Xiaolan Zhang

Affiliations:
  • IBM Thomas J. Watson Research Center, Hawthorne, NY, USA
  • Harvard University, Cambridge, MA, USA (former)


According to our database1, Xiaolan Zhang authored at least 37 papers between 1997 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2014
DACSA: A Decoupled Architecture for Cloud Security Analysis.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014

EnCore: exploiting system environment and correlation information for misconfiguration detection.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2014

SEER: practical memory virus scanning as a service.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
A statistical machine learning approach for ticket mining in IT service delivery.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

What to discover before migrating to the cloud.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

A Novel Service Composition Approach for Application Migration to Cloud.
Proceedings of the Service-Oriented Computing - 11th International Conference, 2013

2012
iHTTP: Efficient Authentication of Non-confidential HTTP Traffic.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Preface: Cloud Computing.
IBM J. Res. Dev., 2011

SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
RC2 - A Living Lab for Cloud Computing.
Proceedings of the Uncovering the Secrets of System Administration: Proceedings of the 24th Large Installation System Administration Conference, 2010

HyperSentry: enabling stealthy in-context measurement of hypervisor integrity.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Always up-to-date: scalable offline patching of VM images in a compute cloud.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Managing security of virtual machine images in a cloud environment.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

HIMA: A Hypervisor-Based Integrity Measurement Agent.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
AutoISES: Automatically Inferring Security Specification and Detecting Violations.
Proceedings of the 17th USENIX Security Symposium, 2008

Trustworthy and personalized computing on public kiosks.
Proceedings of the 6th International Conference on Mobile Systems, 2008

2007
Towards Trustworthy Kiosk Computing.
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007

XenSocket: A High-Throughput Interdomain Transport for Virtual Machines.
Proceedings of the Middleware 2007, 2007

Automated Security Debugging Using Program Structural Constraints.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Leveraging IPsec for Mandatory Per-Packet Access Control.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

The case for analysis preserving language transformation.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2006

2004
Consistency analysis of authorization hook placement in the Linux security modules framework.
ACM Trans. Inf. Syst. Secur., 2004

Design and Implementation of a TCG-based Integrity Measurement Architecture.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Resolving constraint conflicts.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Attestation-based policy enforcement for remote access.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
Policy management using access control spaces.
ACM Trans. Inf. Syst. Secur., 2003

Analyzing Integrity Protection in the SELinux Example Policy.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

2002
Using CQUAL for Static Analysis of Authorization Hook Placement.
Proceedings of the 11th USENIX Security Symposium, 2002

Secure coprocessor-based intrusion detection.
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002

Gaining and maintaining confidence in operating systems security.
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002

Managing access control policies using access control spaces.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Runtime verification of authorization hook placement for the linux security modules framework.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
HBench: Java: An application-specific benchmarking framework for Java Virtual Machines.
Concurr. Comput. Pract. Exp., 2001

HBench: JGC-An Application-Specific Benchmark Suite for Evaluating JVM Garbage Collector Performance.
Proceedings of the 6th USENIX Conference on Object-Oriented Technologies and Systems, January 29, 2001

1999
The Case for Application-Specific Benchmarking.
Proceedings of The Seventh Workshop on Hot Topics in Operating Systems, 1999

1997
System Support for Automated Profiling and Optimization.
Proceedings of the Sixteenth ACM Symposium on Operating System Principles, 1997


  Loading...