Author of the publication

Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor.

, , , , , , , and . ACSAC, page 276-285. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN.. ICCCN, page 276-283. IEEE Computer Society, (1998)Analyzing Integrity Protection in the SELinux Example Policy., , and . USENIX Security Symposium, USENIX Association, (2003)vTPM: Virtualizing the Trusted Platform Module., , , , , and . USENIX Security Symposium, USENIX Association, (2006)IPSECvalidate: A Tool to Validate IPSEC Configurations., , , , and . LISA, page 19-24. USENIX, (2001)Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control., , and . ACSAC, page 221-231. IEEE Computer Society, (2007)Synthesizing near-optimal malware specifications from suspicious behaviors., , , , and . MALWARE, page 41-50. IEEE Computer Society, (2013)TVDc: managing security in the trusted virtual datacenter., , , , , , , and . Operating Systems Review, 42 (1): 40-47 (2008)Resolving constraint conflicts., , and . SACMAT, page 105-114. ACM, (2004)Authentication for Distributed Web Caches., , , and . ESORICS, volume 2502 of Lecture Notes in Computer Science, page 126-145. Springer, (2002)Detecting Malicious Exploit Kits using Tree-based Similarity Searches., , , , , , and . CODASPY, page 255-266. ACM, (2016)