Trent Jaeger
Affiliations: | Pennsylvania State University, State College, PA, United States |
Area:
Computer ScienceGoogle:
"Trent Jaeger"Parents
Sign in to add mentorAtul Prakash | grad student | 1997 | University of Michigan | |
(Flexible Control of Downloaded Executable Content) |
Children
Sign in to add traineeSandra J. Rueda Rodriguez | grad student | 2011 | Penn State |
Hayawardh Vijayakumar | grad student | 2014 | Penn State |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Skalka C, Darais D, Jaeger T, et al. (2020) Types and Abstract Interpretation for Authorization Hook Advice Cell Structure and Function. 139-152 |
Guan L, Cao C, Liu P, et al. (2019) Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM Ieee Transactions On Dependable and Secure Computing. 16: 438-453 |
Bates A, Tian D(, Hernandez G, et al. (2017) Taming the Costs of Trustworthy Provenance through Policy Reduction Acm Transactions On Internet Technology. 17: 34 |
Sun Y, Nanda S, Jaeger T. (2016) Security-as-a-service for microservices-based cloud applications Proceedings - Ieee 7th International Conference On Cloud Computing Technology and Science, Cloudcom 2015. 50-57 |
Muthukumaran D, Talele N, Jaeger T, et al. (2015) Producing hook placements to enforce expected access control policies Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8978: 178-195 |
Vijayakumar H, Jaeger T. (2013) The right files at the right time Automated Security Management. 119-133 |
Moyer T, Butler K, Schiffman J, et al. (2012) Scalable web content attestation Ieee Transactions On Computers. 61: 686-699 |
Traynor P, Amrutkar C, Rao V, et al. (2011) From mobile phones to responsible devices Security and Communication Networks. 4: 719-726 |
Muthukumaran D, Schiffman J, Hassan M, et al. (2011) Protecting the integrity of trusted applications in mobile phone systems Security and Communication Networks. 4: 633-650 |
Hicks B, Rueda S, Clair LS, et al. (2010) A logical specification and analysis for SELinux MLS policy Acm Transactions On Information and System Security. 13: 26 |