Author of the publication

Consistency analysis of authorization hook placement in the Linux security modules framework.

, , and . ACM Trans. Inf. Syst. Secur., 7 (2): 175-205 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Jaeger, Trent
add a person with the name Jaeger, Trent
 

Other publications of authors with the same name

Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems., and . SEKE, page 103-105. Knowledge Systems Institute, (1995)Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor., , , , , , , and . ACSAC, page 276-285. IEEE Computer Society, (2005)Lessons from VAX/SVS for High-Assurance VM Systems., , and . IEEE Security & Privacy, 10 (6): 26-35 (2012)Outlook: Cloudy with a Chance of Security Challenges and Improvements., and . IEEE Security & Privacy, 8 (1): 77-80 (2010)Security-as-a-Service for Microservices-Based Cloud Applications., , and . CloudCom, page 50-57. IEEE Computer Society, (2015)Scalable Integrity-Guaranteed AJAX., , and . APWeb, volume 7235 of Lecture Notes in Computer Science, page 1-19. Springer, (2012)Security and Science of Agility., , , , , , , , , and 1 other author(s). MTD@CCS, page 13-19. ACM, (2014)Consistency analysis of authorization hook placement in the Linux security modules framework., , and . ACM Trans. Inf. Syst. Secur., 7 (2): 175-205 (2004)Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture., , and . CoRR, (2014)Directed Multicut with linearly ordered terminals., , , and . CoRR, (2014)