Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card., , , , , and . ESORICS, volume 2808 of Lecture Notes in Computer Science, page 181-200. Springer, (2003)The Lattice Security Model In A Public Computing Network.. ACM Annual Conference (1), page 453-459. ACM, (1978)Performance and security lessons learned from virtualizing the alpha processor.. ISCA, page 392-401. ACM, (2007)An Augmented Capability Architecture to Support Lattice Security and Traceability of Access., and . S&P, page 2-12. IEEE Computer Society, (1984)Storage Channels in Disk Arm Optimization., and . S&P, page 52-63. IEEE Computer Society, (1991)A VMM Security Kernel for the VAX Architecture., , , , and . S&P, page 2-19. IEEE Computer Society, (1990)New Methods for Immediate Revocation.. S&P, page 48-55. IEEE Computer Society, (1989)Increased Information Flow Needs for High-Assurance Composite Evaluations., and . IWIA, page 129-140. IEEE Computer Society, (2004)The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System., , , , , , and . ISSRE, page 229-238. IEEE Computer Society, (2008)The Caernarvon secure embedded operating system., , , , and . ACM SIGOPS Oper. Syst. Rev., 42 (1): 32-39 (2008)