Chris I. Dalton

According to our database1, Chris I. Dalton authored at least 16 papers between 1997 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Survivor: a fine-grained intrusion response and recovery approach for commodity operating systems.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2017
Generalize or Die: Operating Systems Support for Memristor-Based Accelerators.
Proceedings of the IEEE International Conference on Rebooting Computing, 2017

Separating Translation from Protection in Address Spaces with Dynamic Remapping.
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017

2015
Towards trusted software-defined networks using a hardware-based Integrity Measurement Architecture.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

2014
Forensic Virtual Machines: Dynamic Defence in the Cloud via Introspection.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2012
A Framework for Detecting Malware in Cloud by Identifying Symptoms.
Proceedings of the 16th IEEE International Enterprise Distributed Object Computing Conference, 2012

2010
Towards automated security policy enforcement in multi-tenant virtual data centers.
J. Comput. Secur., 2010

Separating hypervisor trusted computing base supported by hardware.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010

2009
Trusted virtual platforms: a key enabler for converged client devices.
ACM SIGOPS Oper. Syst. Rev., 2009

LaLa: a late launch application.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

2007
Towards automated provisioning of secure virtualized networks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2004
SoftUDC: A Software-Based Data Center for Utility Computing.
Computer, 2004

2003
Dynamic label binding at run-time.
Proceedings of the New Security Paradigms Workshop 2003, 2003

2002
Design of Secure Unix.
Inf. Secur. Tech. Rep., 2002

2001
An operating system approach to securing e-services.
Commun. ACM, 2001

1997
Applying military grade security to the Internet.
Comput. Networks ISDN Syst., 1997


  Loading...