• 3368 Citations
  • 27 h-Index
1994 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Paper
2019

High-performance caching with the lava hit-server

Liedtke, J., Panteleenko, V., Jaeger, T. & Islam, N., Jan 1 2019.

Research output: Contribution to conferencePaper

High-performance caching with the lava hit-server

Liedtke, J., Panteleenko, V., Jaeger, T. & Islam, N., Jan 1 2019.

Research output: Contribution to conferencePaper

2012

STING: Finding name resolution vulnerabilities in programs

Vijayakumar, H., Schiffman, J. & Jaeger, T., Jan 1 2012, p. 585-599. 15 p.

Research output: Contribution to conferencePaper

9 Scopus citations

STING: Finding name resolution vulnerabilities in programs

Vijayakumar, H., Schiffman, J. & Jaeger, T., Jan 1 2012, p. 585-599. 15 p.

Research output: Contribution to conferencePaper

2008

Verifying compliance of trusted programs

Rueda, S., King, D. & Jaeger, T., Jan 1 2008, p. 321-334. 14 p.

Research output: Contribution to conferencePaper

9 Scopus citations
2004

Design and implementation of a TCG-based integrity measurement architecture

Sailer, R., Zhang, X., Jaeger, T. & Van Doorn, L., Jan 1 2004.

Research output: Contribution to conferencePaper

Design and implementation of a TCG-based integrity measurement architecture

Sailer, R., Zhang, X., Jaeger, T. & Van Doorn, L., Jan 1 2004.

Research output: Contribution to conferencePaper

774 Scopus citations

Resolving constraint conflicts

Jaeger, T., Sailer, R. & Zhang, X., 2004, p. 105-114. 10 p.

Research output: Contribution to conferencePaper

24 Scopus citations
2003

Analyzing integrity protection in the SELinux example policy

Jaeger, T., Sailer, R. & Zhang, X., Jan 1 2003, p. 59-74. 16 p.

Research output: Contribution to conferencePaper

87 Scopus citations
2002

Gaining and maintaining confidence in operating systems security

Jaeger, T., Edwards, A. & Zhang, X., Dec 1 2002, p. 201-204. 4 p.

Research output: Contribution to conferencePaper

Managing access control policies using access control spaces

Jaeger, T., Edwards, A. & Zhang, X., 2002, p. 3-12. 10 p.

Research output: Contribution to conferencePaper

20 Scopus citations

Secure coprocessor-based intrusion detection

Zhang, X., Van Doorn, L., Jaeger, T., Perez, R. & Sailer, R., Dec 1 2002, p. 239-242. 4 p.

Research output: Contribution to conferencePaper

59 Scopus citations
2000

An access control model for simplifying constraint expression

Tidswell, J. E. & Jaeger, T. R., Dec 1 2000, p. 154-163. 10 p.

Research output: Contribution to conferencePaper

28 Scopus citations

Integrated constraints and inheritance in DTAC

Tidswell, J. E. & Jaeger, T., 2000, p. 93-102. 10 p.

Research output: Contribution to conferencePaper

Rebuttal to the NIST RBAC model proposal

Jaeger, T. & Tidswell, J. E., Jan 1 2000, p. 65-66. 2 p.

Research output: Contribution to conferencePaper

14 Scopus citations

Synchronous IPC over transparent monitors

Jaeger, T., Tidswell, J. E., Geaut, A., Park, Y., Elphinstone, K. J. & Liedtke, J., Sep 17 2000, p. 189-194. 6 p.

Research output: Contribution to conferencePaper

7 Scopus citations

The SawMill multiserver approach

Geffaut, A., Liedtke, J., Tidswell, J. E., Jaeger, T., Elphinstone, K. J., Deller, L., Park, Y., Uhlig, V. & Reuther, L., Sep 17 2000, p. 109-114. 6 p.

Research output: Contribution to conferencePaper

25 Scopus citations
1999

Flexible access control using IPC redirection

Jaeger, T., Elphinstone, K., Liedtke, J., Panteleenko, V. & Park, Y., Jan 1 1999, p. 191-196. 6 p.

Research output: Contribution to conferencePaper

10 Scopus citations

How to schedule unlimited memory pinning of untrusted processes or provisional ideas about service-neutrality

Liedtke, J., Uhlig, V., Elphinstone, K., Jaeger, T. R. & Park, Y., Jan 1 1999, p. 153-159. 7 p.

Research output: Contribution to conferencePaper

4 Scopus citations
1998

An unconventional proposal: Using the x86 architecture as - The ubiquitous virtual standard architecture

Liedtke, J., Islam, N., Jaeger, T. R., Panteleenko, V. & Park, Y., Sep 7 1998, p. 237-241. 5 p.

Research output: Contribution to conferencePaper

Irreproducible benchmarks might be sometimes helpful

Liedtke, J., Islam, N., Jaeger, T. R., Panteleenko, V. & Park, Y., Sep 7 1998, p. 242-246. 5 p.

Research output: Contribution to conferencePaper

2 Scopus citations

Operating system protection for fine-grained programs

Jaeger, T., Liedtke, J. & Islam, N., Jan 1 1998.

Research output: Contribution to conferencePaper

16 Scopus citations

Operating system protection for fine-grained programs

Jaeger, T., Liedtke, J. & Islam, N., Jan 1 1998.

Research output: Contribution to conferencePaper

Security architecture for component-based operating systems

Jaeger, T., Liedtke, J., Panteleenko, V., Park, Y. & Islam, N., Sep 7 1998, p. 222-228. 7 p.

Research output: Contribution to conferencePaper

12 Scopus citations
1997

Preventing denial-of-service attacks on a μ-kernel for WebOSes

Liedtke, J., Islam, N. & Jaeger, T., Jan 1 1997, p. 73-79. 7 p.

Research output: Contribution to conferencePaper

14 Scopus citations
1996

Building systems that flexibly control downloaded executable content

Jaeger, T., Rubin, A. D. & Prakashy, A., Jan 1 1996.

Research output: Contribution to conferencePaper

Building systems that flexibly control downloaded executable content

Jaeger, T., Rubin, A. D. & Prakashy, A., Jan 1 1996.

Research output: Contribution to conferencePaper

15 Scopus citations

Supporting multi-user, multi-applet workspaces in CBE

Lee, J. H., Prakash, A., Jaeger, T. & Wu, G., 1996, p. 344-353. 10 p.

Research output: Contribution to conferencePaper

30 Scopus citations
1995

Management and utilization of knowledge for the automatic improvement of workflow performance

Jaeger, T. & Prakash, A., 1995, p. 32-43. 12 p.

Research output: Contribution to conferencePaper