![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Trent Jaeger
Person information
- affiliation: Pennsylvania State University, University Park, USA
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Kaiming Huang
, Mathias Payer
, Zhiyun Qian
, Jack Sampson
, Gang Tan
, Trent Jaeger
:
Comprehensive Memory Safety Validation: An Alternative Approach to Memory Safety. IEEE Secur. Priv. 22(4): 40-49 (2024) - [j31]Trent Jaeger
:
Has Access Control Become the Weak Link? IEEE Secur. Priv. 22(5): 4-7 (2024) - [j30]Zheng Fang
, Hao Fu
, Tianbo Gu, Pengfei Hu
, Jinyue Song
, Trent Jaeger
, Prasant Mohapatra
:
Towards System-Level Security Analysis of IoT Using Attack Graphs. IEEE Trans. Mob. Comput. 23(2): 1142-1155 (2024) - [c157]Kaiming Huang
, Mathias Payer
, Zhiyun Qian
, Jack Sampson
, Gang Tan
, Trent Jaeger
:
Top of the Heap: Efficient Memory Error Protection of Safe Heap Objects. CCS 2024: 1330-1344 - [c156]Mingming Chen
, Thomas La Porta
, Teryl Taylor
, Frederico Araujo
, Trent Jaeger
:
Manipulating OpenFlow Link Discovery Packet Forwarding for Topology Poisoning. CCS 2024: 3704-3718 - [c155]Abdulrahman Fahim, Shitong Zhu, Zhiyun Qian, Chengyu Song, Evangelos E. Papalexakis, Supriyo Chakraborty, Kevin S. Chan, Paul L. Yu, Trent Jaeger, Srikanth V. Krishnamurthy:
DNS Exfiltration Guided by Generative Adversarial Networks. EuroS&P 2024: 580-599 - [c154]Mingming Chen
, Thomas La Porta, Trent Jaeger, Srikanth V. Krishnamurthy:
Lightweight Coordinated Sampling for Dynamic Flows under Budget Constraints. ICCCN 2024: 1-9 - [c153]Xingyu Li
, Zheng Zhang
, Zhiyun Qian
, Trent Jaeger
, Chengyu Song
:
An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem. MSR 2024: 63-74 - [c152]Frank Capobianco, Quan Zhou, Aditya Basu, Trent Jaeger, Danfeng Zhang:
TALISMAN: Tamper Analysis for Reference Monitors. NDSS 2024 - [c151]Rahul George, Mingming Chen, Kaiming Huang, Zhiyun Qian, Thomas La Porta, Trent Jaeger:
OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget. USENIX Security Symposium 2024 - [c150]Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul L. Yu, Srikanth V. Krishnamurthy:
Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks. USENIX Security Symposium 2024 - [c149]Kaushal Kafle
, Kirti Jagtap
, Mansoor Ahmed-Rengers
, Trent Jaeger
, Adwait Nadkarni
:
Practical Integrity Validation in the Smart Home with HomeEndorser. WISEC 2024: 207-218 - [i23]Xingyu Li, Zheng Zhang, Zhiyun Qian, Trent Jaeger, Chengyu Song:
An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem. CoRR abs/2402.05212 (2024) - [i22]Yu-Tsung Lee, Hayawardh Vijayakumar, Zhiyun Qian, Trent Jaeger:
Static Detection of Filesystem Vulnerabilities in Android Systems. CoRR abs/2407.11279 (2024) - [i21]Mingming Chen, Thomas La Porta, Teryl Taylor, Frederico Araujo, Trent Jaeger:
Manipulating OpenFlow Link Discovery Packet Forwarding for Topology Poisoning. CoRR abs/2408.16940 (2024) - [i20]Yongzhe Huang, Kaiming Huang, Matthew Ennis, Vikram Narayanan, Anton Burtsev, Trent Jaeger, Gang Tan:
SoK: Understanding the Attack Surface in Device Driver Isolation Frameworks. CoRR abs/2412.16754 (2024) - 2023
- [j29]Carl E. Landwehr
, Michael K. Reiter
, Laurie A. Williams
, Gene Tsudik
, Trent Jaeger
, Tadayoshi Kohno
, Apu Kapadia
:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. IEEE Secur. Priv. 21(2): 32-42 (2023) - [j28]Trent Jaeger
:
On Bridges and Software. IEEE Secur. Priv. 21(3): 4-5 (2023) - [j27]Trent Jaeger
, Brent ByungHoon Kang
, Nele Mentens
, Cynthia Sturton
:
Impact of Emerging Hardware on Security and Privacy. IEEE Secur. Priv. 21(3): 6-7 (2023) - [c148]Naiqian Zhang, Daroc Alden, Dongpeng Xu, Shuai Wang, Trent Jaeger, Wheeler Ruml
:
No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs. DSN 2023: 313-326 - [c147]Aditya Basu, John Sampson, Zhiyun Qian, Trent Jaeger:
Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities. FAST 2023: 183-198 - [c146]Anton Burtsev
, Vikram Narayanan
, Yongzhe Huang
, Kaiming Huang
, Gang Tan
, Trent Jaeger
:
Evolving Operating System Kernels Towards Secure Kernel-Driver Interfaces. HotOS 2023: 166-173 - [c145]Jiyong Yu
, Trent Jaeger
, Christopher Wardlaw Fletcher
:
All Your PC Are Belong to Us: Exploiting Non-control-Transfer Instruction BTB Updates for Dynamic PC Extraction. ISCA 2023: 65:1-65:14 - [c144]Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath T. V. Setty, Sudheesh Singanamalla:
Nimble: Rollback Protection for Confidential Cloud Services. OSDI 2023: 193-208 - [c143]Kaiming Huang, Jack Sampson, Trent Jaeger:
Assessing the Impact of Efficiently Protecting Ten Million Stack Objects from Memory Errors Comprehensively. SecDev 2023: 67-74 - [c142]Yu Tsung Lee, Rahul George, Haining Chen, Kevin Chan, Trent Jaeger:
Triaging Android Systems Using Bayesian Attack Graphs. SecDev 2023: 171-183 - [c141]Jiyong Yu, Aishani Dutta, Trent Jaeger, David Kohlbrenner, Christopher W. Fletcher:
Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions. USENIX Security Symposium 2023: 1973-1990 - [i19]Yu Tsung Lee, Haining Chen, William Enck, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage. CoRR abs/2302.13506 (2023) - [i18]Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger:
Top of the Heap: Efficient Memory Error Protection for Many Heap Objects. CoRR abs/2310.06397 (2023) - [i17]Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath T. V. Setty, Sudheesh Singanamalla:
Nimble: Rollback Protection for Confidential Cloud Services (extended version). IACR Cryptol. ePrint Arch. 2023: 761 (2023) - 2022
- [j26]Quinn Burke
, Fidan Mehmeti
, Rahul George
, Kyle Ostrowski, Trent Jaeger
, Thomas F. La Porta
, Patrick D. McDaniel
:
Enforcing Multilevel Security Policies in Unstable Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 2349-2365 (2022) - [c140]Zheng Fang, Hao Fu, Tianbo Gu, Pengfei Hu
, Jinyue Song, Trent Jaeger, Prasant Mohapatra:
IOTA: A Framework for Analyzing System-Level Security of IoTs. IoTDI 2022: 143-155 - [c139]Kaiming Huang, Yongzhe Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger:
The Taming of the Stack: Isolating Stack Data from Memory Errors. NDSS 2022 - [c138]Yizhuo Zhai, Yu Hao, Zheng Zhang, Weiteng Chen, Guoren Li, Zhiyun Qian, Chengyu Song, Manu Sridharan, Srikanth V. Krishnamurthy, Trent Jaeger, Paul L. Yu:
Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel. NDSS 2022 - [c137]Yongzhe Huang, Vikram Narayanan, David Detweiler, Kaiming Huang
, Gang Tan, Trent Jaeger, Anton Burtsev:
KSplit: Automating Device Driver Isolation. OSDI 2022: 613-631 - [c136]Jiyong Yu
, Xinyang Ge, Trent Jaeger, Christopher W. Fletcher, Weidong Cui:
Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory. SEED 2022: 133-144 - [i16]Zheng Fang, Hao Fu, Tianbo Gu, Pengfei Hu, Jinyue Song, Trent Jaeger, Prasant Mohapatra:
Iota: A Framework for Analyzing System-Level Security of IoTs. CoRR abs/2202.02506 (2022) - [i15]Valentin Vie, Ryan Sheatsley, Sophia Beyda, Sushrut Shringarputale, Kevin S. Chan, Trent Jaeger, Patrick D. McDaniel:
Adversarial Plannning. CoRR abs/2205.00566 (2022) - [i14]Aditya Basu, John Sampson, Zhiyun Qian, Trent Jaeger:
Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities. CoRR abs/2211.16735 (2022) - 2021
- [j25]Amit Kumar Sikder
, Giuseppe Petracca, Hidayet Aksu
, Trent Jaeger, A. Selcuk Uluagac
:
A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications. IEEE Commun. Surv. Tutorials 23(2): 1125-1159 (2021) - [j24]Fabio Massacci
, Trent Jaeger, Sean Peisert
:
SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil? IEEE Secur. Priv. 19(2): 14-19 (2021) - [j23]Yu Tsung Lee
, Haining Chen, Trent Jaeger
:
Demystifying Android's Scoped Storage Defense. IEEE Secur. Priv. 19(5): 16-25 (2021) - [j22]Trent Jaeger:
Toward Fail Safety for Security Decisions. IEEE Secur. Priv. 19(6): 4-7 (2021) - [j21]Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Nyman
, Haipeng Cai
, Trent Jaeger, N. Asokan
, Danfeng (Daphne) Yao:
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches. ACM Trans. Priv. Secur. 24(4): 26:1-26:36 (2021) - [j20]Stefan Achleitner
, Quinn Burke
, Patrick D. McDaniel
, Trent Jaeger
, Thomas La Porta, Srikanth V. Krishnamurthy
:
MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking. IEEE Trans. Netw. Serv. Manag. 18(1): 729-744 (2021) - [c135]Wenhui Zhang, Peng Liu, Trent Jaeger:
Analyzing the Overhead of File Protection by Linux Security Modules. AsiaCCS 2021: 393-406 - [c134]Zhen Huang
, Trent Jaeger, Gang Tan:
Fine-grained Program Partitioning for Security. EuroSec@EuroSys 2021: 21-26 - [c133]Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Daimeng Wang, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems. USENIX Security Symposium 2021: 2579-2596 - [e9]Trent Jaeger, Zhiyun Qian:
MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, Virtual Event, Republic of Korea, 15 November 2021. ACM 2021, ISBN 978-1-4503-8658-6 [contents] - [i13]Wenhui Zhang, Trent Jaeger, Peng Liu:
Analyzing the Overhead of Filesystem Protection Using Linux Security Modules. CoRR abs/2101.11611 (2021) - [i12]Kaushal Kafle, Kirti Jagtap, Mansoor Ahmed-Rengers, Trent Jaeger, Adwait Nadkarni:
Towards Practical Integrity in the Smart Home with HomeEndorser. CoRR abs/2109.05139 (2021) - 2020
- [j19]Asmit De
, Aditya Basu
, Swaroop Ghosh
, Trent Jaeger:
Hardware Assisted Buffer Protection Mechanisms for Embedded RISC-V. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(12): 4453-4465 (2020) - [j18]Zhen Huang, David Lie, Gang Tan, Trent Jaeger:
Using Safety Properties to Generate Vulnerability Patches. login Usenix Mag. 45(4) (2020) - [c132]Trent Jaeger:
Static Analysis Opportunities for Improving Agile and Moving Target Defenses. MTD@CCS 2020: 43-44 - [c131]Christian Skalka, David Darais, Trent Jaeger, Frank Capobianco:
Types and Abstract Interpretation for Authorization Hook Advice. CSF 2020: 139-152 - [c130]Vikram Narayanan
, Yongzhe Huang, Gang Tan
, Trent Jaeger, Anton Burtsev:
Lightweight kernel isolation with virtualization and VM functions. VEE 2020: 157-171 - [i11]Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Daimeng Wang, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Triage Android Systems. CoRR abs/2008.03593 (2020) - [i10]Stefan Achleitner, Quinn Burke, Patrick D. McDaniel, Trent Jaeger, Thomas La Porta, Srikanth V. Krishnamurthy:
MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking. CoRR abs/2009.10021 (2020)
2010 – 2019
- 2019
- [j17]Le Guan
, Chen Cao, Peng Liu
, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. IEEE Trans. Dependable Secur. Comput. 16(3): 438-453 (2019) - [c129]Shen Liu
, Dongrui Zeng, Yongzhe Huang, Frank Capobianco, Stephen McCamant, Trent Jaeger, Gang Tan
:
Program-mandering: Quantitative Privilege Separation. CCS 2019: 1023-1040 - [c128]Asmit De, Aditya Basu
, Swaroop Ghosh, Trent Jaeger:
FIXER: Flow Integrity Extensions for Embedded RISC-V. DATE 2019: 348-353 - [c127]Zheng Fang, Hao Fu, Tianbo Gu, Zhiyun Qian, Trent Jaeger, Prasant Mohapatra:
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things. MASS 2019: 236-244 - [c126]Frank Capobianco, Rahul George, Kaiming Huang
, Trent Jaeger, Srikanth V. Krishnamurthy
, Zhiyun Qian, Mathias Payer, Paul L. Yu:
Employing attack graphs for intrusion detection. NSPW 2019: 16-30 - [c125]Long Cheng, Hans Liljestrand, Md. Salman Ahmed
, Thomas Nyman
, Trent Jaeger, N. Asokan
, Danfeng Yao
:
Exploitation Techniques and Defenses for Data-Oriented Attacks. SecDev 2019: 114-128 - [c124]Zhen Huang
, David Lie, Gang Tan
, Trent Jaeger:
Using Safety Properties to Generate Vulnerability Patches. IEEE Symposium on Security and Privacy 2019: 539-554 - [c123]Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli-Reineh, Patrick D. McDaniel, Jens Grossklags, Trent Jaeger:
EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs. USENIX Security Symposium 2019: 567-584 - [i9]Long Cheng, Hans Liljestrand
, Thomas Nyman, Yu Tsung Lee, Danfeng Yao, Trent Jaeger, N. Asokan:
Exploitation Techniques and Defenses for Data-Oriented Attacks. CoRR abs/1902.08359 (2019) - 2018
- [c122]Kyriakos K. Ispoglou, Bader AlBassam, Trent Jaeger, Mathias Payer:
Block Oriented Programming: Automating Data-Only Attacks. CCS 2018: 1868-1882 - [c121]Sayed M. Saghaian N. E., Tom La Porta, Trent Jaeger, Z. Berkay Celik, Patrick D. McDaniel:
Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout. SecureComm (2) 2018: 192-212 - [c120]Yuqiong Sun, David Safford, Mimi Zohar, Dimitrios Pendarakis, Zhongshu Gu, Trent Jaeger:
Security Namespace: Making Linux Security Frameworks Available to Containers. USENIX Security Symposium 2018: 1423-1439 - [e8]Vinod Ganapathy, Trent Jaeger, R. K. Shyamasundar:
Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings. Lecture Notes in Computer Science 11281, Springer 2018, ISBN 978-3-030-05170-9 [contents] - [i8]Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac:
A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications. CoRR abs/1802.02041 (2018) - [i7]Kyriakos K. Ispoglou, Bader AlBassam, Trent Jaeger, Mathias Payer:
Block Oriented Programming: Automating Data-Only Attacks. CoRR abs/1805.04767 (2018) - [i6]Giuseppe Petracca, Jens Grossklags, Patrick D. McDaniel, Trent Jaeger:
Regulating Access to System Sensors in Cooperating Programs. CoRR abs/1808.05579 (2018) - 2017
- [j16]Archer L. Batcheller, Summer Craze Fowler, Robert K. Cunningham, Dinara Doyle, Trent Jaeger, Ulf Lindqvist
:
Building on the Success of Building Security In. IEEE Secur. Priv. 15(4): 85-87 (2017) - [j15]Xiaokui Shu
, Danfeng (Daphne) Yao
, Naren Ramakrishnan
, Trent Jaeger:
Long-Span Program Behavior Modeling and Attack Detection. ACM Trans. Priv. Secur. 20(4): 12:1-12:28 (2017) - [j14]Adam Bates
, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler
, Trent Jaeger:
Taming the Costs of Trustworthy Provenance through Policy Reduction. ACM Trans. Internet Techn. 17(4): 34:1-34:21 (2017) - [c119]Xinyang Ge, Weidong Cui, Trent Jaeger:
GRIFFIN: Guarding Control Flows Using Intel Processor Trace. ASPLOS 2017: 585-598 - [c118]Gang Tan
, Trent Jaeger:
CFG Construction Soundness in Control-Flow Integrity. PLAS@CCS 2017: 3-13 - [c117]Shen Liu
, Gang Tan
, Trent Jaeger:
PtrSplit: Supporting General Pointers in Automatic Program Partitioning. CCS 2017: 2359-2371 - [c116]Azeem Aqil, Karim Khalil, Ahmed Osama Fathy Atya, Evangelos E. Papalexakis
, Srikanth V. Krishnamurthy
, Trent Jaeger, K. K. Ramakrishnan
, Paul L. Yu, Ananthram Swami:
Jaal: Towards Network Intrusion Detection at ISP Scale. CoNEXT 2017: 134-146 - [c115]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. MobiSys 2017: 488-501 - [c114]Xinyang Ge, Mathias Payer, Trent Jaeger:
An Evil Copy: How the Loader Betrays You. NDSS 2017 - [c113]Giuseppe Petracca, Frank Capobianco, Christian Skalka, Trent Jaeger:
On Risk in Access Control Enforcement. SACMAT 2017: 31-42 - [c112]Stefan Achleitner
, Thomas La Porta, Trent Jaeger, Patrick D. McDaniel:
Adversarial Network Forensics in Software Defined Networking. SOSR 2017: 8-20 - [c111]Stefan Achleitner, Thomas La Porta, Trent Jaeger, Patrick D. McDaniel:
Adversarial Network Forensics in Software Defined Networking: Demo. SOSR 2017: 177-178 - [c110]Frank Capobianco, Christian Skalka, Trent Jaeger:
ACCESSPROV: Tracking the Provenance of Access Control Decisions. TaPP 2017 - [c109]Giuseppe Petracca, Ahmad Atamli-Reineh, Yuqiong Sun, Jens Grossklags, Trent Jaeger:
AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings. USENIX Security Symposium 2017: 379-396 - [i5]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. CoRR abs/1704.05600 (2017) - 2016
- [c108]Yuqiong Sun, Giuseppe Petracca, Xinyang Ge, Trent Jaeger:
Pileus: protecting user resources from vulnerable cloud services. ACSAC 2016: 52-64 - [c107]Xinyang Ge, Nirupama Talele, Mathias Payer, Trent Jaeger:
Fine-Grained Control-Flow Integrity for Kernel Software. EuroS&P 2016: 179-194 - [c106]Giuseppe Petracca, Lisa M. Marvel, Ananthram Swami, Trent Jaeger:
Agility maneuvers to mitigate inference attacks on sensed location data. MILCOM 2016: 259-264 - [c105]Trent Jaeger:
Configuring Software and Systems for Defense-in-Depth. SafeConfig@CCS 2016: 1 - [c104]Nirupama Talele, Divya Muthukumaran, Frank Capobianco, Trent Jaeger, Gang Tan
:
Maintaining Authorization Hook Placements Across Program Versions. SecDev 2016: 67-68 - [c103]Thomas Moyer, Karishma Chadha, Robert K. Cunningham, Nabil Schear, Warren Smith, Adam Bates
, Kevin R. B. Butler
, Frank Capobianco, Trent Jaeger, Patrick T. Cable II:
Leveraging Data Provenance to Enhance Cyber Resilience. SecDev 2016: 107-114 - [i4]Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli, Trent Jaeger:
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices. CoRR abs/1604.00320 (2016) - [i3]Giuseppe Petracca, Ahmad Atamli, Yuqiong Sun, Jens Grossklags, Trent Jaeger:
Aware: Controlling App Access to I/O Devices on Mobile Platforms. CoRR abs/1604.02171 (2016) - 2015
- [c102]Yuqiong Sun, Giuseppe Petracca, Trent Jaeger, Hayawardh Vijayakumar, Joshua Schiffman:
Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services. CLOUD 2015: 253-260 - [c101]Giuseppe Petracca, Yuqiong Sun, Trent Jaeger, Ahmad Atamli:
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices. ACSAC 2015: 181-190 - [c100]Yuqiong Sun, Susanta Nanda, Trent Jaeger:
Security-as-a-Service for Microservices-Based Cloud Applications. CloudCom 2015: 50-57 - [c99]Divya Muthukumaran, Nirupama Talele, Trent Jaeger, Gang Tan
:
Producing Hook Placements to Enforce Expected Access Control Policies. ESSoS 2015: 178-195 - [c98]Azeem Aqil, Ahmed Osama Fathy Atya, Trent Jaeger, Srikanth V. Krishnamurthy
, Karl N. Levitt, Patrick D. McDaniel, Jeff Rowe, Ananthram Swami:
Detection of stealthy TCP-based DoS attacks. MILCOM 2015: 348-353 - [c97]Conner Jackson, Karl N. Levitt, Jeff Rowe, Srikanth V. Krishnamurthy
, Trent Jaeger, Ananthram Swami:
A diagnosis based intrusion detection approach. MILCOM 2015: 929-934 - [c96]Trent Jaeger:
Challenges in Making Access Control Sensitive to the "Right" Contexts. SACMAT 2015: 111 - [c95]Trent Jaeger, Xinyang Ge, Divya Muthukumaran, Sandra Julieta Rueda
, Joshua Schiffman, Hayawardh Vijayakumar:
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer. SPACE 2015: 55-74 - 2014
- [c94]Patrick D. McDaniel, Trent Jaeger, Thomas F. La Porta, Nicolas Papernot, Robert J. Walls, Alexander Kott, Lisa M. Marvel, Ananthram Swami, Prasant Mohapatra, Srikanth V. Krishnamurthy
, Iulian Neamtiu:
Security and Science of Agility. MTD@CCS 2014: 13-19 - [c93]Yuqiong Sun, Giuseppe Petracca, Trent Jaeger:
Inevitable Failure: The Flawed Trust Assumption in the Cloud. CCSW 2014: 141-150 - [c92]Nirupama Talele, Jason Teutsch, Robert F. Erbacher, Trent Jaeger:
Monitor placement for large-scale systems. SACMAT 2014: 29-40 - [c91]Hayawardh Vijayakumar, Xinyang Ge, Trent Jaeger:
Policy models to protect resource retrieval. SACMAT 2014: 211-222 - [c90]Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger:
JIGSAW: Protecting Resource Access by Inferring Programmer Expectations. USENIX Security Symposium 2014: 973-988 - [e7]Shiho Moriai, Trent Jaeger, Kouichi Sakurai:
9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014. ACM 2014, ISBN 978-1-4503-2800-5 [contents] - [i2]Robert F. Erbacher, Trent Jaeger, Nirupama Talele, Jason Teutsch:
Directed Multicut with linearly ordered terminals. CoRR abs/1407.7498 (2014) - [i1]Xinyang Ge, Hayawardh Vijayakumar, Trent Jaeger:
Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture. CoRR abs/1410.7747 (2014) - 2013
- [c89]David Schmidt, Trent Jaeger:
Pitfalls in the automated strengthening of passwords. ACSAC 2013: 129-138 - [c88]Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher:
Using Security Policies to Automate Placement of Network Intrusion Prevention. ESSoS 2013: 17-32 - [c87]Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger:
Process firewalls: protecting processes during resource access. EuroSys 2013: 57-70 - [c86]Joshua Schiffman, Yuqiong Sun, Hayawardh Vijayakumar, Trent Jaeger:
Cloud Verifier: Verifiable Auditing Service for IaaS Clouds. SERVICES 2013: 239-246 - 2012
- [j13]Steve Lipner, Trent Jaeger, Mary Ellen Zurko:
Lessons from VAX/SVS for High-Assurance VM Systems. IEEE Secur. Priv. 10(6): 26-35 (2012) - [j12]Thomas Moyer, Kevin R. B. Butler
, Joshua Schiffman, Patrick D. McDaniel, Trent Jaeger:
Scalable Web Content Attestation. IEEE Trans. Computers 61(5): 686-699 (2012) - [c85]Divya Muthukumaran, Sandra Julieta Rueda
, Nirupama Talele, Hayawardh Vijayakumar, Jason Teutsch, Trent Jaeger:
Transforming commodity security policies to enforce Clark-Wilson integrity. ACSAC 2012: 269-278 - [c84]Thomas Moyer, Trent Jaeger, Patrick D. McDaniel:
Scalable Integrity-Guaranteed AJAX. APWeb 2012: 1-19 - [c83]Hayawardh Vijayakumar, Guruprasad Jakka, Sandra Julieta Rueda
, Joshua Schiffman, Trent Jaeger:
Integrity walls: finding attack surfaces from mandatory access control policies. AsiaCCS 2012: 75-76 - [c82]Divya Muthukumaran, Trent Jaeger, Vinod Ganapathy:
Leveraging "choice" to automate authorization hook placement. CCS 2012: 145-156 - [c81]Hayawardh Vijayakumar, Trent Jaeger:
The Right Files at the Right Time. SafeConfig 2012: 119-133 - [c80]Joshua Schiffman, Hayawardh Vijayakumar, Trent Jaeger:
Verifying System Integrity by Proxy. TRUST 2012: 179-200 - [c79]Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger:
STING: Finding Name Resolution Vulnerabilities in Programs. USENIX Security Symposium 2012: 585-599 - 2011
- [j11]Trent Jaeger, Paul C. van Oorschot
, Glenn Wurster:
Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification. Comput. Secur. 30(8): 571-579 (2011) - [j10]Joshua Schiffman, Thomas Moyer, Trent Jaeger, Patrick D. McDaniel:
Network-Based Root of Trust for Installation. IEEE Secur. Priv. 9(1): 40-48 (2011) - [j9]Divya Muthukumaran, Joshua Schiffman, Mohamed Hassan, Anuj Sawani, Vikhyath Rao, Trent Jaeger:
Protecting the integrity of trusted applications in mobile phone systems. Secur. Commun. Networks 4(6): 633-650 (2011) - [j8]Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas La Porta:
From mobile phones to responsible devices. Secur. Commun. Networks 4(6): 719-726 (2011) - [c78]Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger:
A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution. EC2ND 2011: 1-8 - [r1]Trent Jaeger:
Reference Monitor. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1038-1040 - 2010
- [j7]Trent Jaeger, Joshua Schiffman:
Outlook: Cloudy with a Chance of Security Challenges and Improvements. IEEE Secur. Priv. 8(1): 77-80 (2010) - [j6]Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel:
A logical specification and analysis for SELinux MLS policy. ACM Trans. Inf. Syst. Secur. 13(3): 26:1-26:31 (2010) - [c77]Joshua Schiffman, Thomas Moyer, Hayawardh Vijayakumar, Trent Jaeger, Patrick D. McDaniel:
Seeding clouds with trust anchors. CCSW 2010: 43-46 - [c76]Dave King, Susmit Jha
, Divya Muthukumaran, Trent Jaeger, Somesh Jha, Sanjit A. Seshia:
Automating Security Mediation Placement. ESOP 2010: 327-344 - [c75]Boniface Hicks, Sandra Julieta Rueda
, Dave King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick D. McDaniel, Trent Jaeger:
An architecture for enforcing end-to-end access control over web applications. SACMAT 2010: 163-172 - [c74]Divya Muthukumaran, Sandra Julieta Rueda
, Hayawardh Vijayakumar, Trent Jaeger:
Cut me some security. SafeConfig 2010: 75-78
2000 – 2009
- 2009
- [c73]Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, Patrick D. McDaniel:
Justifying Integrity Using a Virtual Machine Verifier. ACSAC 2009: 83-92 - [c72]Thomas Moyer, Kevin R. B. Butler
, Joshua Schiffman, Patrick D. McDaniel, Trent Jaeger:
Scalable Web Content Attestation. ACSAC 2009: 95-104 - [c71]Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas La Porta:
On cellular botnets: measuring the impact of malicious devices on a cellular network core. CCS 2009: 223-234 - [c70]Vikhyath Rao, Trent Jaeger:
Dynamic mandatory access control for multiple stakeholders. SACMAT 2009: 53-62 - [c69]Sandra Julieta Rueda
, Hayawardh Vijayakumar, Trent Jaeger:
Analysis of virtual machine system policies. SACMAT 2009: 227-236 - [c68]Liang Xie, Xinwen Zhang, Ashwin Chaugule, Trent Jaeger, Sencun Zhu:
Designing System-Level Defenses against Cellphone Malware. SRDS 2009: 83-90 - 2008
- [b2]Trent Jaeger:
Operating System Security. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2008, ISBN 978-3-031-01205-1 - [c67]Albert Tannous, Jonathan T. Trostle, Mohamed Hassan, Stephen E. McLaughlin, Trent Jaeger:
New Side Channels Targeted at Passwords. ACSAC 2008: 45-54 - [c66]William Enck, Patrick D. McDaniel, Trent Jaeger:
PinUP: Pinning User Files to Known Applications. ACSAC 2008: 55-64 - [c65]Sandra Julieta Rueda
, Yogesh Sreenivasan, Trent Jaeger:
Flexible security configuration for virtual machines. CSAW 2008: 35-44 - [c64]Dave King, Boniface Hicks, Michael Hicks
, Trent Jaeger:
Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. ICISS 2008: 56-70 - [c63]Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger:
Measuring integrity on mobile phone systems. SACMAT 2008: 155-164 - [c62]Dave King, Trent Jaeger, Somesh Jha, Sanjit A. Seshia:
Effective blame for information-flow violations. SIGSOFT FSE 2008: 250-260 - [c61]Sandra Julieta Rueda, Dave King, Trent Jaeger:
Verifying Compliance of Trusted Programs. USENIX Security Symposium 2008: 321-334 - [c60]Liang Xie, Hui Song, Trent Jaeger, Sencun Zhu:
A systematic approach for cell-phone worm containment. WWW 2008: 1083-1084 - [e6]Trent Jaeger:
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-300-6 [contents] - 2007
- [c59]Luke St. Clair, Joshua Schiffman, Trent Jaeger, Patrick D. McDaniel:
Establishing and Sustaining System Integrity via Root of Trust Installation. ACSAC 2007: 19-29 - [c58]William Enck, Sandra Julieta Rueda
, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel:
Protecting users from "themselves". CSAW 2007: 29-36 - [c57]Vinod Ganapathy, Dave King, Trent Jaeger, Somesh Jha:
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. ICSE 2007: 458-467 - [c56]Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan:
Managing the risk of covert information flows in virtual machine systems. SACMAT 2007: 81-90 - [c55]Boniface Hicks, Sandra Julieta Rueda
, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel:
A logical specification and analysis for SELinux MLS policy. SACMAT 2007: 91-100 - [c54]Boniface Hicks, Sandra Julieta Rueda, Trent Jaeger, Patrick D. McDaniel:
From Trusted to Secure: Building and Executing Applications That Enforce System Security. USENIX ATC 2007: 205-218 - 2006
- [c53]Jonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer:
Shamon: A System for Distributed Mandatory Access Control. ACSAC 2006: 23-32 - [c52]Luke St. Clair, Lisa Johansen, William Enck
, Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Trent Jaeger:
Password Exhaustion: Predicting the End of Password Usefulness. ICISS 2006: 37-55 - [c51]Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, Guillaume Marceau, Liangzhao Zeng:
The case for analysis preserving language transformation. ISSTA 2006: 191-202 - [c50]Umesh Shankar, Trent Jaeger, Reiner Sailer:
Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. NDSS 2006 - [c49]Trent Jaeger, Reiner Sailer, Umesh Shankar:
PRIMA: policy-reduced integrity measurement architecture. SACMAT 2006: 19-28 - [c48]Trent Jaeger, David H. King, Kevin R. B. Butler
, Serge Hallyn, Joy Latten, Xiaolan Zhang:
Leveraging IPsec for Mandatory Per-Packet Access Control. SecureComm 2006: 1-9 - [c47]Vinod Ganapathy, Trent Jaeger, Somesh Jha:
Retrofitting Legacy Code for Authorization Policy Enforcement. S&P 2006: 214-229 - [c46]Trent Jaeger, Patrick D. McDaniel, Luke St. Clair, Ramón Cáceres, Reiner Sailer:
Shame on Trust in Distributed Systems. HotSec 2006 - 2005
- [c45]Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramón Cáceres, Ronald Perez, Stefan Berger, John Linwood Griffin, Leendert van Doorn:
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. ACSAC 2005: 276-285 - [c44]Vinod Ganapathy, Trent Jaeger, Somesh Jha:
Automatic placement of authorization hooks in the linux security modules framework. CCS 2005: 330-339 - 2004
- [j5]Trent Jaeger, Antony Edwards, Xiaolan Zhang:
Consistency analysis of authorization hook placement in the Linux security modules framework. ACM Trans. Inf. Syst. Secur. 7(2): 175-205 (2004) - [c43]Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn:
Attestation-based policy enforcement for remote access. CCS 2004: 308-317 - [c42]Trent Jaeger, Reiner Sailer, Xiaolan Zhang:
Resolving constraint conflicts. SACMAT 2004: 105-114 - [c41]Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn:
Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium 2004: 223-238 - [e5]Trent Jaeger, Elena Ferrari:
9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings. ACM 2004, ISBN 1-58113-872-5 [contents] - 2003
- [j4]Trent Jaeger, Xiaolan Zhang, Antony Edwards:
Policy management using access control spaces. ACM Trans. Inf. Syst. Secur. 6(3): 327-364 (2003) - [c40]Trent Jaeger, Reiner Sailer, Xiaolan Zhang:
Analyzing Integrity Protection in the SELinux Example Policy. USENIX Security Symposium 2003 - [e4]Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger:
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003. ACM 2003, ISBN 1-58113-738-9 [contents] - 2002
- [c39]Antony Edwards, Trent Jaeger, Xiaolan Zhang:
Runtime verification of authorization hook placement for the linux security modules framework. CCS 2002: 225-234 - [c38]Trent Jaeger, Antony Edwards, Xiaolan Zhang:
Managing access control policies using access control spaces. SACMAT 2002: 3-12 - [c37]Dawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David A. Wagner:
Cool security trends. SACMAT 2002: 53 - [c36]Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi S. Sandhu:
Making access control more usable. SACMAT 2002: 141 - [c35]Trent Jaeger, Antony Edwards, Xiaolan Zhang:
Gaining and maintaining confidence in operating systems security. ACM SIGOPS European Workshop 2002: 201-204 - [c34]Xiaolan Zhang, Leendert van Doorn, Trent Jaeger, Ronald Perez, Reiner Sailer:
Secure coprocessor-based intrusion detection. ACM SIGOPS European Workshop 2002: 239-242 - [c33]Xiaolan Zhang, Antony Edwards, Trent Jaeger:
Using CQUAL for Static Analysis of Authorization Hook Placement. USENIX Security Symposium 2002: 33-48 - 2001
- [j3]Trent Jaeger, Jonathon Tidswell:
Practical safety in flexible access control models. ACM Trans. Inf. Syst. Secur. 4(2): 158-190 (2001) - [c32]Mohit Aron, Jochen Liedtke, Kevin Elphinstone, Yoonho Park, Trent Jaeger, Luke Deller:
The SawMill Framework for Virtual Memory Diversity. ACSAC 2001: 3-10 - [c31]Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr:
Panel: The next generation of acess control models (panel session): do we need them and what should they be? SACMAT 2001: 53 - [c30]Trent Jaeger:
Managing access control complexity using metrices. SACMAT 2001: 131-139 - [e3]Ravi S. Sandhu, Trent Jaeger:
6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001. ACM 2001, ISBN 1-58113-350-2 [contents] - 2000
- [c29]Jonathon Tidswell, Trent Jaeger:
An access control model for simplifying constraint expression. CCS 2000: 154-163 - [c28]Trent Jaeger, Jonathon Tidswell:
Rebuttal to the NIST RBAC model proposal. ACM Workshop on Role-Based Access Control 2000: 65-66 - [c27]Jonathon Tidswell, Trent Jaeger:
Integrated constraints and inheritance in DTAC. ACM Workshop on Role-Based Access Control 2000: 93-102 - [c26]Alain Gefflaut, Trent Jaeger, Yoonho Park, Jochen Liedtke, Kevin Elphinstone, Volkmar Uhlig, Jonathon Tidswell, Luke Deller, Lars Reuther:
The SawMill multiserver approach. ACM SIGOPS European Workshop 2000: 109-114 - [c25]Trent Jaeger, Jonathon Tidswell, Alain Gefflaut, Yoonho Park, Kevin Elphinstone, Jochen Liedtke:
Synchronous IPC over transparent monitors. ACM SIGOPS European Workshop 2000: 189-194
1990 – 1999
- 1999
- [j2]Trent Jaeger, Atul Prakash
, Jochen Liedtke, Nayeem Islam:
Flexible Control of Downloaded Executable Content. ACM Trans. Inf. Syst. Secur. 2(2): 177-228 (1999) - [c24]Trent Jaeger:
Access Control in Configurable Systems. Secure Internet Programming 1999: 289-316 - [c23]Jochen Liedtke, Volkmar Uhlig, Kevin Elphinstone, Trent Jaeger, Yoonho Park:
How To Schedule Unlimited Memory Pinning of Untrusted Processes Or Provisional Ideas about Service-Neutrality. Workshop on Hot Topics in Operating Systems 1999: 153-161 - [c22]Trent Jaeger, Kevin Elphinstone, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park:
Flexible Access Control using IPC Redirection. Workshop on Hot Topics in Operating Systems 1999: 191-196 - [c21]Trent Jaeger:
On the Increasing Importance of Constraints. ACM Workshop on Role-Based Access Control 1999: 33-42 - [c20]Trent Jaeger, Tony Michailidis, Roy Rada:
Access Control in a Virtual University. WETICE 1999: 135-140 - 1998
- [c19]Trent Jaeger, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park, Nayeem Islam:
Security architecture for component-based operating systems. ACM SIGOPS European Workshop 1998: 222-228 - [c18]Jochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, Yoonho Park:
An unconventional proposal: using the x86 architecture as the ubiquitous virtual standard architecture. ACM SIGOPS European Workshop 1998: 237-241 - [c17]Jochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, Yoonho Park:
Irreproducible benchmarks might be sometimes helpful. ACM SIGOPS European Workshop 1998: 242-246 - [c16]Jochen Liedtke, Vsevolod Panteleenko, Trent Jaeger, Nayeem Islam:
High-Performance Caching With The Lava Hit-Server. USENIX ATC 1998 - [c15]Trent Jaeger, Jochen Liedtke, Nayeem Islam:
Operating System Protection for Fine-Grained Programs. USENIX Security Symposium 1998 - [e2]Charles E. Youman, Trent Jaeger:
Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998. ACM 1998, ISBN 1-58113-113-5 [contents] - 1997
- [b1]Trent Jaeger:
Flexible control of downloaded executable content. University of Michigan, USA, 1997 - [j1]Nayeem Islam, Rangachari Anand, Trent Jaeger, Josyula R. Rao:
A Flexible Security System for Using Internet Content. IEEE Softw. 14(5): 52-59 (1997) - [c14]Jochen Liedtke, Kevin Elphinstone, Sebastian Schönberg, Hermann Härtig, Gernot Heiser, Nayeem Islam, Trent Jaeger:
Achieved IPC Performance. Workshop on Hot Topics in Operating Systems 1997: 28-31 - [c13]Jochen Liedtke, Nayeem Islam, Trent Jaeger:
Preventing Denial-of-Service Attacks on a µ-Kernel for WebOSes. Workshop on Hot Topics in Operating Systems 1997: 73-79 - [c12]Trent Jaeger, Frederique Giraud, Nayeem Islam, Jochen Liedtke:
A role-based access control model for protection domain derivation and management. ACM Workshop on Role-Based Access Control 1997: 95-106 - [c11]Rangachari Anand, Nayeem Islam, Trent Jaeger, Josyula R. Rao:
A Flexible Security Model for Using Internet Content. SRDS 1997: 89-96 - [e1]Charles E. Youman, Edward J. Coyne, Trent Jaeger:
Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997. ACM 1997, ISBN 0-89791-985-8 [contents] - 1996
- [c10]Jang Ho Lee, Atul Prakash
, Trent Jaeger, Gwobaw Wu:
Supporting Multi-User, Multi-Applet Workspaces in CBE. CSCW 1996: 344-353 - [c9]Trent Jaeger, Aviel D. Rubin:
Preserving Integrity in Remote File Location and Retrieval. NDSS 1996: 53-63 - [c8]Trent Jaeger, Atul Prakash
:
Building Systems That Flexibly Download Executable Content. USENIX Security Symposium 1996 - 1995
- [c7]Trent Jaeger, Atul Prakash
:
Implementation of a discretionary access control model for script-based systems. CSFW 1995: 70-84 - [c6]Trent Jaeger, Atul Prakash
:
Management and utilization of knowledge for the automatic improvement of workflow performance. COOCS 1995: 32-43 - [c5]Trent Jaeger, Atul Prakash
:
Requirements of role-based access control for collaborative systems. ACM Workshop on Role-Based Access Control 1995 - [c4]Trent Jaeger, Atul Prakash:
Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems. SEKE 1995: 103-105 - 1994
- [c3]Trent Jaeger, Atul Prakash
:
Support for the File System Security Requirements of Computational E-Mail Systems. CCS 1994: 1-9 - [c2]Trent Jaeger, Atul Prakash
, Masayuki Ishikawa:
A Framework for Automatic Improvement of Workflows to Meet Performance Goals. ICTAI 1994: 640-646 - 1993
- [c1]Trent Jaeger, Atul Prakash:
BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems. SEKE 1993: 191-198
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-29 22:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint