Steve J. Chapin

According to our database1, Steve J. Chapin authored at least 51 papers between 1989 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2013
Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies.
ACM Trans. Inf. Syst. Secur., 2013

2012
Reducing Latency and Network Load Using Location-Aware Memcache Architectures.
Proceedings of the Web Information Systems and Technologies - 8th International Conference, 2012

Exploring Non-typical Memcache Architectures for Decreased Latency and Distributed Network Usage.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

2011
Towards a Guaranteed (X)HTML Compliant Dynamic Web Application.
Proceedings of the Web Information Systems and Technologies - 7th International Conference, 2011

Guaranteeing Strong (X)HTML Compliance for Dynamic Web Applications.
Proceedings of the WEBIST 2011, 2011

Position paper: why are there so many vulnerabilities in web applications?
Proceedings of the 2011 New Security Paradigms Workshop, 2011

Automatic error finding in access-control policies.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
ESCUDO: A Fine-Grained Protection Model for Web Browsers.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Enforcing Request Integrity in Web Applications.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
Address-space layout randomization using code islands.
Journal of Computer Security, 2009

2008
Design and evaluation of inter-bandwidth broker signaling.
Int. J. Communication Systems, 2008

2006
A scalable intra-domain resource management architecture for DiffServ networks.
J. High Speed Networks, 2006

Improving address space randomization with a dynamic offset randomization technique.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

A Bandwidth-Broker Based Inter-domain SLA Negotiation.
Proceedings of the Autonomic Management of Mobile Multimedia Services, 2006

Analyzing Network-Aware Active Wardens in IPv6.
Proceedings of the Information Hiding, 8th International Workshop, 2006

2005
Detection of file-based race conditions.
Int. J. Inf. Sec., 2005

Inter-domain QoS routing on Diffserv networks: a region-based approach.
Computer Communications, 2005

Covert Channels in IPv6.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

A Scalable Method for Predicting Network Performance in Heterogeneous Clusters.
Proceedings of the 8th International Symposium on Parallel Architectures, 2005

Monitoring Access to Shared Memory-Mapped Files.
Proceedings of the Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, 2005

A Cost/Benefit Estimating Service for Mapping Parallel Applications on Heterogeneous Clusters.
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005

2004
A scalable model for interbandwidth broker resource reservation and provisioning.
IEEE Journal on Selected Areas in Communications, 2004

Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

An implementation study of a dynamic inter-domain bandwidth management platform in DiffServ networks.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Syntax and Semantics-Preserving Application-Layer Protocol Steganography.
Proceedings of the Information Hiding, 6th International Workshop, 2004

Detecting Exploit Code Execution in Loadable Kernel Modules.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Reliable heterogeneous applications.
IEEE Trans. Reliability, 2003

Buffer overflow and format string overflow vulnerabilities.
Softw., Pract. Exper., 2003

A Scalable and Efficient Inter-domain QoS Routing Architecture for Diffserv Networks.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency.
Proceedings of the IEEE Systems, 2003

Scalability of inter-domain edge tunnels using bandwidth brokers: a region-based approach.
Proceedings of the Global Telecommunications Conference, 2003

2002
Type-Assisted Dynamic Buffer Overflow Detection.
Proceedings of the 11th USENIX Security Symposium, 2002

2001
JobQueue: A Computational Grid-Wide Queueing System.
Proceedings of the Grid Computing, 2001

Inter-domain LSP setup using bandwidth management points.
Proceedings of the Global Telecommunications Conference, 2001

Developing a Cost/Benefit Estimating Service for Dynamic Resource Sharing in Heterogeneous Clusters: Experience with SNL Clusters.
Proceedings of the First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), 2001

2000
Heterogeneous process state capture and recovery through Process Introspection.
Cluster Computing, 2000

A Cost/Benefit Model for Dynamic Resource Sharing.
Proceedings of the 9th Heterogeneous Computing Workshop, 2000

Architectural Models for Resource Management in the Grid.
Proceedings of the Grid Computing, 2000

1999
A new model of security for metasystems.
Future Generation Comp. Syst., 1999

Resource management in Legion.
Future Generation Comp. Syst., 1999

The Legion Resource Management System.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 1999

Benchmarks and Standards for the Evaluation of Parallel Job Schedulers.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 1999

A Flexible Security System for Metacomputing Environments.
Proceedings of the High-Performance Computing and Networking, 7th International Conference, 1999

1998
Internet Research on Internet Time.
IEEE Computer, 1998

Dissemination of state information in distributed autonomous systems.
Computer Communications, 1998

Extending Metasystem Functionality Using Reflection.
Proceedings of the Seventh IEEE International Symposium on High Performance Distributed Computing, 1998

1997
Distributed and Multiprocessor Scheduling.
Proceedings of the Computer Science and Engineering Handbook, 1997

1996
Distributed and Multiprocessor Scheduling.
ACM Comput. Surv., 1996

1994
Support for Implementing Scheduling Algorithms Using MESSIAHS.
Scientific Programming, 1994

Constructing Distributed Schedulers Using the MESSIAHS Interface Language.
Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), 1994

1989
Using ML as a Command Language.
Proceedings of the Computing in the 90's, 1989


  Loading...