If you made any changes in Pure, your changes will be visible here soon.

Research Output 1994 2019

Filter
Article
2019
1 Citation (Scopus)

Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM

Guan, L., Cao, C., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T., May 1 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 3, p. 438-453 16 p., 8423674.

Research output: Contribution to journalArticle

Dynamic random access storage
Random access storage
Dynamic mechanical analysis
Cryptography
Internet of things
2017
3 Citations (Scopus)

Building on the success of building security in

Batcheller, A., Fowler, S. C., Cunningham, R., Doyle, D., Jaeger, T. & Lindqvist, U., Jan 1 2017, In : IEEE Security and Privacy. 15, 4, p. 85-87 3 p., 8012314.

Research output: Contribution to journalArticle

experience
4 Citations (Scopus)

Long-span program behavior modeling and attack detection

Shu, X., Yao, D., Ramakrishnan, N. & Jaeger, T., Sep 2017, In : ACM Transactions on Privacy and Security. 20, 4, 12.

Research output: Contribution to journalArticle

Context sensitive grammars
Learning systems
3 Citations (Scopus)

Taming the costs of trustworthy provenance through policy reduction

Bates, A., Tian, D. J., Hernandez, G., Moyer, T., Butler, K. R. B. & Jaeger, T., Sep 2017, In : ACM Transactions on Internet Technology. 17, 4, 3062180.

Research output: Contribution to journalArticle

Cloud computing
Metadata
Access control
Control systems
Costs
2012
10 Citations (Scopus)

Lessons from VAX/SVS for High-Assurance VM Systems

Lipner, S., Jaeger, T. & Zurko, M. E., Jan 1 2012, In : IEEE Security and Privacy. 10, 6, p. 26-35 10 p.

Research output: Contribution to journalArticle

Access control
Virtual machine
10 Citations (Scopus)

Scalable web content attestation

Moyer, T., Butler, K., Schiffman, J., McDaniel, P. & Jaeger, T., Apr 18 2012, In : IEEE Transactions on Computers. 61, 5, p. 686-699 14 p., 5740848.

Research output: Contribution to journalArticle

Servers
Integrity
Web Server
Web services
Module
2011
2 Citations (Scopus)

Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification

Jaeger, T., Van Oorschot, P. C. & Wurster, G., Nov 1 2011, In : Computers and Security. 30, 8, p. 571-579 9 p.

Research output: Contribution to journalArticle

commodity
Computer operating systems
Personal computers
Interfaces (computer)
Hardening
6 Citations (Scopus)

From mobile phones to responsible devices

Traynor, P., Amrutkar, C., Rao, V., Jaeger, T., Mcdaniel, P. & La Porta, T., Jun 2011, In : Security and Communication Networks. 4, 6, p. 719-726 8 p.

Research output: Contribution to journalArticle

Mobile phones
Access control
Telecommunication
Quality of service
Internet
14 Citations (Scopus)

Network-based root of trust for installation

Schiffman, J., Moyer, T., Jaeger, T. R. & McDaniel, P. D., Jan 1 2011, In : IEEE Security and Privacy. 9, 1, p. 40-48 9 p., 5705596.

Research output: Contribution to journalArticle

Cloning
integrity
evaluation
time
Malware
7 Citations (Scopus)

Protecting the integrity of trusted applications in mobile phone systems

Muthukumaran, D., Schiffman, J., Hassan, M., Sawani, A., Rao, V. & Jaeger, T., Jun 2011, In : Security and Communication Networks. 4, 6, p. 633-650 18 p.

Research output: Contribution to journalArticle

Mobile phones
Access control
Servers
2010
29 Citations (Scopus)

A logical specification and analysis for SELinux MLS policy

Hicks, B., Rueda, S., St.Clair, L., Jaeger, T. & Mcdaniel, P., Jul 1 2010, In : ACM Transactions on Information and System Security. 13, 3, 26.

Research output: Contribution to journalArticle

Specifications
Access control
Testing
49 Citations (Scopus)

Outlook: Cloudy with a chance of security challenges and improvements

Jaeger, T. & Schiffman, J., Jan 1 2010, In : IEEE Security and Privacy. 8, 1, p. 77-80 4 p., 5403158.

Research output: Contribution to journalArticle

Cloud computing
customer
Industry
integrity
resources
2004
30 Citations (Scopus)

Consistency analysis of authorization hook placement in the Linux security modules framework

Jaeger, T., Edwards, A. & Zhang, X., May 1 2004, In : ACM Transactions on Information and System Security. 7, 2, p. 175-205 31 p.

Research output: Contribution to journalArticle

Hooks
Static analysis
Linux
Access control
2003
54 Citations (Scopus)

Policy Management Using Access Control Spaces

Jaeger, T., Zhang, X. & Edwards, A., Aug 1 2003, In : ACM Transactions on Information and System Security. 6, 3, p. 327-364 38 p.

Research output: Contribution to journalArticle

Access control
Specifications
State assignment
Servers
Semantics
2001
76 Citations (Scopus)

Practical Safety in Flexible Access Control Models

Jaeger, T. R. & Tidswell, J. E., Jan 1 2001, In : ACM Transactions on Information and System Security. 4, 2, p. 158-190 33 p.

Research output: Contribution to journalArticle

Access control
2000
16 Citations (Scopus)

Integrated constraints and inheritance in DTAC

Tidswell, J. E. & Jaeger, T. R., 2000, In : Proceedings of the ACM Workshop on Role-Based Access Control. p. 93-102 10 p.

Research output: Contribution to journalArticle

Access control
1999
15 Citations (Scopus)

Flexible Control of Downloaded Executable Content

Jaeger, T., Liedtke, J., Islam, N. & Prakash, A., May 1 1999, In : ACM Transactions on Information and System Security. 2, 2, p. 177-228 52 p.

Research output: Contribution to journalArticle

Access control
Specifications
1997
13 Citations (Scopus)

A flexible security system for using internet content

Islam, N., Anand, R., Jaeger, T. & Rao, J. R., Dec 1 1997, In : IEEE Software. 14, 5, p. 52-59 8 p.

Research output: Contribution to journalArticle

Security systems
Internet
1995
5 Citations (Scopus)
Access control
World Wide Web