Author of the publication

Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005

(Eds.) USENIX Association, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Principles of Policy in Secure Groups., , and . NDSS, The Internet Society, (2001)Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing., , , , , and . NDSS, The Internet Society, (2003)Composite Constant Propagation: Application to Android Inter-Component Communication Analysis., , , , and . ICSE (1), page 77-88. IEEE Computer Society, (2015)TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones., , , , , , and . OSDI, page 393-407. USENIX Association, (2010)Analysis of Communities of Interest in Data Networks., , , , , and . PAM, volume 3431 of Lecture Notes in Computer Science, page 83-96. Springer, (2005)From Languages to Systems: Understanding Practical Application Development in Security-typed Languages., , and . ACSAC, page 153-164. IEEE Computer Society, (2006)Towards a Secure and Efficient System for End-to-End Provenance., , , , , and . TaPP, USENIX Association, (2010)Semantically Rich Application-Centric Security in Android., , , and . ACSAC, page 340-349. IEEE Computer Society, (2009)Non-Invasive Methods for Host Certification., , , , and . SecureComm, page 1-10. IEEE, (2006)Methods and Limitations of Security Policy Reconciliation., and . IEEE Symposium on Security and Privacy, page 73-87. IEEE Computer Society, (2002)