• 3375 Citations
  • 26 h-Index
1994 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Paper

An access control model for simplifying constraint expression

Tidswell, J. E. & Jaeger, T. R., Dec 1 2000, p. 154-163. 10 p.

Research output: Contribution to conferencePaper

28 Scopus citations

Analyzing integrity protection in the SELinux example policy

Jaeger, T., Sailer, R. & Zhang, X., Jan 1 2003, p. 59-74. 16 p.

Research output: Contribution to conferencePaper

87 Scopus citations

An unconventional proposal: Using the x86 architecture as - The ubiquitous virtual standard architecture

Liedtke, J., Islam, N., Jaeger, T. R., Panteleenko, V. & Park, Y., Sep 7 1998, p. 237-241. 5 p.

Research output: Contribution to conferencePaper

Building systems that flexibly control downloaded executable content

Jaeger, T., Rubin, A. D. & Prakashy, A., Jan 1 1996.

Research output: Contribution to conferencePaper

Building systems that flexibly control downloaded executable content

Jaeger, T., Rubin, A. D. & Prakashy, A., Jan 1 1996.

Research output: Contribution to conferencePaper

15 Scopus citations

Design and implementation of a TCG-based integrity measurement architecture

Sailer, R., Zhang, X., Jaeger, T. & Van Doorn, L., Jan 1 2004.

Research output: Contribution to conferencePaper

774 Scopus citations

Design and implementation of a TCG-based integrity measurement architecture

Sailer, R., Zhang, X., Jaeger, T. & Van Doorn, L., Jan 1 2004.

Research output: Contribution to conferencePaper

Flexible access control using IPC redirection

Jaeger, T., Elphinstone, K., Liedtke, J., Panteleenko, V. & Park, Y., Jan 1 1999, p. 191-196. 6 p.

Research output: Contribution to conferencePaper

10 Scopus citations

Gaining and maintaining confidence in operating systems security

Jaeger, T., Edwards, A. & Zhang, X., Dec 1 2002, p. 201-204. 4 p.

Research output: Contribution to conferencePaper

High-performance caching with the lava hit-server

Liedtke, J., Panteleenko, V., Jaeger, T. & Islam, N., Jan 1 2019.

Research output: Contribution to conferencePaper

High-performance caching with the lava hit-server

Liedtke, J., Panteleenko, V., Jaeger, T. & Islam, N., Jan 1 2019.

Research output: Contribution to conferencePaper

How to schedule unlimited memory pinning of untrusted processes or provisional ideas about service-neutrality

Liedtke, J., Uhlig, V., Elphinstone, K., Jaeger, T. R. & Park, Y., Jan 1 1999, p. 153-159. 7 p.

Research output: Contribution to conferencePaper

4 Scopus citations

Irreproducible benchmarks might be sometimes helpful

Liedtke, J., Islam, N., Jaeger, T. R., Panteleenko, V. & Park, Y., Sep 7 1998, p. 242-246. 5 p.

Research output: Contribution to conferencePaper

2 Scopus citations

Managing access control policies using access control spaces

Jaeger, T., Edwards, A. & Zhang, X., Dec 1 2002, p. 3-12. 10 p.

Research output: Contribution to conferencePaper

20 Scopus citations

Operating system protection for fine-grained programs

Jaeger, T., Liedtke, J. & Islam, N., Jan 1 1998.

Research output: Contribution to conferencePaper

16 Scopus citations

Operating system protection for fine-grained programs

Jaeger, T., Liedtke, J. & Islam, N., Jan 1 1998.

Research output: Contribution to conferencePaper

Preventing denial-of-service attacks on a μ-kernel for WebOSes

Liedtke, J., Islam, N. & Jaeger, T., Jan 1 1997, p. 73-79. 7 p.

Research output: Contribution to conferencePaper

14 Scopus citations

Rebuttal to the NIST RBAC model proposal

Jaeger, T. & Tidswell, J. E., Jan 1 2000, p. 65-66. 2 p.

Research output: Contribution to conferencePaper

14 Scopus citations

Resolving constraint conflicts

Jaeger, T., Sailer, R. & Zhang, X., Aug 30 2004, p. 105-114. 10 p.

Research output: Contribution to conferencePaper

24 Scopus citations

Secure coprocessor-based intrusion detection

Zhang, X., Van Doorn, L., Jaeger, T., Perez, R. & Sailer, R., Dec 1 2002, p. 239-242. 4 p.

Research output: Contribution to conferencePaper

59 Scopus citations

Security architecture for component-based operating systems

Jaeger, T., Liedtke, J., Panteleenko, V., Park, Y. & Islam, N., Sep 7 1998, p. 222-228. 7 p.

Research output: Contribution to conferencePaper

12 Scopus citations

STING: Finding name resolution vulnerabilities in programs

Vijayakumar, H., Schiffman, J. & Jaeger, T., Jan 1 2012, p. 585-599. 15 p.

Research output: Contribution to conferencePaper

9 Scopus citations

STING: Finding name resolution vulnerabilities in programs

Vijayakumar, H., Schiffman, J. & Jaeger, T., Jan 1 2012, p. 585-599. 15 p.

Research output: Contribution to conferencePaper

Supporting multi-user, multi-applet workspaces in CBE

Lee, J. H., Prakash, A., Jaeger, T. R. & Wu, G., Dec 1 1996, p. 344-353. 10 p.

Research output: Contribution to conferencePaper

30 Scopus citations

Synchronous IPC over transparent monitors

Jaeger, T., Tidswell, J. E., Geaut, A., Park, Y., Elphinstone, K. J. & Liedtke, J., Sep 17 2000, p. 189-194. 6 p.

Research output: Contribution to conferencePaper

7 Scopus citations

The SawMill multiserver approach

Geffaut, A., Liedtke, J., Tidswell, J. E., Jaeger, T., Elphinstone, K. J., Deller, L., Park, Y., Uhlig, V. & Reuther, L., Sep 17 2000, p. 109-114. 6 p.

Research output: Contribution to conferencePaper

25 Scopus citations

Verifying compliance of trusted programs

Rueda, S., King, D. & Jaeger, T., Jan 1 2008, p. 321-334. 14 p.

Research output: Contribution to conferencePaper

9 Scopus citations