Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Reiner Sailer
@article{DBLP:journals/ibmrd/RaoCPSSTW16, author = {Josyula R. Rao and Suresh Chari and Dimitrios E. Pendarakis and Reiner Sailer and Marc Ph. Stoecklin and Wilfried Teiken and Andreas Wespi}, title = {Security 360{\textdegree}: Enterprise security for the cognitive era}, journal = {{IBM} J. Res. Dev.}, volume = {60}, number = {4}, pages = {1}, year = {2016}, url = {https://doi.org/10.1147/JRD.2016.2556958}, doi = {10.1147/JRD.2016.2556958}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ibmrd/RaoCPSSTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ibmrd/StoecklinSKHCRC16, author = {Marc Ph. Stoecklin and Kapil Singh and Larry Koved and Xin Hu and Suresh N. Chari and Josyula R. Rao and Pau{-}Chen Cheng and Mihai Christodorescu and Reiner Sailer and Douglas Lee Schales}, title = {Passive security intelligence to analyze the security risks of mobile/BYOD activities}, journal = {{IBM} J. Res. Dev.}, volume = {60}, number = {4}, pages = {9}, year = {2016}, url = {https://doi.org/10.1147/JRD.2016.2569858}, doi = {10.1147/JRD.2016.2569858}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ibmrd/StoecklinSKHCRC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ibmrd/BergerCHPRSSS16, author = {Stefan Berger and Yangyi Chen and Xin Hu and Dimitrios E. Pendarakis and Josyula R. Rao and Reiner Sailer and Douglas Lee Schales and Marc Ph. Stoecklin}, title = {Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility}, journal = {{IBM} J. Res. Dev.}, volume = {60}, number = {4}, pages = {10}, year = {2016}, url = {https://doi.org/10.1147/JRD.2016.2571580}, doi = {10.1147/JRD.2016.2571580}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ibmrd/BergerCHPRSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/TaylorHWJSMS16, author = {Teryl Taylor and Xin Hu and Ting Wang and Jiyong Jang and Marc Ph. Stoecklin and Fabian Monrose and Reiner Sailer}, editor = {Elisa Bertino and Ravi S. Sandhu and Alexander Pretschner}, title = {Detecting Malicious Exploit Kits using Tree-based Similarity Searches}, booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March 9-11, 2016}, pages = {255--266}, publisher = {{ACM}}, year = {2016}, url = {https://dl.acm.org/citation.cfm?id=2857718}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/TaylorHWJSMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/SchalesHJSSW15, author = {Douglas Lee Schales and Xin Hu and Jiyong Jang and Reiner Sailer and Marc Ph. Stoecklin and Ting Wang}, editor = {Johannes Gehrke and Wolfgang Lehner and Kyuseok Shim and Sang Kyun Cha and Guy M. Lohman}, title = {{FCCE:} Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics}, booktitle = {31st {IEEE} International Conference on Data Engineering, {ICDE} 2015, Seoul, South Korea, April 13-17, 2015}, pages = {1316--1327}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICDE.2015.7113379}, doi = {10.1109/ICDE.2015.7113379}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/SchalesHJSSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HuWSSJS14, author = {Xin Hu and Ting Wang and Marc Ph. Stoecklin and Douglas Lee Schales and Jiyong Jang and Reiner Sailer}, title = {{MUSE:} asset risk scoring in enterprise network with mutually reinforced reputation propagation}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {17}, year = {2014}, url = {https://doi.org/10.1186/s13635-014-0017-1}, doi = {10.1186/S13635-014-0017-1}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HuWSSJS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/WangHMS14, author = {Ting Wang and Xin Hu and Shicong Meng and Reiner Sailer}, title = {Reconciling malware labeling discrepancy via consensus learning}, booktitle = {Workshops Proceedings of the 30th International Conference on Data Engineering Workshops, {ICDE} 2014, Chicago, IL, USA, March 31 - April 4, 2014}, pages = {84--89}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDEW.2014.6818308}, doi = {10.1109/ICDEW.2014.6818308}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/WangHMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/TangLWHSP14, author = {Yuzhe Richard Tang and Ling Liu and Ting Wang and Xin Hu and Reiner Sailer and Peter R. Pietzuch}, editor = {Isabel F. Cruz and Elena Ferrari and Yufei Tao and Elisa Bertino and Goce Trajcevski}, title = {Outsourcing multi-version key-value stores with verifiable data freshness}, booktitle = {{IEEE} 30th International Conference on Data Engineering, Chicago, {ICDE} 2014, IL, USA, March 31 - April 4, 2014}, pages = {1214--1217}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDE.2014.6816744}, doi = {10.1109/ICDE.2014.6816744}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/TangLWHSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/SchalesCHJRSSVW14, author = {Douglas Lee Schales and Mihai Christodorescu and Xin Hu and Jiyong Jang and Josyula R. Rao and Reiner Sailer and Marc Ph. Stoecklin and Wietse Z. Venema and Ting Wang}, editor = {James Joshi and Elisa Bertino and Bhavani Thuraisingham and Ling Liu}, title = {Stream computing for large-scale, multi-channel cyber threat analytics}, booktitle = {Proceedings of the 15th {IEEE} International Conference on Information Reuse and Integration, {IRI} 2014, Redwood City, CA, USA, August 13-15, 2014}, pages = {8--15}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IRI.2014.7051865}, doi = {10.1109/IRI.2014.7051865}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/SchalesCHJRSSVW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdm/WangWSS14, author = {Ting Wang and Fei Wang and Reiner Sailer and Douglas Lee Schales}, editor = {Mohammed Javeed Zaki and Zoran Obradovic and Pang{-}Ning Tan and Arindam Banerjee and Chandrika Kamath and Srinivasan Parthasarathy}, title = {Kaleido: Network Traffic Attribution using Multifaceted Footprinting}, booktitle = {Proceedings of the 2014 {SIAM} International Conference on Data Mining, Philadelphia, Pennsylvania, USA, April 24-26, 2014}, pages = {695--703}, publisher = {{SIAM}}, year = {2014}, url = {https://doi.org/10.1137/1.9781611973440.80}, doi = {10.1137/1.9781611973440.80}, timestamp = {Fri, 06 Oct 2023 11:45:43 +0200}, biburl = {https://dblp.org/rec/conf/sdm/WangWSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HuWSSJS14, author = {Xin Hu and Ting Wang and Marc Ph. Stoecklin and Douglas Lee Schales and Jiyong Jang and Reiner Sailer}, title = {Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation}, booktitle = {35. {IEEE} Security and Privacy Workshops, {SPW} 2014, San Jose, CA, USA, May 17-18, 2014}, pages = {61--64}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SPW.2014.18}, doi = {10.1109/SPW.2014.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/HuWSSJS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/JhaFCSY13, author = {Somesh Jha and Matthew Fredrikson and Mihai Christodorescu and Reiner Sailer and Xifeng Yan}, title = {Synthesizing near-optimal malware specifications from suspicious behaviors}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {41--50}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703684}, doi = {10.1109/MALWARE.2013.6703684}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/JhaFCSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PaxsonCJRSSSTVW13, author = {Vern Paxson and Mihai Christodorescu and Mobin Javed and Josyula R. Rao and Reiner Sailer and Douglas Lee Schales and Marc Ph. Stoecklin and Kurt Thomas and Wietse Z. Venema and Nicholas Weaver}, editor = {Samuel T. King}, title = {Practical Comprehensive Bounds on Surreptitious Communication over {DNS}}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {17--32}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/paxson}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/PaxsonCJRSSSTVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/GuWPAS11, author = {Yuan Xiang Gu and Brecht Wyseur and Bart Preneel and Jean{-}Daniel Aussel and Reiner Sailer}, title = {Point/Counterpoint}, journal = {{IEEE} Softw.}, volume = {28}, number = {2}, pages = {56--59}, year = {2011}, url = {https://doi.org/10.1109/MS.2011.39}, doi = {10.1109/MS.2011.39}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/GuWPAS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoldmanSPS10, author = {Kenneth A. Goldman and Reiner Sailer and Dimitrios E. Pendarakis and Deepa Srinivasan}, editor = {Shouhuai Xu and N. Asokan and Ahmad{-}Reza Sadeghi}, title = {Scalable integrity monitoring in virtualized environments}, booktitle = {Proceedings of the fifth {ACM} workshop on Scalable trusted computing, STC@CCS 2010, Chicago, IL, USA, October 4, 2010}, pages = {73--78}, publisher = {{ACM}}, year = {2010}, url = {http://dl.acm.org/citation.cfm?id=1867647}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GoldmanSPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FredriksonJCSY10, author = {Matt Fredrikson and Somesh Jha and Mihai Christodorescu and Reiner Sailer and Xifeng Yan}, title = {Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {45--60}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.11}, doi = {10.1109/SP.2010.11}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/FredriksonJCSY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ibmrd/BergerCGPPRRSSSTV09, author = {Stefan Berger and Ram{\'{o}}n C{\'{a}}ceres and Kenneth A. Goldman and Dimitrios E. Pendarakis and Ronald Perez and Josyula R. Rao and Eran Rom and Reiner Sailer and Wayne Schildhauer and Deepa Srinivasan and Sivan Tal and Enriquillo Valdez}, title = {Security for the cloud infrastructure: Trusted virtual data center implementation}, journal = {{IBM} J. Res. Dev.}, volume = {53}, number = {4}, pages = {6}, year = {2009}, url = {https://doi.org/10.1147/JRD.2009.5429060}, doi = {10.1147/JRD.2009.5429060}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ibmrd/BergerCGPPRRSSSTV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChristodorescuSSSZ09, author = {Mihai Christodorescu and Reiner Sailer and Douglas Lee Schales and Daniele Sgandurra and Diego Zamboni}, editor = {Radu Sion and Dawn Song}, title = {Cloud security is not (just) virtualization security: a short paper}, booktitle = {Proceedings of the first {ACM} Cloud Computing Security Workshop, {CCSW} 2009, Chicago, IL, USA, November 13, 2009}, pages = {97--102}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655008.1655022}, doi = {10.1145/1655008.1655022}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChristodorescuSSSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PerezDS08, author = {Ronald Perez and Leendert van Doorn and Reiner Sailer}, title = {Virtualization and Hardware-Based Security}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {5}, pages = {24--31}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.135}, doi = {10.1109/MSP.2008.135}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PerezDS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/BergerCPSVPSS08, author = {Stefan Berger and Ram{\'{o}}n C{\'{a}}ceres and Dimitrios E. Pendarakis and Reiner Sailer and Enriquillo Valdez and Ronald Perez and Wayne Schildhauer and Deepa Srinivasan}, title = {TVDc: managing security in the trusted virtual datacenter}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {42}, number = {1}, pages = {40--47}, year = {2008}, url = {https://doi.org/10.1145/1341312.1341321}, doi = {10.1145/1341312.1341321}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/BergerCPSVPSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/GarrissCBSDZ08, author = {Scott Garriss and Ram{\'{o}}n C{\'{a}}ceres and Stefan Berger and Reiner Sailer and Leendert van Doorn and Xiaolan Zhang}, editor = {Dirk Grunwald and Richard Han and Eyal de Lara and Carla Schlatter Ellis}, title = {Trustworthy and personalized computing on public kiosks}, booktitle = {Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys 2008), Breckenridge, CO, USA, June 17-20, 2008}, pages = {199--210}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1378600.1378623}, doi = {10.1145/1378600.1378623}, timestamp = {Fri, 17 Feb 2023 15:44:59 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/GarrissCBSDZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/PayneSCPL07, author = {Bryan D. Payne and Reiner Sailer and Ram{\'{o}}n C{\'{a}}ceres and Ronald Perez and Wenke Lee}, title = {A layered approach to simplified access control in virtualized systems}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {41}, number = {4}, pages = {12--19}, year = {2007}, url = {https://doi.org/10.1145/1278901.1278905}, doi = {10.1145/1278901.1278905}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/PayneSCPL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ValdezSP07, author = {Enriquillo Valdez and Reiner Sailer and Ronald Perez}, title = {Retrofitting the {IBM} {POWER} Hypervisor to Support Mandatory Access Control}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {221--231}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.43}, doi = {10.1109/ACSAC.2007.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ValdezSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/JaegerSS07, author = {Trent Jaeger and Reiner Sailer and Yogesh Sreenivasan}, editor = {Volkmar Lotz and Bhavani Thuraisingham}, title = {Managing the risk of covert information flows in virtual machine systems}, booktitle = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings}, pages = {81--90}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1266840.1266853}, doi = {10.1145/1266840.1266853}, timestamp = {Wed, 29 Jun 2022 15:37:42 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/JaegerSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/GarrissSBSDZ07, author = {Scott Garriss and Rom{\'{o}} Sailer and Stefan Berger and Reiner Sailer and Leendert van Doorn and Xiaolan Zhang}, editor = {Eyal de Lara and Nina Bhatti}, title = {Towards Trustworthy Kiosk Computing}, booktitle = {Eighth {IEEE} Workshop on Mobile Computing Systems and Applications, HotMobile 2007, Tucson, Arizona, USA, March 8-9, 2007}, pages = {41--45}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HotMobile.2007.14}, doi = {10.1109/HOTMOBILE.2007.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wmcsa/GarrissSBSDZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McCuneJBCS06, author = {Jonathan M. McCune and Trent Jaeger and Stefan Berger and Ram{\'{o}}n C{\'{a}}ceres and Reiner Sailer}, title = {Shamon: {A} System for Distributed Mandatory Access Control}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {23--32}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.47}, doi = {10.1109/ACSAC.2006.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/McCuneJBCS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoldmanPS06, author = {Kenneth A. Goldman and Ronald Perez and Reiner Sailer}, editor = {Ari Juels and Gene Tsudik and Shouhuai Xu and Moti Yung}, title = {Linking remote attestation to secure tunnel endpoints}, booktitle = {Proceedings of the 1st {ACM} Workshop on Scalable Trusted Computing, {STC} 2006, Alexandria, VA, USA, November 3, 2006}, pages = {21--24}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179474.1179481}, doi = {10.1145/1179474.1179481}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GoldmanPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ShankarJS06, author = {Umesh Shankar and Trent Jaeger and Reiner Sailer}, title = {Toward Automated Information-Flow Integrity Verification for Security-Critical Applications}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2006, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2006}, url = {https://www.ndss-symposium.org/ndss2006/toward-automated-information-flow-integrity-verification-security-critical-applications/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ShankarJS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/JaegerSS06, author = {Trent Jaeger and Reiner Sailer and Umesh Shankar}, editor = {David F. Ferraiolo and Indrakshi Ray}, title = {{PRIMA:} policy-reduced integrity measurement architecture}, booktitle = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings}, pages = {19--28}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1133058.1133063}, doi = {10.1145/1133058.1133063}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/JaegerSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BergerCGPSD06, author = {Stefan Berger and Ram{\'{o}}n C{\'{a}}ceres and Kenneth A. Goldman and Ronald Perez and Reiner Sailer and Leendert van Doorn}, editor = {Angelos D. Keromytis}, title = {vTPM: Virtualizing the Trusted Platform Module}, booktitle = {Proceedings of the 15th {USENIX} Security Symposium, Vancouver, BC, Canada, July 31 - August 4, 2006}, publisher = {{USENIX} Association}, year = {2006}, url = {https://www.usenix.org/conference/15th-usenix-security-symposium/vtpm-virtualizing-trusted-platform-module}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/BergerCGPSD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JaegerMCCS06, author = {Trent Jaeger and Patrick D. McDaniel and Luke St. Clair and Ram{\'{o}}n C{\'{a}}ceres and Reiner Sailer}, title = {Shame on Trust in Distributed Systems}, booktitle = {1st {USENIX} Workshop on Hot Topics in Security, HotSec'06, Vancouver, BC, Canada, July 31, 2006}, publisher = {{USENIX} Association}, year = {2006}, url = {https://www.usenix.org/conference/hotsec-06/shame-trust-distributed-systems}, timestamp = {Mon, 01 Feb 2021 08:43:09 +0100}, biburl = {https://dblp.org/rec/conf/uss/JaegerMCCS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SailerJVCPBGD05, author = {Reiner Sailer and Trent Jaeger and Enriquillo Valdez and Ram{\'{o}}n C{\'{a}}ceres and Ronald Perez and Stefan Berger and John Linwood Griffin and Leendert van Doorn}, title = {Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {276--285}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.13}, doi = {10.1109/CSAC.2005.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SailerJVCPBGD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SailerJZD04, author = {Reiner Sailer and Trent Jaeger and Xiaolan Zhang and Leendert van Doorn}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {Attestation-based policy enforcement for remote access}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {308--317}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030125}, doi = {10.1145/1030083.1030125}, timestamp = {Fri, 13 Nov 2020 16:10:44 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SailerJZD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/SailerG04, author = {Reiner Sailer and James Giles}, title = {Pervasive Authentication Domains for Automatic Pervasive Device Authorization}, booktitle = {2nd {IEEE} Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, {USA}}, pages = {144--148}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/PERCOMW.2004.1276921}, doi = {10.1109/PERCOMW.2004.1276921}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/SailerG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/JaegerSZ04, author = {Trent Jaeger and Reiner Sailer and Xiaolan Zhang}, editor = {Trent Jaeger and Elena Ferrari}, title = {Resolving constraint conflicts}, booktitle = {9th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings}, pages = {105--114}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/990036.990053}, doi = {10.1145/990036.990053}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/JaegerSZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SailerZJD04, author = {Reiner Sailer and Xiaolan Zhang and Trent Jaeger and Leendert van Doorn}, editor = {Matt Blaze}, title = {Design and Implementation of a TCG-based Integrity Measurement Architecture}, booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13, 2004, San Diego, CA, {USA}}, pages = {223--238}, publisher = {{USENIX}}, year = {2004}, url = {http://www.usenix.org/publications/library/proceedings/sec04/tech/sailer.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SailerZJD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JaegerSZ03, author = {Trent Jaeger and Reiner Sailer and Xiaolan Zhang}, title = {Analyzing Integrity Protection in the SELinux Example Policy}, booktitle = {Proceedings of the 12th {USENIX} Security Symposium, Washington, D.C., USA, August 4-8, 2003}, publisher = {{USENIX} Association}, year = {2003}, url = {https://www.usenix.org/conference/12th-usenix-security-symposium/analyzing-integrity-protection-selinux-example-policy}, timestamp = {Mon, 01 Feb 2021 08:43:16 +0100}, biburl = {https://dblp.org/rec/conf/uss/JaegerSZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GilesSVC02, author = {James Giles and Reiner Sailer and Dinesh C. Verma and Suresh Chari}, editor = {Dieter Gollmann and G{\"{u}}nter Karjoth and Michael Waidner}, title = {Authentication for Distributed Web Caches}, booktitle = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2502}, pages = {126--145}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45853-0\_8}, doi = {10.1007/3-540-45853-0\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GilesSVC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigopsE/ZhangDJPS02, author = {Xiaolan Zhang and Leendert van Doorn and Trent Jaeger and Ronald Perez and Reiner Sailer}, editor = {Gilles Muller and Eric Jul}, title = {Secure coprocessor-based intrusion detection}, booktitle = {Proceedings of the 10th {ACM} {SIGOPS} European Workshop, Saint-Emilion, France, July 1, 2002}, pages = {239--242}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/1133373.1133423}, doi = {10.1145/1133373.1133423}, timestamp = {Thu, 07 Nov 2019 10:24:25 +0100}, biburl = {https://dblp.org/rec/conf/sigopsE/ZhangDJPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DyerLPSDSW01, author = {Joan G. Dyer and Mark Lindemann and Ronald Perez and Reiner Sailer and Leendert van Doorn and Sean W. Smith and Steve H. Weingart}, title = {Building the {IBM} 4758 Secure Coprocessor}, journal = {Computer}, volume = {34}, number = {10}, pages = {57--66}, year = {2001}, url = {https://doi.org/10.1109/2.955100}, doi = {10.1109/2.955100}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DyerLPSDSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kivs/KabatnikS01, author = {Matthias Kabatnik and Reiner Sailer}, editor = {Ulrich Killat and Winfried Lamersdorf}, title = {Verteiltes Filtern mit Contags und Sicherheits-Labeln}, booktitle = {Kommunikation in Verteilten Systemen (KiVS), 12. Fachkonferenz der Gesellschaft f{\"{u}}r Informatik {(GI)} Fachgruppe "Kommunikation und verteilte Systeme" (KuVS) unter Beteiligung des VDE/ITG, Hamburg, 20.-23. Februar 2001}, series = {Informatik Aktuell}, pages = {93--102}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-3-642-56675-2\_8}, doi = {10.1007/978-3-642-56675-2\_8}, timestamp = {Sun, 14 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kivs/KabatnikS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/SailerABJV01, author = {Reiner Sailer and Arup Acharya and Mandis Beigi and Raymond B. Jennings III and Dinesh C. Verma}, editor = {Mark Burgess}, title = {IPSECvalidate: {A} Tool to Validate {IPSEC} Configurations}, booktitle = {Proceedings of the 15th Conference on Systems Administration {(LISA} 2001), San Diego, California, USA, December 2-7, 2001}, pages = {19--24}, publisher = {{USENIX}}, year = {2001}, url = {http://www.usenix.org/publications/library/proceedings/lisa2001/tech/sailer.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/SailerABJV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SailerK00, author = {Reiner Sailer and Matthias Kabatnik}, title = {History-based Distributed Filtering - {A} Tagging Approach to Network-Level Access Control}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {373}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898892}, doi = {10.1109/ACSAC.2000.898892}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SailerK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Sailer98, author = {Reiner Sailer}, title = {Security Services in an Open Service Environment}, booktitle = {14th Annual Computer Security Applications Conference {(ACSAC} 1998), 7-11 December 1998, Scottsdale, AZ, {USA}}, pages = {223--234}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSAC.1998.738624}, doi = {10.1109/CSAC.1998.738624}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Sailer98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/Sailer98, author = {Reiner Sailer}, title = {An Evolutionary Approach to Multilaterally Secure Services in {ISDN} / {IN}}, booktitle = {Proceedings of the International Conference On Computer Communications and Networks {(ICCCN} 1998), October 12-15, 1998, Lafayette, Louisiana, {USA}}, pages = {276--283}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ICCCN.1998.998787}, doi = {10.1109/ICCCN.1998.998787}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/Sailer98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kivs/Sailer97, author = {Reiner Sailer}, editor = {Martina Zitterbart}, title = {Authentikation als Grundlage der Skalierung von Sicherheit in der Kommunikationstechnik}, booktitle = {Kommunikation in Verteilten Systemen, GI/ITG-Fachtagung, Braunschweig 19.-21. Februar 1997}, series = {Informatik Aktuell}, pages = {62--76}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/978-3-642-60729-5\_5}, doi = {10.1007/978-3-642-60729-5\_5}, timestamp = {Tue, 23 May 2017 01:06:28 +0200}, biburl = {https://dblp.org/rec/conf/kivs/Sailer97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/SailerK96, author = {Reiner Sailer and Paul J. K{\"{u}}hn}, title = {Ein Domain-Konzept zur systematischen und wirtschaftlichen Integration von Sicherheit in Kommunikationsnetze}, journal = {Informationstechnik Tech. Inform.}, volume = {38}, number = {4}, pages = {30--33}, year = {1996}, url = {https://doi.org/10.1524/itit.1996.38.4.30}, doi = {10.1524/ITIT.1996.38.4.30}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/SailerK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.