Hayawardh Vijayakumar, Ph.D.

Affiliations: 
2014 Computer Science and Engineering Pennsylvania State University, State College, PA, United States 
Area:
Computer Science, Computer Engineering
Google:
"Hayawardh Vijayakumar"

Parents

Sign in to add mentor
Trent Jaeger grad student 2014 Penn State
 (Protecting programs during resource access.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Jaeger T, Ge X, Muthukumaran D, et al. (2015) Designing for attack surfaces: Keep your friends close, but your enemies closer Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9354: 55-74
Vijayakumar H, Ge X, Jaeger T. (2014) Policy models to protect resource retrieval Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 211-222
Vijayakumar H, Schiffman J, Jaeger T. (2013) Process firewalls: Protecting processes during resource access Proceedings of the 8th Acm European Conference On Computer Systems, Eurosys 2013. 57-70
Muthukumaran D, Rueda S, Talele N, et al. (2012) Transforming commodity security policies to enforce Clark-Wilson integrity Acm International Conference Proceeding Series. 269-278
Vijayakumar H, Jakka G, Rueda S, et al. (2012) Integrity walls: Finding attack surfaces from mandatory access control policies Asiaccs 2012 - 7th Acm Symposium On Information, Computer and Communications Security. 75-76
Vijayakumar H, Schiffman J, Jaeger T. (2012) A rose by any other name or an insane root? Adventures in name resolution Proceedings - 2011 7th European Conference On Computer Network Defense, Ec2nd 2011. 1-8
Muthukumaran D, Rueda S, Vijayakumar H, et al. (2010) Cut me some security! Proceedings of the Acm Conference On Computer and Communications Security. 75-78
Rueda S, Vijayakumar H, Jaeger T. (2009) Analysis of virtual machine system policies Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 227-236
See more...