Publications
Export 31 results:
Author Title Type [ Year] Filters: Keyword is security of data [Clear All Filters]
1997. A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.
1998. Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
1998. A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.
2001. A trend analysis of exploitations. 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings. :214-229.
2002. P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
2003. The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
2003. A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
2006. Managing policy updates in security-typed languages. 19th IEEE Computer Security Foundations Workshop, 2006. :13pp.-216-13pp.-216.
2006. A Software Architectural Approach to Security by Design. Computer Software and Applications Conference, 2006. COMPSAC '06. 30th Annual International. 2:83-86.
2008. Fable: A Language for Enforcing User-defined Security Policies. IEEE Symposium on Security and Privacy, 2008. SP 2008. :369-383.
2009. Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities. Security Privacy, IEEE. 7(1):42-48.