Trent Jaeger

Affiliations: 
Pennsylvania State University, State College, PA, United States 
Area:
Computer Science
Google:
"Trent Jaeger"

Parents

Sign in to add mentor
Atul Prakash grad student 1997 University of Michigan
 (Flexible Control of Downloaded Executable Content)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Skalka C, Darais D, Jaeger T, et al. (2020) Types and Abstract Interpretation for Authorization Hook Advice Cell Structure and Function. 139-152
Guan L, Cao C, Liu P, et al. (2019) Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM Ieee Transactions On Dependable and Secure Computing. 16: 438-453
Bates A, Tian D(, Hernandez G, et al. (2017) Taming the Costs of Trustworthy Provenance through Policy Reduction Acm Transactions On Internet Technology. 17: 34
Sun Y, Nanda S, Jaeger T. (2016) Security-as-a-service for microservices-based cloud applications Proceedings - Ieee 7th International Conference On Cloud Computing Technology and Science, Cloudcom 2015. 50-57
Muthukumaran D, Talele N, Jaeger T, et al. (2015) Producing hook placements to enforce expected access control policies Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8978: 178-195
Vijayakumar H, Jaeger T. (2013) The right files at the right time Automated Security Management. 119-133
Moyer T, Butler K, Schiffman J, et al. (2012) Scalable web content attestation Ieee Transactions On Computers. 61: 686-699
Traynor P, Amrutkar C, Rao V, et al. (2011) From mobile phones to responsible devices Security and Communication Networks. 4: 719-726
Muthukumaran D, Schiffman J, Hassan M, et al. (2011) Protecting the integrity of trusted applications in mobile phone systems Security and Communication Networks. 4: 633-650
Hicks B, Rueda S, Clair LS, et al. (2010) A logical specification and analysis for SELinux MLS policy Acm Transactions On Information and System Security. 13: 26
See more...