Author of the publication

Consistency analysis of authorization hook placement in the Linux security modules framework.

, , and . ACM Trans. Inf. Syst. Secur., 7 (2): 175-205 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HBench: Java: An application-specific benchmarking framework for Java Virtual Machines., and . Concurrency and Computation: Practice and Experience, 13 (8-9): 775-792 (2001)Automated Security Debugging Using Program Structural Constraints., , , and . ACSAC, page 453-462. IEEE Computer Society, (2007)Virtual Machine Images as Structured Data: The Mirage Image Library., , and . HotCloud, USENIX Association, (2011)Design and Implementation of a TCG-based Integrity Measurement Architecture., , , and . USENIX Security Symposium, page 223-238. USENIX, (2004)System Support for Automated Profiling and Optimization., , , , and . SOSP, page 15-26. ACM, (1997)Operating System Review 31(5).Corpus Linguistics for Establishing The Natural Language Content of Digital Library Documents., , and . DL, volume 916 of Lecture Notes in Computer Science, page 165-180. Springer, (1994)XenSocket: A High-Throughput Interdomain Transport for Virtual Machines., , , and . Middleware, volume 4834 of Lecture Notes in Computer Science, page 184-203. Springer, (2007)Trustworthy and personalized computing on public kiosks., , , , , and . MobiSys, page 199-210. ACM, (2008)EnCore: exploiting system environment and correlation information for misconfiguration detection., , , , , , and . ASPLOS, page 687-700. ACM, (2014)RC2 - A Living Lab for Cloud Computing., , , , , , , , , and 7 other author(s). LISA, USENIX Association, (2010)