Hayawardh Vijayakumar, Ph.D.
Affiliations: | 2014 | Computer Science and Engineering | Pennsylvania State University, State College, PA, United States |
Area:
Computer Science, Computer EngineeringGoogle:
"Hayawardh Vijayakumar"Parents
Sign in to add mentorTrent Jaeger | grad student | 2014 | Penn State | |
(Protecting programs during resource access.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Jaeger T, Ge X, Muthukumaran D, et al. (2015) Designing for attack surfaces: Keep your friends close, but your enemies closer Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9354: 55-74 |
Vijayakumar H, Ge X, Jaeger T. (2014) Policy models to protect resource retrieval Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 211-222 |
Vijayakumar H, Schiffman J, Jaeger T. (2013) Process firewalls: Protecting processes during resource access Proceedings of the 8th Acm European Conference On Computer Systems, Eurosys 2013. 57-70 |
Muthukumaran D, Rueda S, Talele N, et al. (2012) Transforming commodity security policies to enforce Clark-Wilson integrity Acm International Conference Proceeding Series. 269-278 |
Vijayakumar H, Jakka G, Rueda S, et al. (2012) Integrity walls: Finding attack surfaces from mandatory access control policies Asiaccs 2012 - 7th Acm Symposium On Information, Computer and Communications Security. 75-76 |
Vijayakumar H, Schiffman J, Jaeger T. (2012) A rose by any other name or an insane root? Adventures in name resolution Proceedings - 2011 7th European Conference On Computer Network Defense, Ec2nd 2011. 1-8 |
Muthukumaran D, Rueda S, Vijayakumar H, et al. (2010) Cut me some security! Proceedings of the Acm Conference On Computer and Communications Security. 75-78 |
Rueda S, Vijayakumar H, Jaeger T. (2009) Analysis of virtual machine system policies Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 227-236 |