijay Atluri) [40]
4Stefan Berger [46] [53]
5Elisa Bertino [29] [35]
6Ramón Cáceres [46] [53]
7Fidel Cacheda [39]
8Luke St. Clair [52] [55] [58] [59]
9Luke Deller [26] [31]
10Leendert van Doorn [36] [42] [44] [46]
11Antony Edwards [32] [34] [37] [38] [41]
12Kevin Elphinstone [11] [18] [19] [25] [26] [31]
13William Enck [52] [58] [66]
14Dawson R. Engler [33]
15Elena Ferrari [45]
16Vinod Ganapathy [47] [51] [57]
17Alain Gefflaut [25] [26]
18Frederique Giraud [13]
19John Linwood Griffin [46]
20Hermann Härtig (Hermann Haertig) [11]
21Mohamed Hassan [67]
22Gernot Heiser [11]
23Boniface Hicks [54] [55] [64]
24Michael W. Hicks (Michael Hicks) [64]
25Cynthia E. Irvine [33]
26Masayuki Ishikawa [2]
27Nayeem Islam [9] [10] [11] [12] [13] [14] [15] [16] [17]
28Sushil Jajodia [40]
29Somesh Jha [47] [51] [57] [62]
30Lisa Johansen [52]
31Brian M. Jung [63]
32Dave King [57] [61] [62] [64]
33Larry Koved [50]
34D. Richard Kuhn [29]
35Carl E. Landwehr [29]
36Jang Ho Lee [8]
37Jochen Liedtke [10] [11] [13] [14] [15] [16] [17] [18] [19] [25] [26] [31]
38Guillaume Marceau [50]
39Jonathan M. McCune [53]
40Patrick Drew McDaniel (Patrick McDaniel) [52] [54] [55] [58] [59] [66]
41Stephen E. McLaughlin [67]
42Tony Michailidis [20]
43Jonathan D. Moffett [35]
44Divya Muthukumaran [63]
45Sylvia L. Osborn [35]
46Vsevolod Panteleenko [14] [15] [16] [18]
47Yoonho Park [14] [15] [16] [18] [19] [25] [26] [31]
48Ronald Perez [36] [46]
49Matthew Pirretti [52]
50Marco Pistoia [50]
51Atul Prakash [1] [2] [3] [4] [5] [6] [7] [8] [17]
52Roy Rada [20]
53Josyula R. Rao [9] [12]
54Vikhyath Rao [69]
55Ravi Ravi [35]
56Lars Reuther [26]
57Sandra Rueda [54] [55] [58] [61] [65] [70]
58Reiner Sailer [36] [42] [43] [44] [46] [48] [49] [53] [56]
59Ravi S. Sandhu [29]
60Anuj Sawani [63]
61Joshua Schiffman [58] [59] [63]
62Sebastian Schönberg [11]
63Sanjit A. Seshia [62]
64Umesh Shankar [48] [49]
65Hui Song [60]
66Yogesh Sreenivasan [56] [58] [65]
67Albert Tannous [67]
68Jonathon Tidswell [23] [24] [25] [26] [27] [28]
69Patrick Traynor [52]
70Jonathan T. Trostle [67]
71Volkmar Uhlig [19] [26]
72Enriquillo Valdez [46]
73Hayawardh Vijayakumar [70]
74David Wagner [33]
75Sam Weber [50]
76Gwobaw Wu [8]
77Liang Xie [60]
78Liangzhao Zeng [50]
79Xiaolan Zhang (Xiaolan (Catherine) Zhang) [32] [34] [36] [37] [38] [39] [41] [42] [43] [44] [50]
80Sencun Zhu [60]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)