Author of the publication

A template for rapid prototyping of operating systems.

, , and . RSP, page 119-127. IEEE Computer Society, (1990)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joining the Security Education Community., and . IEEE Secur. Priv., 2 (5): 61-63 (2004)Cognitive task analysis of network analysts and managers for network situational awareness., , , , and . VDA, volume 7530 of SPIE Proceedings, page 75300. SPIE, (2010)DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems., , , , and . DPM/SETOP, volume 6514 of Lecture Notes in Computer Science, page 188-202. Springer, (2010)Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities., , , and . SECRYPT, page 546-553. INSTICC Press, (2008)Analysis of an Algorithm for Distributed Recognition and Accountability., , , , , , and . ACM Conference on Computer and Communications Security, page 154-164. ACM, (1993)The Policy Machine for Security Policy Management., , and . International Conference on Computational Science (2), volume 2074 of Lecture Notes in Computer Science, page 494-506. Springer, (2001)Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory., and . ACM Southeast Regional Conference (2), page 142-147. ACM, (2005)1-59593-059-0.Who Owns Your Computer?, and . IEEE Secur. Priv., 4 (2): 61-63 (2006)Configurable Middleware-Level Intrusion Detection for Embedded Systems., , , and . ICDCS Workshops, page 144-151. IEEE Computer Society, (2005)Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks., , , , , and . HCI (16), volume 5638 of Lecture Notes in Computer Science, page 138-147. Springer, (2009)