If you made any changes in Pure, your changes will be visible here soon.

Research Output 1994 2019

Filter
Paper
2019

High-performance caching with the lava hit-server

Liedtke, J., Panteleenko, V., Jaeger, T. & Islam, N., Jan 1 2019.

Research output: Contribution to conferencePaper

Servers
Computer networks
Throughput
Bandwidth
Experiments
2012
8 Citations (Scopus)

STING: Finding name resolution vulnerabilities in programs

Vijayakumar, H., Schiffman, J. & Jaeger, T., Jan 1 2012, p. 585-599. 15 p.

Research output: Contribution to conferencePaper

Dynamic analysis
Computer science
Engines
Testing
Processing
2008

Verifying compliance of trusted programs

Rueda, S., King, D. & Jaeger, T., Jan 1 2008, p. 321-334. 14 p.

Research output: Contribution to conferencePaper

Security systems
Access control
Servers
Concretes
Control systems
2004

Design and implementation of a TCG-based integrity measurement architecture

Sailer, R., Zhang, X., Jaeger, T. & Van Doorn, L., Jan 1 2004.

Research output: Contribution to conferencePaper

Computer operating systems
Program processors
Trusted computing
Computer systems
Servers
24 Citations (Scopus)

Resolving constraint conflicts

Jaeger, T., Sailer, R. & Zhang, X., Aug 30 2004, p. 105-114. 10 p.

Research output: Contribution to conferencePaper

Access control
Specifications
Linux
2003

Analyzing integrity protection in the SELinux example policy

Jaeger, T., Sailer, R. & Zhang, X., Jan 1 2003, p. 59-74. 16 p.

Research output: Contribution to conferencePaper

Access control
Semantics
Testing
Trusted computing
Linux
2002

Gaining and maintaining confidence in operating systems security

Jaeger, T., Edwards, A. & Zhang, X., Dec 1 2002, p. 201-204. 4 p.

Research output: Contribution to conferencePaper

20 Citations (Scopus)

Managing access control policies using access control spaces

Jaeger, T., Edwards, A. & Zhang, X., Dec 1 2002, p. 3-12. 10 p.

Research output: Contribution to conferencePaper

Access control
State assignment
Semantics
Servers
28 Citations (Scopus)

Runtime verification of authorization hook placement for the Linux Security Modules framework

Edwards, A., Jaeger, T. & Zhang, X., Dec 1 2002, p. 225-234. 10 p.

Research output: Contribution to conferencePaper

Hooks
Static analysis
Linux
Access control
59 Citations (Scopus)

Secure coprocessor-based intrusion detection

Zhang, X., Van Doorn, L., Jaeger, T., Perez, R. & Sailer, R., Dec 1 2002, p. 239-242. 4 p.

Research output: Contribution to conferencePaper

Intrusion detection
Coprocessor
2000
29 Citations (Scopus)

An access control model for simplifying constraint expression

Tidswell, J. E. & Jaeger, T. R., Dec 1 2000, p. 154-163. 10 p.

Research output: Contribution to conferencePaper

Access control
Semantics
14 Citations (Scopus)

Rebuttal to the NIST RBAC model proposal

Jaeger, T. & Tidswell, J. E., Jan 1 2000, p. 65-66. 2 p.

Research output: Contribution to conferencePaper

7 Citations (Scopus)

Synchronous IPC over transparent monitors

Jaeger, T., Tidswell, J. E., Geaut, A., Park, Y., Elphinstone, K. J. & Liedtke, J., Sep 17 2000, p. 189-194. 6 p.

Research output: Contribution to conferencePaper

Monitoring
Semantics
Communication
23 Citations (Scopus)

The SawMill multiserver approach

Geffaut, A., Liedtke, J., Tidswell, J. E., Jaeger, T., Elphinstone, K. J., Deller, L., Park, Y., Uhlig, V. & Reuther, L., Sep 17 2000, p. 109-114. 6 p.

Research output: Contribution to conferencePaper

Sawmills
Throughput
Random access storage
Electric current measurement
Linux
1999
10 Citations (Scopus)

Flexible access control using IPC redirection

Jaeger, T., Elphinstone, K., Liedtke, J., Panteleenko, V. & Park, Y., Jan 1 1999, p. 191-196. 6 p.

Research output: Contribution to conferencePaper

Access control
Communication
Costs
4 Citations (Scopus)

How to schedule unlimited memory pinning of untrusted processes or provisional ideas about service-neutrality

Liedtke, J., Uhlig, V., Elphinstone, K., Jaeger, T. R. & Park, Y., Jan 1 1999, p. 153-159. 7 p.

Research output: Contribution to conferencePaper

Quality of service
Acoustic waves
Data storage equipment
1998

An unconventional proposal: Using the x86 architecture as - The ubiquitous virtual standard architecture

Liedtke, J., Islam, N., Jaeger, T. R., Panteleenko, V. & Park, Y., Sep 7 1998, p. 237-241. 5 p.

Research output: Contribution to conferencePaper

2 Citations (Scopus)

Irreproducible benchmarks might be sometimes helpful

Liedtke, J., Islam, N., Jaeger, T. R., Panteleenko, V. & Park, Y., Sep 7 1998, p. 242-246. 5 p.

Research output: Contribution to conferencePaper

Hazards and race conditions
12 Citations (Scopus)

Security architecture for component-based operating systems

Jaeger, T., Liedtke, J., Panteleenko, V., Park, Y. & Islam, N., Sep 7 1998, p. 222-228. 7 p.

Research output: Contribution to conferencePaper

1997
14 Citations (Scopus)

Preventing denial-of-service attacks on a μ-kernel for WebOSes

Liedtke, J., Islam, N. & Jaeger, T., Jan 1 1997, p. 73-79. 7 p.

Research output: Contribution to conferencePaper

World Wide Web
Servers
Denial-of-service attack
Computer systems
Substrates
1996
29 Citations (Scopus)

Supporting multi-user, multi-applet workspaces in CBE

Lee, J. H., Prakash, A., Jaeger, T. R. & Wu, G., Dec 1 1996, p. 344-353. 10 p.

Research output: Contribution to conferencePaper

Chemical beam epitaxy
Internet
Web browsers
Software architecture