Author of the publication

Toward Quality of Security Service in a Resource Management System Benefit Function.

, and . Heterogeneous Computing Workshop, page 133-139. IEEE Computer Society, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Active Learning with the CyberCIEGE Video Game., and . CSET, USENIX Association, (2011)Architecture for an embedded secure data base management system., , and . ACSAC, page 125-136. IEEE, (1990)A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach., and . International Information Security Workshops, volume 148 of IFIP, page 173-180. Kluwer, (2004)Trusted Hardware: Can It Be Trustworthy?, and . DAC, page 1-4. IEEE, (2007)The Value of Capture-the-Flag Exercises in Education: An Interview with Chris Eagle.. IEEE Secur. Priv., 9 (6): 58-60 (2011)MYSEA: the monterey security architecture., , , , , , , and . STC, page 39-48. ACM, (2009)A security architecture for transient trust., , , and . CSAW, page 1-8. ACM, (2008)ODSS: A Ghidra-based Static Analysis Tool for Detecting Stack-Based Buffer Overflows., , and . HICSS, page 6726-6735. ScholarSpace, (2023)Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores., , , and . ESSoS, volume 8978 of Lecture Notes in Computer Science, page 86-101. Springer, (2015)Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture., , , , , , , and . TRUST, volume 5471 of Lecture Notes in Computer Science, page 133-152. Springer, (2009)