Paul A. Karger

According to our database1, Paul A. Karger authored at least 35 papers between 1978 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Lessons Learned: Building the Caernarvon High-Assurance Operating System.
IEEE Secur. Priv., 2011

2010
Implementing a High-Assurance Smart-Card OS.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Designing a Side Channel Resistant Random Number Generator.
Proceedings of the Smart Card Research and Advanced Application, 2010

2009
Privacy is essential for secure mobile devices.
IBM J. Res. Dev., 2009

Securing virtual machine monitors: what is needed?
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
The Caernarvon secure embedded operating system.
ACM SIGOPS Oper. Syst. Rev., 2008

I/O for Virtual Machine Monitors: Security and Performance Issues.
IEEE Secur. Priv., 2008

The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

2007
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Performance and security lessons learned from virtualizing the alpha processor.
Proceedings of the 34th International Symposium on Computer Architecture (ISCA 2007), 2007

2006
Privacy and security threat analysis of the federal employee personal identity verification (PIV) program.
Proceedings of the 2nd Symposium on Usable Privacy and Security, 2006

Chicken & Egg: Dependencies in Security Testing and Compliance with Common Criteria Evaluations.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006

2005
A software flaw taxonomy: aiming tools at security.
ACM SIGSOFT Softw. Eng. Notes, 2005

Preventing Attacks on Machine Readable Travel Documents (MRTDs).
IACR Cryptol. ePrint Arch., 2005

Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control.
IACR Cryptol. ePrint Arch., 2005

Multi-Level Security Requirements for Hypervisors.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Increased Information Flow Needs for High-Assurance Composite Evaluations.
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), 2004

2003
The Importance of High Assurance Security in Pervasive Computing.
Proceedings of the Security in Pervasive Computing, 2003

Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
Proceedings of the Computer Security, 2003

2002
Verified Formal Security Models for Multiapplicative Smart Cards.
J. Comput. Secur., 2002

Thirty Years Later: Lessons from the Multics Security Evaluation.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2000
Verification of a Formal Security Model for Multiapplicative Smart Cards.
Proceedings of the Computer Security, 2000

1997
Two-phase cryptographic key recovery system.
Comput. Secur., 1997

1995
Security issues in a CDPD wireless network.
IEEE Wirel. Commun., 1995

1991
A Retrospective on the VAX VMM Security Kernel.
IEEE Trans. Software Eng., 1991

Storage Channels in Disk Arm Optimization.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

1990
A VMM Security Kernel for the VAX Architecture.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990

1989
New Methods for Immediate Revocation.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

Using Registers to Optimize Cross-Domain Call Performance.
Proceedings of the ASPLOS-III Proceedings, 1989

1988
Improving security and performance for capability systems.
PhD thesis, 1988

Implementing commercial data integrity with secure capabilities.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988

1987
Limiting the Damage Potential of Discretionary Trojan Horses.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

1986
Authentication and Discretionary Access Control in Computer Networks.
Comput. Networks, 1986

1984
An Augmented Capability Architecture to Support Lattice Security and Traceability of Access.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

1978
The Lattice Security Model In A Public Computing Network.
Proceedings of the Proceedings 1978 ACM Annual Conference, 1978


  Loading...